Optical Cryptosystems

Optical Cryptosystems
Автор книги: id книги: 1549709     Оценка: 0.0     Голосов: 0     Отзывы, комментарии: 0 17769,3 руб.     (193,79$) Читать книгу Купить и скачать книгу Купить бумажную книгу Электронная книга Жанр: Отраслевые издания Правообладатель и/или издательство: Ingram Дата добавления в каталог КнигаЛит: ISBN: 9780750322201 Скачать фрагмент в формате   fb2   fb2.zip Возрастное ограничение: 0+ Оглавление Отрывок из книги

Реклама. ООО «ЛитРес», ИНН: 7719571260.

Описание книги

Advanced technologies such as artificial intelligence, big data, cloud computing, and the Internet of Things have changed the digital landscape, providing many new and exciting opportunities. However, they also provide ever-shifting gateways for information theft or misuse. Staying ahead requires the development of innovative and responsive security measures, and recent advances in optical technology have positioned it as a promising alternative to digital cryptography. Optical Cryptosystems  introduces the subject of optical cryptography and provides up-to-date coverage of optical security schemes. Optical principles, approaches, and algorithms are discussed as well as applications, including image/data encryption–decryption, watermarking, image/data hiding, and authentication verification. This book also includes MATLAB® codes, enabling students and research professionals to carry out exercises and develop newer methods of image/data security and authentication.

Оглавление

Naveen K. Nishchal. Optical Cryptosystems

Contents

IOP Series in Advances in Optics, Photonics and Optoelectronics

Preface

Acknowledgement

Author biography

List of acronyms

IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 1. Digital techniques of data and image encryption. 1.1 Introduction

1.2 Types of cryptography

1.2.1 Symmetric key cryptography

1.2.2 Asymmetric key cryptography

1.2.3 Hash functions

References

IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 2. Optical techniques of image encryption: symmetric cryptosystems. 2.1 Introduction

2.2 Encryption using linear canonical transforms

2.2.1 Double random phase encoding

Statistical properties of the encoded image

2.2.2 Encryption using fractional Fourier transform

2.2.3 Encryption using Fresnel transform

2.2.4 Encryption using gyrator transform

2.2.5 Encryption using wavelet transform

2.2.6 Encryption using cosine transform

2.2.7 Encryption using fractional Mellin transform

MATLAB codes

References

IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 3. Fully-phase image encryption. 3.1 Introduction

3.2 Phase imaging

3.3 Fully-phase encryption

References

IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 4. Joint transform correlator-based schemes for security and authentication. 4.1 Introduction

4.2 DRPE using JTC

4.3 Authentication using fractional non-conventional JTC

4.3.1 Authentication

4.3.2 Authentication with a phase-encoded image

4.3.3 Performance measurement

MATLAB code

References

IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 5. Image watermarking and hiding. 5.1 Introduction

5.2 Information hiding and watermarking under the DRPE framework

5.2.1 FRT domain watermarking

5.3 Optical asymmetric watermarking

References

IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 6. Polarization encoding. 6.1 Introduction

6.2 Double random phase polarization encoding

6.3 Polarization encoding-based asymmetric cryptosystem

6.3.1 Color image encryption

References

IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 7. Digital holography-based security schemes. 7.1 Introduction

7.2 Phase-shifting interferometry

7.3 Numerical reconstruction of digital holograms

7.3.1 Discrete Fresnel transformation

7.3.2 Convolution approach

7.3.3 Angular spectrum method

7.4 Information security using digital holography

7.5 Digital holography-based geometries for image encryption

7.5.1 Fourier domain DRPE through digital holography

7.5.2 FRT domain DRPE through digital holography

References

IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 8. Securing fused multispectral data. 8.1 Introduction

8.2 Image fusion principle using wavelet transform

8.3 Security of fused data/images

8.4 Asymmetric cryptosystems with fused color components

8.5 Color image encryption using XOR operation with LED

References

IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 9. Chaos-based information security. 9.1 Introduction

9.2 Chaos and cryptography

9.3 Chaos functions

9.4 Chaos-based optical asymmetric cryptosystem

References

IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 10. Optical asymmetric cryptosystems. 10.1 Introduction

10.2 Asymmetric cryptosystems

10.3 Phase retrieval

10.3.1 Phase retrieval for security

10.3.2 Phase retrieval: mathematical formulation

10.3.3 Modified GS algorithm for image multiplexing and encryption

10.4 Photon counting imaging

10.5 PCI and phase-truncated FrT-based asymmetric encryption

MATLAB code for phase retrieval

References

IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 11. Attacks on optical security schemes. 11.1 Introduction

11.2 Brute-force attack

11.3 Differential attack

11.4 Known-plaintext attack

11.5 Chosen-plaintext attack

11.6 Chosen-ciphertext attack

11.7 Specific attack

11.8 Collision attack

11.9 Occlusion attack

11.10 Effects of additive and multiplicative noise

References

IOP Publishing. Optical Cryptosystems. Naveen K Nishchal. Chapter 12. Optical security keys/masks. 12.1 Introduction

12.2 Literature review

12.3 Random phase mask

12.4 Structured phase mask

References

Отрывок из книги

Optical Cryptosystems

Naveen K Nishchal

.....

7.5.2 FRT domain DRPE through digital holography

References

.....

Добавление нового отзыва

Комментарий Поле, отмеченное звёздочкой  — обязательно к заполнению

Отзывы и комментарии читателей

Нет рецензий. Будьте первым, кто напишет рецензию на книгу Optical Cryptosystems
Подняться наверх