Читать книгу Optical Cryptosystems - Naveen K. Nishchal - Страница 5

Contents

Оглавление

Preface

Acknowledgement

Author biography

List of acronyms

1 Digital techniques of data and image encryption

1.1 Introduction

1.2 Types of cryptography

1.2.1 Symmetric key cryptography

1.2.2 Asymmetric key cryptography

1.2.3 Hash functions

References

2 Optical techniques of image encryption: symmetric cryptosystems

2.1 Introduction

2.2 Encryption using linear canonical transforms

2.2.1 Double random phase encoding

2.2.2 Encryption using fractional Fourier transform

2.2.3 Encryption using Fresnel transform

2.2.4 Encryption using gyrator transform

2.2.5 Encryption using wavelet transform

2.2.6 Encryption using cosine transform

2.2.7 Encryption using fractional Mellin transform

MATLAB codes

References

3 Fully-phase image encryption

3.1 Introduction

3.2 Phase imaging

3.3 Fully-phase encryption

References

4 Joint transform correlator-based schemes for security and authentication

4.1 Introduction

4.2 DRPE using JTC

4.3 Authentication using fractional non-conventional JTC

4.3.1 Authentication

4.3.2 Authentication with a phase-encoded image

4.3.3 Performance measurement

MATLAB code

References

5 Image watermarking and hiding

5.1 Introduction

5.2 Information hiding and watermarking under the DRPE framework

5.2.1 FRT domain watermarking

5.3 Optical asymmetric watermarking

References

6 Polarization encoding

6.1 Introduction

6.2 Double random phase polarization encoding

6.3 Polarization encoding-based asymmetric cryptosystem

6.3.1 Color image encryption

References

7 Digital holography-based security schemes

7.1 Introduction

7.2 Phase-shifting interferometry

7.3 Numerical reconstruction of digital holograms

7.3.1 Discrete Fresnel transformation

7.3.2 Convolution approach

7.3.3 Angular spectrum method

7.4 Information security using digital holography

7.5 Digital holography-based geometries for image encryption

7.5.1 Fourier domain DRPE through digital holography

7.5.2 FRT domain DRPE through digital holography

References

8 Securing fused multispectral data

8.1 Introduction

8.2 Image fusion principle using wavelet transform

8.3 Security of fused data/images

8.4 Asymmetric cryptosystems with fused color components

8.5 Color image encryption using XOR operation with LED

References

9 Chaos-based information security

9.1 Introduction

9.2 Chaos and cryptography

9.3 Chaos functions

9.4 Chaos-based optical asymmetric cryptosystem

References

10 Optical asymmetric cryptosystems

10.1 Introduction

10.2 Asymmetric cryptosystems

10.3 Phase retrieval

10.3.1 Phase retrieval for security

10.3.2 Phase retrieval: mathematical formulation

10.3.3 Modified GS algorithm for image multiplexing and encryption

10.4 Photon counting imaging

10.5 PCI and phase-truncated FrT-based asymmetric encryption

MATLAB code for phase retrieval

References

11 Attacks on optical security schemes

11.1 Introduction

11.2 Brute-force attack

11.3 Differential attack

11.4 Known-plaintext attack

11.5 Chosen-plaintext attack

11.6 Chosen-ciphertext attack

11.7 Specific attack

11.8 Collision attack

11.9 Occlusion attack

11.10 Effects of additive and multiplicative noise

References

12 Optical security keys/masks

12.1 Introduction

12.2 Literature review

12.3 Random phase mask

12.4 Structured phase mask

References

Optical Cryptosystems

Подняться наверх