Cargando…

Optical cryptosystems /

Advanced technologies such as artificial intelligence, big data, cloud computing, and the Internet of Things have changed the digital landscape, providing many new and exciting opportunities. However, they also provide ever-shifting gateways for information theft or misuse. Staying ahead requires th...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Nishchal, Naveen K. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Bristol [England] (Temple Circus, Temple Way, Bristol BS1 6HG, UK) : IOP Publishing, [2020]
Colección:IOP ebooks. 2020 collection.
IOP series in advances in optics, photonics and optoelectronics.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000nam a2200000 4500
001 IOP_9780750322201
003 IOP
005 20200106101458.0
006 m eo d
007 cr cn |||m|||a
008 200106s2020 enka ob 000 0 eng d
020 |a 9780750322201  |q ebook 
020 |a 9780750322195  |q mobi 
020 |z 9780750322188  |q print 
020 |z 9780750322218  |q myPrint 
024 7 |a 10.1088/978-0-7503-2220-1  |2 doi 
035 |a (CaBNVSL)thg00979910 
035 |a (OCoLC)1135509559 
040 |a CaBNVSL  |b eng  |e rda  |c CaBNVSL  |d CaBNVSL 
050 4 |a TA1630  |b .N576 2020eb 
072 7 |a TTB  |2 bicssc 
072 7 |a TEC030000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
100 1 |a Nishchal, Naveen K.,  |e author. 
245 1 0 |a Optical cryptosystems /  |c Naveen K. Nishchal. 
264 1 |a Bristol [England] (Temple Circus, Temple Way, Bristol BS1 6HG, UK) :  |b IOP Publishing,  |c [2020] 
300 |a 1 online resource (various pagings) :  |b illustrations (some color). 
336 |a text  |2 rdacontent 
337 |a electronic  |2 isbdmedia 
338 |a online resource  |2 rdacarrier 
490 1 |a IOP ebooks. [2020 collection] 
490 1 |a IOP series in advances in optics, photonics and optoelectronics 
500 |a "Version: 20191201"--Title page verso. 
504 |a Includes bibliographical references. 
505 0 |a 1. Digital techniques of data and image encryption -- 1.1. Introduction -- 1.2. Types of cryptography 
505 8 |a 2. Optical techniques of image encryption : symmetric cryptosystems -- 2.1. Introduction -- 2.2. Encryption using linear canonical transforms 
505 8 |a 3. Fully-phase image encryption -- 3.1. Introduction -- 3.2. Phase imaging -- 3.3. Fully-phase encryption 
505 8 |a 4. Joint transform correlator-based schemes for security and authentication -- 4.1. Introduction -- 4.2. DRPE using JTC -- 4.3. Authentication using fractional non-conventional JTC 
505 8 |a 5. Image watermarking and hiding -- 5.1. Introduction -- 5.2. Information hiding and watermarking under the DRPE framework -- 5.3. Optical asymmetric watermarking 
505 8 |a 6. Polarization encoding -- 6.1. Introduction -- 6.2. Double random phase polarization encoding -- 6.3. Polarization encoding-based asymmetric cryptosystem 
505 8 |a 7. Digital holography-based security schemes -- 7.1. Introduction -- 7.2. Phase-shifting interferometry -- 7.3. Numerical reconstruction of digital holograms -- 7.4. Information security using digital holography -- 7.5. Digital holography-based geometries for image encryption 
505 8 |a 8. Securing fused multispectral data -- 8.1. Introduction -- 8.2. Image fusion principle using wavelet transform -- 8.3. Security of fused data/images -- 8.4. Asymmetric cryptosystems with fused color components -- 8.5. Color image encryption using XOR operation with LED 
505 8 |a 9. Chaos-based information security -- 9.1. Introduction -- 9.2. Chaos and cryptography -- 9.3. Chaos functions -- 9.4. Chaos-based optical asymmetric cryptosystem 
505 8 |a 10. Optical asymmetric cryptosystems -- 10.1. Introduction -- 10.2. Asymmetric cryptosystems -- 10.3. Phase retrieval -- 10.4. Photon counting imaging -- 10.5. PCI and phase-truncated FrT-based asymmetric encryption 
505 8 |a 11. Attacks on optical security schemes -- 11.1. Introduction -- 11.2. Brute-force attack -- 11.3. Differential attack -- 11.4. Known-plaintext attack -- 11.5. Chosen-plaintext attack -- 11.6. Chosen-ciphertext attack -- 11.7. Specific attack -- 11.8. Collision attack -- 11.9. Occlusion attack -- 11.10. Effects of additive and multiplicative noise 
505 8 |a 12. Optical security keys/masks -- 12.1. Introduction -- 12.2. Literature review -- 12.3. Random phase mask -- 12.4. Structured phase mask. 
520 3 |a Advanced technologies such as artificial intelligence, big data, cloud computing, and the Internet of Things have changed the digital landscape, providing many new and exciting opportunities. However, they also provide ever-shifting gateways for information theft or misuse. Staying ahead requires the development of innovative and responsive security measures, and recent advances in optical technology have positioned it as a promising alternative to digital cryptography. Optical Cryptosystems introduces the subject of optical cryptography and provides up-to-date coverage of optical security schemes. Optical principles, approaches, and algorithms are discussed as well as applications, including image/data encryption-decryption, watermarking, image/data hiding, and authentication verification. This book also includes MATLAB[reg] codes, enabling students and research professionals to carry out exercises and develop newer methods of image/data security and authentication. 
521 |a Postgraduate students, researchers, and educators in the area of information security and optical cryptography. 
530 |a Also available in print. 
538 |a Mode of access: World Wide Web. 
538 |a System requirements: Adobe Acrobat Reader, EPUB reader, or Kindle reader. 
545 |a Dr Naveen Kumar Nishchal is currently an associate professor in the Department of Physics at the Indian Institute of Technology (IIT) Patna. He joined IIT Patna in December 2008. Dr Nishchal received his PhD degree in physics from IIT Delhi in 2005. His research interests include optical information processing, image encryption, watermarking, digital holography, interferometry, correlation based optical pattern recognition, and fractional Fourier transform-based signal processing. He is a senior member of OSA, SPIE and life fellow of Optical Society of India. He is a life member of Indian Science Congress Association and Lasers and Spectroscopy Society of India. He has authored or co-authored 60 peer-reviewed international journal papers, two book chapters, and 150 papers in various conferences/seminars/symposia. 
588 0 |a Title from PDF title page (viewed on January 6, 2020). 
650 0 |a Optical data processing. 
650 0 |a Information storage and retrieval systems  |x Security measures. 
650 0 |a Cryptography. 
650 7 |a Applied optics.  |2 bicssc 
650 7 |a TECHNOLOGY & ENGINEERING / Optics.  |2 bisacsh 
710 2 |a Institute of Physics (Great Britain),  |e publisher. 
776 0 8 |i Print version:  |z 9780750322188  |z 9780750322218 
830 0 |a IOP ebooks.  |p 2020 collection. 
830 0 |a IOP series in advances in optics, photonics and optoelectronics. 
856 4 0 |u https://iopscience.uam.elogim.com/book/978-0-7503-2220-1  |z Texto completo