scispace - formally typeset
Search or ask a question
Author

Bahram Javidi

Bio: Bahram Javidi is an academic researcher from University of Connecticut. The author has contributed to research in topics: Integral imaging & Digital holography. The author has an hindex of 84, co-authored 937 publications receiving 29681 citations. Previous affiliations of Bahram Javidi include National University of Ireland & Hanscom Air Force Base.


Papers
More filters
Journal ArticleDOI
TL;DR: A new optical encoding method of images for security applications is proposed and it is shown that the encoding converts the input signal to stationary white noise and that the reconstruction method is robust.
Abstract: We propose a new optical encoding method of images for security applications. The encoded image is obtained by random-phase encoding in both the input and the Fourier planes. We analyze the statistical properties of this technique and show that the encoding converts the input signal to stationary white noise and that the reconstruction method is robust.

2,361 citations

Journal ArticleDOI
TL;DR: Encryption and decryption of optical memory in a LiNbO(3) :Fe photorefractive crystal by use of angular multiplexing is demonstrated.
Abstract: An encrypted optical memory system using double random phase codes in the Fresnel domain is proposed. In this system, two random phase codes and their positions form three-dimensional keys for encryption of images and are used as keys to recover the original data. The third dimension is the positions of the codes, which can have as many as three degrees of freedom. Original images encrypted by use of the two phase codes located in the Fresnel domain are stored holographically in a photorefractive material. We demonstrate in preliminary experiments encryption and decryption of optical memory in a LiNbO3:Fe photorefractive crystal by use of angular multiplexing.

476 citations

Journal ArticleDOI
TL;DR: An information security method that uses a digital holographic technique that provides secure storage and data transmission and can be electrically decrypted by use of the digital hologram of the key.
Abstract: An information security method that uses a digital holographic technique is presented. An encrypted image is stored as a digital hologram. The decryption key is also stored as a digital hologram. The encrypted image can be electrically decrypted by use of the digital hologram of the key. This security technique provides secure storage and data transmission. Experimental results are presented to demonstrate the proposed method.

476 citations

Journal ArticleDOI
TL;DR: It is shown that various types of autocorrelation signal can be produced simply by varying the severity of the nonlinearity and without the need to synthesize the specific matched filter.
Abstract: A nonlinear joint transform image correlator is investigated. The Fourier transform interference intensity is thresholded to provide higher correlation peak intensity and a better defined correlation spot. Analytical expressions for the thresholded joint power spectrum are provided. The effects of nonlinearity at the Fourier plane on the correlation signals at the output plane are investigated. The correlation signals are determined in terms of nonlinear characteristics of the spatial light modulator (SLM) at the Fourier plane. We show that thresholding the interference intensity results in a sum of infinite harmonic terms. Each harmonic term is envelope modulated due to the nonlinear characteristics of the device and phase modulated by m times the phase modulation of the nonthresholded joint power spectrum. The correct phase information about the correlation signal is recovered from the first-order harmonic of the thresholded interference intensity. We show that various types of autocorrelation signal can be produced simply by varying the severity of the nonlinearity and without the need to synthesize the specific matched filter. For example, the autocorrelation signal produced by a phase-only matched filter can be obtained by selecting the appropriate nonlinearity.

463 citations

Journal ArticleDOI
TL;DR: This Commemorative Review presents an overview of literature on physical principles and applications of integral imaging, and applications including 3D underwater imaging, 3D imaging in photon-starved environments, 2D tracking of occluded objects,3D optical microscopy, and 3D polarimetric imaging are reviewed.
Abstract: Three-dimensional (3D) sensing and imaging technologies have been extensively researched for many applications in the fields of entertainment, medicine, robotics, manufacturing, industrial inspection, security, surveillance, and defense due to their diverse and significant benefits. Integral imaging is a passive multiperspective imaging technique, which records multiple two-dimensional images of a scene from different perspectives. Unlike holography, it can capture a scene such as outdoor events with incoherent or ambient light. Integral imaging can display a true 3D color image with full parallax and continuous viewing angles by incoherent light; thus it does not suffer from speckle degradation. Because of its unique properties, integral imaging has been revived over the past decade or so as a promising approach for massive 3D commercialization. A series of key articles on this topic have appeared in the OSA journals, including Applied Optics. Thus, it is fitting that this Commemorative Review presents an overview of literature on physical principles and applications of integral imaging. Several data capture configurations, reconstruction, and display methods are overviewed. In addition, applications including 3D underwater imaging, 3D imaging in photon-starved environments, 3D tracking of occluded objects, 3D optical microscopy, and 3D polarimetric imaging are reviewed.

461 citations


Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

33,785 citations

Christopher M. Bishop1
01 Jan 2006
TL;DR: Probability distributions of linear models for regression and classification are given in this article, along with a discussion of combining models and combining models in the context of machine learning and classification.
Abstract: Probability Distributions.- Linear Models for Regression.- Linear Models for Classification.- Neural Networks.- Kernel Methods.- Sparse Kernel Machines.- Graphical Models.- Mixture Models and EM.- Approximate Inference.- Sampling Methods.- Continuous Latent Variables.- Sequential Data.- Combining Models.

10,141 citations

Journal Article
TL;DR: In this article, a fast Fourier transform method of topography and interferometry is proposed to discriminate between elevation and depression of the object or wave-front form, which has not been possible by the fringe-contour generation techniques.
Abstract: A fast-Fourier-transform method of topography and interferometry is proposed. By computer processing of a noncontour type of fringe pattern, automatic discrimination is achieved between elevation and depression of the object or wave-front form, which has not been possible by the fringe-contour-generation techniques. The method has advantages over moire topography and conventional fringe-contour interferometry in both accuracy and sensitivity. Unlike fringe-scanning techniques, the method is easy to apply because it uses no moving components.

3,742 citations

01 Jan 2004
TL;DR: Comprehensive and up-to-date, this book includes essential topics that either reflect practical significance or are of theoretical importance and describes numerous important application areas such as image based rendering and digital libraries.
Abstract: From the Publisher: The accessible presentation of this book gives both a general view of the entire computer vision enterprise and also offers sufficient detail to be able to build useful applications. Users learn techniques that have proven to be useful by first-hand experience and a wide range of mathematical methods. A CD-ROM with every copy of the text contains source code for programming practice, color images, and illustrative movies. Comprehensive and up-to-date, this book includes essential topics that either reflect practical significance or are of theoretical importance. Topics are discussed in substantial and increasing depth. Application surveys describe numerous important application areas such as image based rendering and digital libraries. Many important algorithms broken down and illustrated in pseudo code. Appropriate for use by engineers as a comprehensive reference to the computer vision enterprise.

3,627 citations

Journal ArticleDOI
TL;DR: A new optical encoding method of images for security applications is proposed and it is shown that the encoding converts the input signal to stationary white noise and that the reconstruction method is robust.
Abstract: We propose a new optical encoding method of images for security applications. The encoded image is obtained by random-phase encoding in both the input and the Fourier planes. We analyze the statistical properties of this technique and show that the encoding converts the input signal to stationary white noise and that the reconstruction method is robust.

2,361 citations