Читать книгу Optical Cryptosystems - Naveen K. Nishchal - Страница 5
Contents
Оглавление1 Digital techniques of data and image encryption
1.1 Introduction
1.2.1 Symmetric key cryptography
1.2.2 Asymmetric key cryptography
2 Optical techniques of image encryption: symmetric cryptosystems
2.1 Introduction
2.2 Encryption using linear canonical transforms
2.2.1 Double random phase encoding
2.2.2 Encryption using fractional Fourier transform
2.2.3 Encryption using Fresnel transform
2.2.4 Encryption using gyrator transform
2.2.5 Encryption using wavelet transform
2.2.6 Encryption using cosine transform
2.2.7 Encryption using fractional Mellin transform
3 Fully-phase image encryption
3.1 Introduction
4 Joint transform correlator-based schemes for security and authentication
4.1 Introduction
4.3 Authentication using fractional non-conventional JTC
4.3.2 Authentication with a phase-encoded image
5 Image watermarking and hiding
5.1 Introduction
5.2 Information hiding and watermarking under the DRPE framework
5.3 Optical asymmetric watermarking
6 Polarization encoding
6.1 Introduction
6.2 Double random phase polarization encoding
6.3 Polarization encoding-based asymmetric cryptosystem
7 Digital holography-based security schemes
7.1 Introduction
7.2 Phase-shifting interferometry
7.3 Numerical reconstruction of digital holograms
7.3.1 Discrete Fresnel transformation
7.4 Information security using digital holography
7.5 Digital holography-based geometries for image encryption
7.5.1 Fourier domain DRPE through digital holography
7.5.2 FRT domain DRPE through digital holography
8 Securing fused multispectral data
8.1 Introduction
8.2 Image fusion principle using wavelet transform
8.3 Security of fused data/images
8.4 Asymmetric cryptosystems with fused color components
8.5 Color image encryption using XOR operation with LED
9 Chaos-based information security
9.1 Introduction
9.4 Chaos-based optical asymmetric cryptosystem
10 Optical asymmetric cryptosystems
10.1 Introduction
10.3.1 Phase retrieval for security
10.3.2 Phase retrieval: mathematical formulation
10.3.3 Modified GS algorithm for image multiplexing and encryption
10.5 PCI and phase-truncated FrT-based asymmetric encryption
MATLAB code for phase retrieval
11 Attacks on optical security schemes
11.1 Introduction
11.10 Effects of additive and multiplicative noise
12 Optical security keys/masks
12.1 Introduction