Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
Keywords
Access
  • 1
    Online Resource
    Online Resource
    Bristol, UK : IOP Publishing
    UID:
    gbv_1687534276
    Format: 1 Online-Ressource (verschiedene Seitenzählungen) , Illustrationen, Diagramme
    Edition: Version: 20191201
    ISBN: 9780750322201 , 9780750322195
    Series Statement: IOP Series in Advances in Optics, Photonics and Optoelectronics
    Content: Advanced technologies such as artificial intelligence, big data, cloud computing, and the Internet of Things have changed the digital landscape, providing many new and exciting opportunities. However, they also provide ever-shifting gateways for information theft or misuse. Staying ahead requires the development of innovative and responsive security measures, and recent advances in optical technology have positioned it as a promising alternative to digital cryptography. Optical Cryptosystems introduces the subject of optical cryptography and provides up-to-date coverage of optical security schemes. Optical principles, approaches, and algorithms are discussed as well as applications, including image/data encryption-decryption, watermarking, image/data hiding, and authentication verification. This book also includes MATLAB[reg] codes, enabling students and research professionals to carry out exercises and develop newer methods of image/data security and authentication.
    Additional Edition: ISBN 9780750322188
    Additional Edition: ISBN 9780750322218
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9780750322188
    Language: English
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Bristol :Institute of Physics Publishing,
    UID:
    almahu_9949880899002882
    Format: 1 online resource (180 pages)
    Edition: 1st ed.
    ISBN: 9780750322201
    Series Statement: IOP Series in Advances in Optics, Photonics and Optoelectronics Series
    Content: Optical Cryptosystems introduces the subject of optical cryptography and provides up-to-date coverage of optical security schemes. Optical principles, approaches, and algorithms are discussed as well as applications, including image/data encryption-decryption, watermarking, image/data hiding, and authentication verification.
    Note: Intro -- Preface -- Acknowledgement -- Author biography -- Naveen Kumar Nishchal -- List of acronyms -- Chapter 1 Digital techniques of data and image encryption -- 1.1 Introduction -- 1.2 Types of cryptography -- 1.2.1 Symmetric key cryptography -- 1.2.2 Asymmetric key cryptography -- 1.2.3 Hash functions -- References -- Chapter 2 Optical techniques of image encryption: symmetric cryptosystems -- 2.1 Introduction -- 2.2 Encryption using linear canonical transforms -- 2.2.1 Double random phase encoding -- 2.2.2 Encryption using fractional Fourier transform -- 2.2.3 Encryption using Fresnel transform -- 2.2.4 Encryption using gyrator transform -- 2.2.5 Encryption using wavelet transform -- 2.2.6 Encryption using cosine transform -- 2.2.7 Encryption using fractional Mellin transform -- MATLAB codes -- References -- Chapter 3 Fully-phase image encryption -- 3.1 Introduction -- 3.2 Phase imaging -- 3.3 Fully-phase encryption -- References -- Chapter 4 Joint transform correlator-based schemes for security and authentication -- 4.1 Introduction -- 4.2 DRPE using JTC -- 4.3 Authentication using fractional non-conventional JTC -- 4.3.1 Authentication -- 4.3.2 Authentication with a phase-encoded image -- 4.3.3 Performance measurement -- MATLAB code -- References -- Chapter 5 Image watermarking and hiding -- 5.1 Introduction -- 5.2 Information hiding and watermarking under the DRPE framework -- 5.2.1 FRT domain watermarking -- 5.3 Optical asymmetric watermarking -- References -- Chapter 6 Polarization encoding -- 6.1 Introduction -- 6.2 Double random phase polarization encoding -- 6.3 Polarization encoding-based asymmetric cryptosystem -- 6.3.1 Color image encryption -- References -- Chapter 7 Digital holography-based security schemes -- 7.1 Introduction -- 7.2 Phase-shifting interferometry -- 7.3 Numerical reconstruction of digital holograms. , 7.3.1 Discrete Fresnel transformation -- 7.3.2 Convolution approach -- 7.3.3 Angular spectrum method -- 7.4 Information security using digital holography -- 7.5 Digital holography-based geometries for image encryption -- 7.5.1 Fourier domain DRPE through digital holography -- 7.5.2 FRT domain DRPE through digital holography -- References -- Chapter 8 Securing fused multispectral data -- 8.1 Introduction -- 8.2 Image fusion principle using wavelet transform -- 8.3 Security of fused data/images -- 8.4 Asymmetric cryptosystems with fused color components -- 8.5 Color image encryption using XOR operation with LED -- References -- Chapter 9 Chaos-based information security -- 9.1 Introduction -- 9.2 Chaos and cryptography -- 9.3 Chaos functions -- 9.4 Chaos-based optical asymmetric cryptosystem -- References -- Chapter 10 Optical asymmetric cryptosystems -- 10.1 Introduction -- 10.2 Asymmetric cryptosystems -- 10.3 Phase retrieval -- 10.3.1 Phase retrieval for security -- 10.3.2 Phase retrieval: mathematical formulation -- 10.3.3 Modified GS algorithm for image multiplexing and encryption -- 10.4 Photon counting imaging -- 10.5 PCI and phase-truncated FrT-based asymmetric encryption -- MATLAB code for phase retrieval -- References -- Chapter 11 Attacks on optical security schemes -- 11.1 Introduction -- 11.2 Brute-force attack -- 11.3 Differential attack -- 11.4 Known-plaintext attack -- 11.5 Chosen-plaintext attack -- 11.6 Chosen-ciphertext attack -- 11.7 Specific attack -- 11.8 Collision attack -- 11.9 Occlusion attack -- 11.10 Effects of additive and multiplicative noise -- References -- Chapter 12 Optical security keys/masks -- 12.1 Introduction -- 12.2 Literature review -- 12.3 Random phase mask -- 12.4 Structured phase mask -- References.
