Optical Cryptosystems
Реклама. ООО «ЛитРес», ИНН: 7719571260.
Оглавление
Naveen K. Nishchal. Optical Cryptosystems
Contents
IOP Series in Advances in Optics, Photonics and Optoelectronics
Preface
Acknowledgement
Author biography
List of acronyms
IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 1. Digital techniques of data and image encryption. 1.1 Introduction
1.2 Types of cryptography
1.2.1 Symmetric key cryptography
1.2.2 Asymmetric key cryptography
1.2.3 Hash functions
References
IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 2. Optical techniques of image encryption: symmetric cryptosystems. 2.1 Introduction
2.2 Encryption using linear canonical transforms
2.2.1 Double random phase encoding
Statistical properties of the encoded image
2.2.2 Encryption using fractional Fourier transform
2.2.3 Encryption using Fresnel transform
2.2.4 Encryption using gyrator transform
2.2.5 Encryption using wavelet transform
2.2.6 Encryption using cosine transform
2.2.7 Encryption using fractional Mellin transform
MATLAB codes
References
IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 3. Fully-phase image encryption. 3.1 Introduction
3.2 Phase imaging
3.3 Fully-phase encryption
References
IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 4. Joint transform correlator-based schemes for security and authentication. 4.1 Introduction
4.2 DRPE using JTC
4.3 Authentication using fractional non-conventional JTC
4.3.1 Authentication
4.3.2 Authentication with a phase-encoded image
4.3.3 Performance measurement
MATLAB code
References
IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 5. Image watermarking and hiding. 5.1 Introduction
5.2 Information hiding and watermarking under the DRPE framework
5.2.1 FRT domain watermarking
5.3 Optical asymmetric watermarking
References
IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 6. Polarization encoding. 6.1 Introduction
6.2 Double random phase polarization encoding
6.3 Polarization encoding-based asymmetric cryptosystem
6.3.1 Color image encryption
References
IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 7. Digital holography-based security schemes. 7.1 Introduction
7.2 Phase-shifting interferometry
7.3 Numerical reconstruction of digital holograms
7.3.1 Discrete Fresnel transformation
7.3.2 Convolution approach
7.3.3 Angular spectrum method
7.4 Information security using digital holography
7.5 Digital holography-based geometries for image encryption
7.5.1 Fourier domain DRPE through digital holography
7.5.2 FRT domain DRPE through digital holography
References
IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 8. Securing fused multispectral data. 8.1 Introduction
8.2 Image fusion principle using wavelet transform
8.3 Security of fused data/images
8.4 Asymmetric cryptosystems with fused color components
8.5 Color image encryption using XOR operation with LED
References
IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 9. Chaos-based information security. 9.1 Introduction
9.2 Chaos and cryptography
9.3 Chaos functions
9.4 Chaos-based optical asymmetric cryptosystem
References
IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 10. Optical asymmetric cryptosystems. 10.1 Introduction
10.2 Asymmetric cryptosystems
10.3 Phase retrieval
10.3.1 Phase retrieval for security
10.3.2 Phase retrieval: mathematical formulation
10.3.3 Modified GS algorithm for image multiplexing and encryption
10.4 Photon counting imaging
10.5 PCI and phase-truncated FrT-based asymmetric encryption
MATLAB code for phase retrieval
References
IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 11. Attacks on optical security schemes. 11.1 Introduction
11.2 Brute-force attack
11.3 Differential attack
11.4 Known-plaintext attack
11.5 Chosen-plaintext attack
11.6 Chosen-ciphertext attack
11.7 Specific attack
11.8 Collision attack
11.9 Occlusion attack
11.10 Effects of additive and multiplicative noise
References
IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 12. Optical security keys/masks. 12.1 Introduction
12.2 Literature review
12.3 Random phase mask
12.4 Structured phase mask
References
Отрывок из книги
Optical Cryptosystems
Naveen K Nishchal
.....
7.5.2 FRT domain DRPE through digital holography
References
.....