[1] J. W. Goodman and R. W. Lawrence, “Digital Image Formation from Electronically Detected Hologram,” Applied Physics Letters, Vol. 11, No. 3, 1967, pp. 77-79. doi:10.1063/1.1755043
[2] U. Schnars and W. Juptner, “Direct Recording of Holograms by a CCD Target and Numerical Reconstruction,” Applied Optics, Vol. 33, No. 2, 1994, pp. 179-181. doi:10.1364/AO.33.000179
[3] I. Yamaguchi and T. Zhang, “Phase-Shifting Digital Holography,” Optics Letters, Vol. 22, No. 16, 1997, pp. 1268-1270. doi:10.1364/OL.22.001268
[4] B. Javidi, G. Zhang and J. Li, “Experimental Demonstration of the Random Phase Encoding Technique for Image Encryption and Security Verification,” Optical Engineering, Vol. 35, No. 9, 1996, pp. 2506-2512. doi:10.1117/1.600854
[5] B. Javidi and T. Nomura, “Securing Information by Use of Digital Holography,” Optics Letters, Vol. 25, No. 1, 2000, pp. 28-30. doi:10.1364/OL.25.000028
[6] E. Tajahuerce, O. Matoba, S. C. Verrall and B. Javidi, “Optoelectronic Information Encryption with Phase-Shifting Interferometry,” Applied Optics, Vol. 39, No. 14, 2000, pp. 2313-2320. doi:10.1364/AO.39.002313
[7] E. Tajahuerce and B. Javidi, “Encrypting Three-Dimen- sional Information with Digital Holography,” Applied Optics, Vol. 39, No. 35, 2000, pp. 6595-6601. doi:10.1364/AO.39.006595
[8] S. Lai and M. A. Neifeld, “Digital Wavefront Reconstruction and Its Application to Image Encryption,” Optics Communications, Vol. 178, No. 4-6, 2000, pp. 283- 289. doi:10.1016/S0030-4018(00)00641-6
[9] E. Tajahuerce, J. Lancis, B. Javidi and P. Andres, “Optical Security and Encryption with Totally Incoherent Light,” Optics Letters, Vol. 26, No. 10, 2001, pp. 678- 680. doi:10.1364/OL.26.000678
[10] B. M. Hennelly, J. T. Sheridan, “Image Encryption and The Fractional Fourier Transform,” Optik, Vol. 114, No. 6, 2003, pp. 251-265. doi:10.1078/0030-4026-00257
[11] R. Arizaga., R. Henao, R. Torroba, “Fully Digital Encryption Technique,” Optics Communications, Vol. 221, No. 1-3, 2003, pp. 43-47. doi:10.1016/S0030-4018(03)01462-7
[12] L. Z. Cai, M. Z. He, Q. Liu, and X. L. Yang, “Digital Image Encryption and Watermarking by Phase-Shifting Interferometry,” Applied Optics, Vol. 43, No. 15, 2004, pp. 3078-3084. doi:10.1364/AO.43.003078
[13] N. K. Nishchal, J. Joseph and K. Singh, “Fully Phase Encryption Using Digital Holography,” Optical Engineering, Vol. 43 No. 12, 2004, pp. 2959-2966. doi:10.1117/1.1811085
[14] T. J. Naughton and B. Javidi, “Compression of Encrypted Three-Dimensional Objects Using Digital Holography,” Optical Engineering, Vol. 43, No. 10, 2004, pp. 2233- 2238. doi:10.1117/1.1783280
[15] A. Carnicer, M. M.-Usategui, S. Arcos, and I. Juvells, “Vulnerability to Chosen-Cyphertext Attacks of Optical Encryption Schemes Based on Double Random Phase Keys,” Optics Letters, Vol. 30, No. 13, 2005, pp. 1644- 1646. doi:10.1364/OL.30.001644
[16] L. Chen and D. Zhao, “Optical Image Encryption with Hartley Transforms,” Optics Letters, Vol. 31, No. 23, 2006, pp. 3438-3440. doi:10.1364/OL.31.003438
[17] X. F. Meng, L. Z. Cai, X. F. Xu, X. L. Yang, X. X. Shen, G. Y. Dong and Y. R. Wang, “Two-Step Phase-Shifting Interferometry and Its Application in Image Encryption,” Optics Letters, Vol. 31, No. 10, 2006, pp. 1414-1416. doi:10.1364/OL.31.001414
