Cargando…

Optical cryptosystems /

Advanced technologies such as artificial intelligence, big data, cloud computing, and the Internet of Things have changed the digital landscape, providing many new and exciting opportunities. However, they also provide ever-shifting gateways for information theft or misuse. Staying ahead requires th...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Nishchal, Naveen K. (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Bristol [England] (Temple Circus, Temple Way, Bristol BS1 6HG, UK) : IOP Publishing, [2020]
Colección:IOP ebooks. 2020 collection.
IOP series in advances in optics, photonics and optoelectronics.
Temas:
Acceso en línea:Texto completo
Tabla de Contenidos:
  • 1. Digital techniques of data and image encryption
  • 1.1. Introduction
  • 1.2. Types of cryptography
  • 2. Optical techniques of image encryption : symmetric cryptosystems
  • 2.1. Introduction
  • 2.2. Encryption using linear canonical transforms
  • 3. Fully-phase image encryption
  • 3.1. Introduction
  • 3.2. Phase imaging
  • 3.3. Fully-phase encryption
  • 4. Joint transform correlator-based schemes for security and authentication
  • 4.1. Introduction
  • 4.2. DRPE using JTC
  • 4.3. Authentication using fractional non-conventional JTC
  • 5. Image watermarking and hiding
  • 5.1. Introduction
  • 5.2. Information hiding and watermarking under the DRPE framework
  • 5.3. Optical asymmetric watermarking
  • 6. Polarization encoding
  • 6.1. Introduction
  • 6.2. Double random phase polarization encoding
  • 6.3. Polarization encoding-based asymmetric cryptosystem
  • 7. Digital holography-based security schemes
  • 7.1. Introduction
  • 7.2. Phase-shifting interferometry
  • 7.3. Numerical reconstruction of digital holograms
  • 7.4. Information security using digital holography
  • 7.5. Digital holography-based geometries for image encryption
  • 8. Securing fused multispectral data
  • 8.1. Introduction
  • 8.2. Image fusion principle using wavelet transform
  • 8.3. Security of fused data/images
  • 8.4. Asymmetric cryptosystems with fused color components
  • 8.5. Color image encryption using XOR operation with LED
  • 9. Chaos-based information security
  • 9.1. Introduction
  • 9.2. Chaos and cryptography
  • 9.3. Chaos functions
  • 9.4. Chaos-based optical asymmetric cryptosystem
  • 10. Optical asymmetric cryptosystems
  • 10.1. Introduction
  • 10.2. Asymmetric cryptosystems
  • 10.3. Phase retrieval
  • 10.4. Photon counting imaging
  • 10.5. PCI and phase-truncated FrT-based asymmetric encryption
  • 11. Attacks on optical security schemes
  • 11.1. Introduction
  • 11.2. Brute-force attack
  • 11.3. Differential attack
  • 11.4. Known-plaintext attack
  • 11.5. Chosen-plaintext attack
  • 11.6. Chosen-ciphertext attack
  • 11.7. Specific attack
  • 11.8. Collision attack
  • 11.9. Occlusion attack
  • 11.10. Effects of additive and multiplicative noise
  • 12. Optical security keys/masks
  • 12.1. Introduction
  • 12.2. Literature review
  • 12.3. Random phase mask
  • 12.4. Structured phase mask.