Author:
Kanjana G.,Cyriac Meril,Anusree L.,Thomas Leena,Nelwin Raj N. R.,Varghese Roshan,Sheeja M. K.
Reference6 articles.
1. Ambadiyil S, Prakash D, Sheeja MK, Pillai M (2017) Secure storage and analysis of fingerprints for criminal investigation using holographic techniques. Mater Today Proc Elsevier J 4(2) Part C:4389–4395
2. Bulanovs A, Bakanas R (2016) Use of computer generated holograms in security hologram applications. Latvian J Phys Tech Sci 54–63.
https://doi.org/10.1515/lpts-2016-0036
3. Symeonidou A, Blinder D, Munteanu A, Schellkens P (2015) Computer-generated holograms by multiple wavefront recording plane method with occlusion culling. Opt Express 23(17):22149–22161
4. Jeong TH, Basic principles and the applications of Holography. Lake Forest College, Lake Forest, llinois; Fundamentals of Photonics, SPIE Digital Library
5. Bulanovs A, Gerbreders S (2013) Advanced concept for creation of security holograms. Latvian J Phys Tech Sci 50(6):61–70