[18] X. Peng, H. H. Wei and P. Zhang, “Chosen-Plaintext Attack on Lensless Double-Random Phase Encoding in the Fresnel Domain,” Optics Letters, Vol. 31, No. 22, 2006, pp. 3261-3263. doi:10.1364/OL.31.003261
[19] X. C. Cheng, L. Z. Cai, Y. R. Wang, X. F. Meng, H. Zhang, X. F. Xu, X. X. Shen, and G. Y. Dong, “Security Enhancement of Double-Random Phase Encryption by Amplitude Modulation,” Optics Letters, Vol. 33, No. 14, 2008, pp. 1575-1577. doi:10.1364/OL.33.001575
[20] X. F. Meng, L. H. Cai, X. F. Xu, X. L. Yang, X. X. Shen, G. Y. Dong and H. Zhang, “Full-Phase Image Encryption by Two-Step Phase-Shifting Interferometry,” Optik, Vol. 119, No. 9, 2008, pp. 434-440. doi:10.1016/j.ijleo.2007.02.003
[21] A. Nelleri, J. Joseph and K. Singh, “Lensless Complex Data Encoding for Digital Holographic Whole Information Security,” Optical Engineering, Vol. 47, No. 11, 2008, pp. 115801-115809. doi:10.1117/1.3028351
[22] G. L. Chen, W. K. Yang, J. C. Wang and C. C. Chang, “Deterministic Phase Encoding Encryption in Single Shot Digital Holography,” Applied Physics B, Vol. 93, No. 2-3, 2008, pp. 473-479. doi:10.1007/s00340-008-3201-5
[23] Y. Zhang and B. Wang, “Optical Image Encryption Based on Interference,” Optics Letters, Vol. 33, No. 21, 2008, pp. 2443-2445. doi:10.1364/OL.33.002443
[24] Y. L. Xiao, X. Zhou, Q. H. Wang, S. Yuan, and Y. Y. Chen, “Optical Image Encryption Topology,” Optics Letters, Vol. 34, No. 20, 2009, pp. 3223-3225. doi:10.1364/OL.34.003223
[25] O. Matoba, E. Tajahuerce, E. Perez-Cabre, M. S. Millan and B. Javidi, “Optical Techniques for Information Security,” Proceedings of the IEEE, Vol. 97, No. 6, 2009, pp. 1128-1148. doi:10.1109/JPROC.2009.2018367
[26] W. T. Hsieh, M. K. Kuo, H. F. Yau and C. C. Chang, “A Simple Arbitrary Phase-Step Digital Holographic Reconstruction Approach without Blurring Using Two Holograms,” Optical Review, Vol. 16, No. 4, 2009, pp. 466- 471. doi:10.1007/s10043-009-0090-8
[27] R. B. Johnson and G. A. Jacobsen, “Advances in Lenticular Lens Arrays for Visual Display,” Proceedings of SPIE, Current Developments in Lens Design and Optical Engineering VI, San Diego, 2-4 August 2005, paper No. 5874-06.
[28] C. C. Chang, G. L. Chen, W. K. Yang, C. Y. Lin, H. F. Yau, “Deterministic Phase Encoded Holographic Data Storage Using Lenticular Lens Array,” Optical Review, Vol. 14, No. 4, 2007, pp. 214-218. doi:10.1007/s10043-007-0214-y
[29] T. C. Poon and P. P. Banerjee, “Contemporary Optical Image Processing with MATLAB,” Elsevier, New York, 2001, pp. 4-6.
[30] “Pacur Lenstar Lenticular,” 2005. http://www.pacur.com/pdf/lenstar.pdf
[31] J. W. Goodman, “Introduction to Fourier Optics,” 2nd Edition, McGraw-Hill, Singapore, 1996, pp. 66-67.
[32] Y. Takaki, H. Kawai, and H. Ohzu, “Hybrid Holographic Microscopy Free of Conjugate and Zero-Order Images,” Applied Optics, Vol. 23, No. 15, 1999, pp. 4990-4996. doi:10.1364/AO.38.004990
[33] U. Schnars and W. Juptner, “Digital Recording and Numerical Reconstruction of Holograms,” Measurement Science and Technology, Vol. 13, No. 9, 2002, pp. R85- R101. doi:10.1088/0957-0233/13/9/201
[34] W. K. Pratt, “Digital Image Processing,” 4th Edition, Wiley, New York, 2007, pp. 759-760. doi:10.1002/9780470097434.app3