1 |
O. Matoba, T. Nomura, E. Perez-Cabre, M. S. Millan, and B. Javidi, "Optical Techniques for Information Security," Proceedings of the IEEE, Vol. 97, pp. 1128-1148 2009.
DOI
ScienceOn
|
2 |
Y. Frauel, A. Castro, T. Naughton, and B. Javidi, "Resistance of the double random phase encryption against various attacks," Optics Exp. Vol. 15, pp. 10253-10265, 2007.
DOI
|
3 |
I. Yamaguchi and T. Zhang, "Phase-shifting digital holography," Opt. Lett. Vol. 22, pp. 1268-1270, 1997.
DOI
ScienceOn
|
4 |
B. Javidi and E. Tajahuerce, "Three dimensional object recognition by use of digital holography," Opt. Lett. Vol. 25, pp. 610-612, 2000.
DOI
ScienceOn
|
5 |
H. Kim, D. Kim, and Y. Lee, "Encryption of digital hologram of 3-D object by virtual optics," Optics Exp. Vol. 12, pp. 4912-4921, 2004.
DOI
|
6 |
J. W. Goodman, "Introduction to Fourier Optics," McGraw-Hill, New York, USA, 1996.
|
7 |
T. Shimobaba, Y. Sato, J. Miura, M. Takenouchi, and T. Ito, "Real-time digital holographic microscopy using the graphic processing unit," Optics Exp. Vol. 16, pp. 11776-11781, 2008.
DOI
|
8 |
S. Kishk and B. Javidi, "3D object watermarking by a 3D hidden object," Optics Exp. Vol. 11, pp. 874-888, 2003.
DOI
|
9 |
E. Tajahuerce and B. Javidi, "Encrypting three-dimensional information with digital holography," Appl. Opt. Vol. 39, pp. 6595-6601, 2000.
DOI
|
10 |
W. Stallings, "Crytography and network security," Pearson, New York, USA, 2011.
|