References
- D. McDonald and R. Atkinson, "One-time passwords in everything(OPIE): Experiences with building and using stronger authentication," Proceedings of the 5th USENIX Security Symposium, 1995
- B. Javidi and J. L. Horner, "Optical pattern recognition for validation and security verification," Optical Engineering Vol.33, pp1752-1756, 1994 https://doi.org/10.1117/12.170736
- R. Arizaga and R. Torroba, "Validation through a binary key code and a polarization sensitive digital technique," Optics Communications, Vol.215(1), pp31-36, 2003 https://doi.org/10.1016/S0030-4018(02)02189-2
- 12. X. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, and Y. R. Wang, "Two-step phase-shifting interferometry and its application in image encryption," Opt. Lett. 31, 1414-1416 (2006). https://doi.org/10.1364/OL.31.001414
- X. Meng, L. Z. Cai, X. L. Yang, X. X. Shen, and G. Y. Dong, and Y. R. Wang, "Two-step phase-shifting interferometry and its application in image encryption," Optics Letter. Vol. 31(10), pp1414-1416, 2006 https://doi.org/10.1364/OL.31.001414
- S-K Gil, "Application to 2-D page-oriented data optical cryptography based on CFB mode," j.inst.Korean.electr.electron.eng., Vol.19(3), pp424 -430, 1994
- S. K. Gil, S. H. Jeon, and J. R. Jeong, "Security enhanced optical one-time password authentication method by using digital holography," Proceedings of SPIE, Vol.9386, pp93860U, 2015
- S. K. Gil, "2-step quadrature phase-shifting digital holographic optical encryption using orthogonal polarization and error analysis," Journal of the Optical Society of Korea, Vol.16(4), pp354-364, 2012 https://doi.org/10.3807/JOSK.2012.16.4.354