Optical cryptosystems. ([2020])
- Record Type:
- Book
- Title:
- Optical cryptosystems. ([2020])
- Main Title:
- Optical cryptosystems
- Further Information:
- Note: Naveen K. Nishchal.
- Authors:
- Nishchal, Naveen K
- Other Names:
- Institute of Physics (Great Britain), publisher.
- Contents:
- 1. Digital techniques of data and image encryption -- 1.1. Introduction -- 1.2. Types of cryptography 2. Optical techniques of image encryption : symmetric cryptosystems -- 2.1. Introduction -- 2.2. Encryption using linear canonical transforms 3. Fully-phase image encryption -- 3.1. Introduction -- 3.2. Phase imaging -- 3.3. Fully-phase encryption 4. Joint transform correlator-based schemes for security and authentication -- 4.1. Introduction -- 4.2. DRPE using JTC -- 4.3. Authentication using fractional non-conventional JTC 5. Image watermarking and hiding -- 5.1. Introduction -- 5.2. Information hiding and watermarking under the DRPE framework -- 5.3. Optical asymmetric watermarking 6. Polarization encoding -- 6.1. Introduction -- 6.2. Double random phase polarization encoding -- 6.3. Polarization encoding-based asymmetric cryptosystem 7. Digital holography-based security schemes -- 7.1. Introduction -- 7.2. Phase-shifting interferometry -- 7.3. Numerical reconstruction of digital holograms -- 7.4. Information security using digital holography -- 7.5. Digital holography-based geometries for image encryption 8. Securing fused multispectral data -- 8.1. Introduction -- 8.2. Image fusion principle using wavelet transform -- 8.3. Security of fused data/images -- 8.4. Asymmetric cryptosystems with fused color components -- 8.5. Color image encryption using XOR operation with LED 9. Chaos-based information security -- 9.1. Introduction -- 9.2. Chaos and cryptography -- 9.3.1. Digital techniques of data and image encryption -- 1.1. Introduction -- 1.2. Types of cryptography 2. Optical techniques of image encryption : symmetric cryptosystems -- 2.1. Introduction -- 2.2. Encryption using linear canonical transforms 3. Fully-phase image encryption -- 3.1. Introduction -- 3.2. Phase imaging -- 3.3. Fully-phase encryption 4. Joint transform correlator-based schemes for security and authentication -- 4.1. Introduction -- 4.2. DRPE using JTC -- 4.3. Authentication using fractional non-conventional JTC 5. Image watermarking and hiding -- 5.1. Introduction -- 5.2. Information hiding and watermarking under the DRPE framework -- 5.3. Optical asymmetric watermarking 6. Polarization encoding -- 6.1. Introduction -- 6.2. Double random phase polarization encoding -- 6.3. Polarization encoding-based asymmetric cryptosystem 7. Digital holography-based security schemes -- 7.1. Introduction -- 7.2. Phase-shifting interferometry -- 7.3. Numerical reconstruction of digital holograms -- 7.4. Information security using digital holography -- 7.5. Digital holography-based geometries for image encryption 8. Securing fused multispectral data -- 8.1. Introduction -- 8.2. Image fusion principle using wavelet transform -- 8.3. Security of fused data/images -- 8.4. Asymmetric cryptosystems with fused color components -- 8.5. Color image encryption using XOR operation with LED 9. Chaos-based information security -- 9.1. Introduction -- 9.2. Chaos and cryptography -- 9.3. Chaos functions -- 9.4. Chaos-based optical asymmetric cryptosystem 10. Optical asymmetric cryptosystems -- 10.1. Introduction -- 10.2. Asymmetric cryptosystems -- 10.3. Phase retrieval -- 10.4. Photon counting imaging -- 10.5. PCI and phase-truncated FrT-based asymmetric encryption 11. Attacks on optical security schemes -- 11.1. Introduction -- 11.2. Brute-force attack -- 11.3. Differential attack -- 11.4. Known-plaintext attack -- 11.5. Chosen-plaintext attack -- 11.6. Chosen-ciphertext attack -- 11.7. Specific attack -- 11.8. Collision attack -- 11.9. Occlusion attack -- 11.10. Effects of additive and multiplicative noise 12. Optical security keys/masks -- 12.1. Introduction -- 12.2. Literature review -- 12.3. Random phase mask -- 12.4. Structured phase mask. … (more)
- Publisher Details:
- Bristol [England] (Temple Circus, Temple Way, Bristol BS1 6HG, UK) : IOP Publishing
- Publication Date:
- 2020
- Extent:
- 1 online resource, illustrations (some color)
- Subjects:
- 005.8
Optical data processing
Information storage and retrieval systems -- Security measures
Cryptography
Applied optics
TECHNOLOGY & ENGINEERING / Optics
Cryptography
Information storage and retrieval systems -- Security measures
Optical data processing
Electronic books - Languages:
- English
- ISBNs:
- 9780750322201
0750322209
9780750322195
0750322195 - Related ISBNs:
- 9780750322188
0750322187
9780750322218
0750322217 - Notes:
- Note: Includes bibliographical references.
Note: Title from PDF title page (viewed on January 6, 2020). - Access Rights:
- Legal Deposit; Only available on premises controlled by the deposit library and to one user at any one time; The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
- Access Usage:
- Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
- View Content:
- Available online (eLD content is only available in our Reading Rooms) ↗
- Physical Locations:
- British Library HMNTS - ELD.DS.515244
- Ingest File:
- 03_098.xml