1 |
B. Javidi and J. L. Horner, 'Optical pattern recognition for validation and security verification,' Opt. Eng., Vol. 33, No. 6, pp. 1752-1756, 1994
DOI
ScienceOn
|
2 |
J. H. Kim, N. Kim, and K. Y. Lee, 'Demonstration of holographic smart card system with use of a dual-wavelength method,' International Workshop on Optical Display and Information Processing, OP-3, pp. 259-260, 2002
|
3 |
P. Refregier and B. Javidi, 'Optical image encryption based on input plane and Fourier plane random encoding,' Opt. Lett., Vol. 20, No. 7, pp. 767-769, 1995
DOI
ScienceOn
|
4 |
J. S. Yoon, N. Kim, 'Triple encryption packing scheme for preserving from the reproduction and protecting the information,' The Japan Society of Applied Physics, Vol. 41, No. 3B, pp. L305-306, 2002
DOI
|
5 |
C. Denz, K. Muller, F. Visinka and T. Tschudi, 'Digital volume holographic data storage using phase-coded multiplexing,' SPIE, Vol. 3802, pp. 142-147, 1999
DOI
|
6 |
B. Javidi and A. Sergent, 'Fully phase encoded key and biometrics for security verification,' Opt. Eng., Vol. 36, No. 3, pp. 935-942, 1997
DOI
ScienceOn
|
7 |
B. Javidi and T. Nomura, 'Securing information by use of digital holography,' Opt. Eng., Vol. 25, No. 1, pp. 28-30, 2000
DOI
|
8 |
J .F. Heanue, M. C. Bashaw, and L. Hesselink, 'Encrypted holographi data storage based on orthogonal phase-code multiplexing,' Appl. Opt. Mat., 4, pp. 428, 1995
DOI
|
9 |
S. Lai, 'Security holograms using an encoded reference wave,' Opt. Eng., Vol. 35, No. 9, pp.2470-2471, 1996
DOI
ScienceOn
|