1 |
S. H. Jeon, Y. G. Hwang, and S. K. Gil, "Optical encryption of gray-level image using on-axis and 2-f digital holography with two-step phase-shifting method," Opt. Rev. 15, 181-186 (2008).
DOI
|
2 |
S. H. Jeon and S. K. Gil, "QPSK modulation based optical image cryptosystem using phase-shifting digital holography," J. Opt. Soc. Korea 14, 97-103 (2010).
DOI
|
3 |
S. H. Jeon and S. K. Gil, "2-step phase-shifting digital holographic optical encryption and error analysis," J. Opt. Soc. Korea 15, 244-251 (2011).
DOI
|
4 |
S. K. Gil, "2-step quadrature phase-shifting digital holographic optical encryption using orthogonal polarization and error analysis," J. Opt. Soc. Korea 16, 354-364 (2012).
DOI
|
5 |
S. K. Gil, S. H. Jeon, and J. R. Jeong, "Security enhanced optical one-time password authentication method by using digital holography," Proc. SPIE 9386, 93860U (2015).
|
6 |
D. McDonald, R. Atkinson, and Craig Mets, "One-time passwords in everything (OPIE): Experiences with building and using stronger authentication," in Proc. the 5th USENIX Security Symposium (Salt Lake City, Utah, USA, Jun. 1995), vol. 5 pp. 16-16.
|
7 |
B. Schneider, "Two-factor authentication: too little, too late," ACM Commun. 48, 136 (2005).
|
8 |
B. Javidi and J. L. Horner, "Optical pattern recognition for validation and security verification," Opt. Eng. 33, 1752-1756 (1994).
DOI
|
9 |
J. F. Heanue, M. C. Bashaw, and L. Hesselink, "Encrypted holographic data storage based on orthogonal-phase-code multiplexing," Appl. Opt. 34, 6012-6015 (1995).
DOI
|
10 |
P. Refregier and B. Javidi, "Optical image encryption based on input plane and Fourier plane random encoding," Opt. Lett. 20, 767-769 (1995).
DOI
|
11 |
B. Javidi and T. Nomura, "Securing information by means of digital holography," Opt. Lett. 25, 28-30 (2000).
DOI
|
12 |
B. Javidi, A. Sergent, and E. Ahouzi, "Performance of double phase encoding encryption technique using binarized encrypted images," Opt. Eng. 37, 565-569 (1998).
DOI
|
13 |
D. Weber and J. Trolinger, "Novel implementation of nonlinear joint transform correlators in optical security and validation," Opt. Eng. 38, 62-68 (1999).
DOI
|
14 |
G. Unnikrishnan and K. Singh, "Double random fractional Fourier domain encoding for optical security," Opt. Eng. 39, 2853-2859 (2000).
DOI
|
15 |
G-S. Lin, H. T. Chang, W.-N. Lie, and C.-H. Chuang, "Public-key-based optical image cryptosystem based on data embedding techniques," Opt. Eng. 42, 2331-2339 (2003).
DOI
|
16 |
R. Arizaga and R. Torroba, "Validation through a binary key code and a polarization sensitive digital technique," Opt. Comm. 215, 31-36 (2003).
DOI
|
17 |
T. Nomura, A. Okazaki, M. Kameda, and Y. Morimoto, "Image reconstruction from compressed encrypted digital hologram," Opt. Eng. 44, 2313-2320 (2005).
|
18 |
P. Hariharan, "Digital phase-shifting interferometry: a simple error compensating phase calculation algorithm," Appl. Opt. 26, 2504-0505 (1987).
DOI
|
19 |
I. Yamaguchi and T. Zhang, "Phase-shifting digital holography," Opt. Lett. 22, 610-612 (1998).
|
20 |
J.-P. Liu, T.-C. Poon, G.-S. Jhou, and P.-J. Chen, "Comparison of two-, three, and four-exposure guadrature phase-shifting holography," Appl. Opt. 50, 2443-2450 (2011).
DOI
|
21 |
S. K. Gil, S. H. Jeon, N. Kim, and J. R. Jeong, "Successive encryption and transmission with phase-shifting digital holography," Proc. SPIE 6136, 339-346 (2006).
|
22 |
S. K. Gil, H. J. Byun, H. J. Lee, S. H. Jeon, and J. R. Jeong, "Optical encryption of binary data information with 2-step phase-shifting digital holography," Proc. SPIE 6488, 648812 (2007).
|