Advanced secure optical image processing for communications /
New image processing tools and data-processing network systems have considerably increased the volume of transmitted information such as 2D and 3D images with high resolution. Thus, more complex networks and long processing times become necessary, and high image quality and transmission speeds are r...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Bristol [England] (Temple Circus, Temple Way, Bristol BS1 6HG, UK) :
IOP Publishing,
[2018]
|
Colección: | IOP (Series). Release 5.
IOP series in imaging engineering. IOP expanding physics. |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- 1. Optical information security systems based on a gyrator wavelet transform
- 1.1. Introduction
- 1.2. Theory
- 1.3. Applications of a gyrator wavelet transform
- 1.4. Conclusion
- 2. Optical one-way hash function
- part A. Introduction to the one-way hash function
- A.1. One-way hash function--acquire the 'fingerprint' of a message
- A.2. Message authentication code--a message coming from the right sender
- part B. Construction of the optical one-way hash function
- B.1. Optical OWHF based on phase-truncated Fourier transform
- B.2. Optical OWHF based on two-beam interference
- 3. Cooperative MIMO and multi-hop relaying techniques for free-space optical communications : a survey
- 3.1. Introduction
- 3.2. Spatial diversity
- 3.3. Multi-hop relaying systems
- 3.4. Cooperative relaying systems
- 3.5. Summary
- 4. Coded aperture correlation holography system for recording secured digital holograms of incoherently illuminated 3D scenes
- 4.1. Introduction
- 4.2. Coded aperture correlation holography for 3D encryption
- 4.3. Noise reduction techniques for COACH
- 4.4. Spectral encryption in COACH
- 4.5. Referenceless 3D encryption in COACH
- 4.6. Single shot 3D encryption using I-COACH
- 4.7. Lensless and interferenceless COACH for 3D encryption
- 4.8. Conclusion
- 5. Equal modulus decomposition based asymmetric optical cryptosystems
- 5.1. Introduction
- 5.2. Overview of a phase-truncated Fourier transform based cryptosystem
- 5.3. Equal modulus decomposition
- 5.4. Cryptanalysis
- 5.5. Modifications in EMD-based optical cryptosystems
- 5.6. Conclusion
- 6. Information security using fractional transforms
- 6.1. Optical fractional transforms
- 6.2. The discrete algorithm of fractional transforms
- 6.3. Discrete random fractional transform
- 6.4. Single gray-level image encryption
- 6.5. Double image encryption
- 6.6. Color image encryption
- 6.7. Multi-image encryption
- 6.8. Optical image hiding scheme and asymmetric encryption scheme
- 6.9. Hyperspectral image encryption
- 6.10. Other information techniques
- 7. Privacy protection by multimodal biometric encryption
- 7.1. Why is encryption of information important?
- 7.2. Motivation for biometrics and privacy protection
- 7.3. The proposed cryptosystem
- 7.4. Simulation results
- 7.5. Conclusion
- 8. Nonlinear techniques for secure optical encryption and multifactor authentication
- 8.1. Introduction : optical implementations of double-random phase encoding (DRPE)
- 8.2. Nonlinear techniques for image retrieval (decryption) based on the JTC
- 8.3. Nonlinear techniques for information authentication and compression
- 9. Enhanced single random phase holographic encryption of optical images
- 9.1. Introduction
- 9.2. The proposed enhanced single random phase encryption (ESRPE) method
- 9.3. Experimental results
- 9.4. Conclusion
- 10. Single-pixel optical information encoding and authentication
- 10.1. Introduction
- 10.2. Single-pixel optical encoding
- 10.3. Single-pixel optical authentication
- 10.4. Discussion
- 10.5. Conclusions
- 11. Compressive optical image security
- 11.1. Compressive sensing
- 11.2. Compressive optical image security
- 11.3. Compressive optical image encryption
- 11.4. Compressive optical image hiding
- 11.5. Compressive optical image encryption and hiding
- 11.6. Prospects in compressive image security
- 12. Simultaneous encryption and arithmetic coding for performing image compression
- 12.1. Introduction
- 12.2. Prior work of video encryption methods
- 12.3. Simultaneous encryption and video compression
- 12.4. Joint compression and encryption (JCE)
- 12.5. Compression and double encryption (CDE)
- 12.6. Simulation results
- 12.7. Security analysis
- 12.8. Conclusion
- 13. A comparative study of CFs, LBP, HOG, SIFT, SURF, and BRIEF for security and face recognition
- 13.1. Introduction
- 13.2. Related work
- 13.3. Methods implementation
- 13.4. Results analysis
- 13.5. Conclusion and future work.