Читать книгу Optical Cryptosystems - Naveen K. Nishchal - Страница 5
На сайте Литреса книга снята с продажи.
Contents
ОглавлениеPreface
Acknowledgement
Author biography
List of acronyms
1 Digital techniques of data and image encryption
1.1 Introduction
1.2 Types of cryptography
1.2.1 Symmetric key cryptography
1.2.2 Asymmetric key cryptography
1.2.3 Hash functions
References
2 Optical techniques of image encryption: symmetric cryptosystems
2.1 Introduction
2.2 Encryption using linear canonical transforms
2.2.1 Double random phase encoding
2.2.2 Encryption using fractional Fourier transform
2.2.3 Encryption using Fresnel transform
2.2.4 Encryption using gyrator transform
2.2.5 Encryption using wavelet transform
2.2.6 Encryption using cosine transform
2.2.7 Encryption using fractional Mellin transform
MATLAB codes
References
3 Fully-phase image encryption
3.1 Introduction
3.2 Phase imaging
3.3 Fully-phase encryption
References
4 Joint transform correlator-based schemes for security and authentication
4.1 Introduction
4.2 DRPE using JTC
4.3 Authentication using fractional non-conventional JTC
4.3.1 Authentication
4.3.2 Authentication with a phase-encoded image
4.3.3 Performance measurement
MATLAB code
References
5 Image watermarking and hiding
5.1 Introduction
5.2 Information hiding and watermarking under the DRPE framework
5.2.1 FRT domain watermarking
5.3 Optical asymmetric watermarking
References
6 Polarization encoding
6.1 Introduction
6.2 Double random phase polarization encoding
6.3 Polarization encoding-based asymmetric cryptosystem
6.3.1 Color image encryption
References
7 Digital holography-based security schemes
7.1 Introduction
7.2 Phase-shifting interferometry
7.3 Numerical reconstruction of digital holograms
7.3.1 Discrete Fresnel transformation
7.3.2 Convolution approach
7.3.3 Angular spectrum method
7.4 Information security using digital holography
7.5 Digital holography-based geometries for image encryption
7.5.1 Fourier domain DRPE through digital holography
7.5.2 FRT domain DRPE through digital holography
References
8 Securing fused multispectral data
8.1 Introduction
8.2 Image fusion principle using wavelet transform
8.3 Security of fused data/images
8.4 Asymmetric cryptosystems with fused color components
8.5 Color image encryption using XOR operation with LED
References
9 Chaos-based information security
9.1 Introduction
9.2 Chaos and cryptography
9.3 Chaos functions
9.4 Chaos-based optical asymmetric cryptosystem
References
10 Optical asymmetric cryptosystems
10.1 Introduction
10.2 Asymmetric cryptosystems
10.3 Phase retrieval
10.3.1 Phase retrieval for security
10.3.2 Phase retrieval: mathematical formulation
10.3.3 Modified GS algorithm for image multiplexing and encryption
10.4 Photon counting imaging
10.5 PCI and phase-truncated FrT-based asymmetric encryption
MATLAB code for phase retrieval
References
11 Attacks on optical security schemes
11.1 Introduction
11.2 Brute-force attack
11.3 Differential attack
11.4 Known-plaintext attack
11.5 Chosen-plaintext attack
11.6 Chosen-ciphertext attack
11.7 Specific attack
11.8 Collision attack
11.9 Occlusion attack
11.10 Effects of additive and multiplicative noise
References
12 Optical security keys/masks
12.1 Introduction
12.2 Literature review
12.3 Random phase mask
12.4 Structured phase mask
References