The keys to holographic data security | IEEE Journals & Magazine | IEEE Xplore