1 S. K. Gil, "Successive encryption and transmission with phase-shifting digital holography" 339-346, 2006
2 B. Javidi, "Securing information by means of digital holography" 25 : 28-30, 2000
3 Seok Hee Jeon, "QPSK Modulation Based Optical Image Cryptosystem Using Phase-shifting Digital Holography" 한국광학회 14 (14): 97-103, 2010
4 G.-S. Lin, "Public-key-based optical image cryptosystem based on data embedding techniques" 42 : 2331-2339, 2003
5 I. Yamaguchi, "Phase-shifting digital holography" 22 : 610-612, 1998
6 B. Javidi, "Performance of double phase encoding encryption technique using binarized encrypted images" 37 : 565-569, 1998
7 B. Javidi, "Optical pattern recognition for validation and security verification" 33 : 1752-1756, 1994
8 P. Refregier, "Optical image encryption based on input plane and Fourier plane random encoding" 20 : 767-769, 1995
9 S. H. Jeon, "Optical encryption of gray-level image using on-axis and 2-f digital holography with two-step phase-shifting method" 15 : 181-186, 2008
10 S. K. Gil, "Optical encryption of binary data information with 2-step phase-shifting digital holography" 648812-, 2007
1 S. K. Gil, "Successive encryption and transmission with phase-shifting digital holography" 339-346, 2006
2 B. Javidi, "Securing information by means of digital holography" 25 : 28-30, 2000
3 Seok Hee Jeon, "QPSK Modulation Based Optical Image Cryptosystem Using Phase-shifting Digital Holography" 한국광학회 14 (14): 97-103, 2010
4 G.-S. Lin, "Public-key-based optical image cryptosystem based on data embedding techniques" 42 : 2331-2339, 2003
5 I. Yamaguchi, "Phase-shifting digital holography" 22 : 610-612, 1998
6 B. Javidi, "Performance of double phase encoding encryption technique using binarized encrypted images" 37 : 565-569, 1998
7 B. Javidi, "Optical pattern recognition for validation and security verification" 33 : 1752-1756, 1994
8 P. Refregier, "Optical image encryption based on input plane and Fourier plane random encoding" 20 : 767-769, 1995
9 S. H. Jeon, "Optical encryption of gray-level image using on-axis and 2-f digital holography with two-step phase-shifting method" 15 : 181-186, 2008
10 S. K. Gil, "Optical encryption of binary data information with 2-step phase-shifting digital holography" 648812-, 2007
11 D. Weber, "Novel implementation of nonlinear joint transform correlators in optical security and validation" 38 : 62-68, 1999
12 Seok Hee Jeon, "Measurement of a Mirror Surface Topography Using 2-frame Phase-shifting Digital Interferometry" 한국광학회 13 (13): 245-250, 2009
13 Hyun Jin Lee, "Error Analysis for Optical Security by means of 4-stepPhase-Shifting Digital Holography" 한국광학회 10 (10): 118-123, 2006
14 J. F. Heanue, "Encrypted holographic data storage based on orthogonal-phase-code multiplexing" 34 : 6012-6015, 1995
15 Min-Ok Jeong, "Elemental Image Synthesis for Integral Imaging Using Phase-shifting Digital Holography" 한국광학회 12 (12): 275-280, 2008
16 G. Unnikrishnan, "Double random fractional Fourier domain encoding for optical security" 39 : 2853-2859, 2000
17 U. Schnars, "Direct recording of holograms by a CCD target and numerical reconstruction" 33 : 179-181, 1994
18 P. Hariharan, "Digital phase-shifting interferometry : a simple error compensating phase calculation algorithm" 26 : 2504-2505, 1987
19 E. Cuche, "Digital holography for quantitative phase-contrast imaging" 24 : 291-293, 1999
20 J.-P. Liu, "Comparison of two-, three, and four-exposure guadrature phase-shifting holography" 50 : 2443-2450, 2011