    Additional Edition: Print version: Nishchal, Naveen K. Optical Cryptosystems Bristol : Institute of Physics Publishing,c2020 ISBN 9780750322218
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Bristol [England] (Temple Circus, Temple Way, Bristol BS1 6HG, UK) :IOP Publishing,
    UID:
    almahu_9948342718502882
    Format: 1 online resource (various pagings) : , illustrations (some color).
    ISBN: 9780750322201 , 9780750322195
    Series Statement: IOP ebooks. [2020 collection]
    Content: Advanced technologies such as artificial intelligence, big data, cloud computing, and the Internet of Things have changed the digital landscape, providing many new and exciting opportunities. However, they also provide ever-shifting gateways for information theft or misuse. Staying ahead requires the development of innovative and responsive security measures, and recent advances in optical technology have positioned it as a promising alternative to digital cryptography. Optical Cryptosystems introduces the subject of optical cryptography and provides up-to-date coverage of optical security schemes. Optical principles, approaches, and algorithms are discussed as well as applications, including image/data encryption-decryption, watermarking, image/data hiding, and authentication verification. This book also includes MATLAB[reg] codes, enabling students and research professionals to carry out exercises and develop newer methods of image/data security and authentication.
    Note: "Version: 20191201"--Title page verso. , 1. Digital techniques of data and image encryption -- 1.1. Introduction -- 1.2. Types of cryptography , 2. Optical techniques of image encryption : symmetric cryptosystems -- 2.1. Introduction -- 2.2. Encryption using linear canonical transforms , 3. Fully-phase image encryption -- 3.1. Introduction -- 3.2. Phase imaging -- 3.3. Fully-phase encryption , 4. Joint transform correlator-based schemes for security and authentication -- 4.1. Introduction -- 4.2. DRPE using JTC -- 4.3. Authentication using fractional non-conventional JTC , 5. Image watermarking and hiding -- 5.1. Introduction -- 5.2. Information hiding and watermarking under the DRPE framework -- 5.3. Optical asymmetric watermarking , 6. Polarization encoding -- 6.1. Introduction -- 6.2. Double random phase polarization encoding -- 6.3. Polarization encoding-based asymmetric cryptosystem , 7. Digital holography-based security schemes -- 7.1. Introduction -- 7.2. Phase-shifting interferometry -- 7.3. Numerical reconstruction of digital holograms -- 7.4. Information security using digital holography -- 7.5. Digital holography-based geometries for image encryption , 8. Securing fused multispectral data -- 8.1. Introduction -- 8.2. Image fusion principle using wavelet transform -- 8.3. Security of fused data/images -- 8.4. Asymmetric cryptosystems with fused color components -- 8.5. Color image encryption using XOR operation with LED , 9. Chaos-based information security -- 9.1. Introduction -- 9.2. Chaos and cryptography -- 9.3. Chaos functions -- 9.4. Chaos-based optical asymmetric cryptosystem , 10. Optical asymmetric cryptosystems -- 10.1. Introduction -- 10.2. Asymmetric cryptosystems -- 10.3. Phase retrieval -- 10.4. Photon counting imaging -- 10.5. PCI and phase-truncated FrT-based asymmetric encryption , 11. Attacks on optical security schemes -- 11.1. Introduction -- 11.2. Brute-force attack -- 11.3. Differential attack -- 11.4. Known-plaintext attack -- 11.5. Chosen-plaintext attack -- 11.6. Chosen-ciphertext attack -- 11.7. Specific attack -- 11.8. Collision attack -- 11.9. Occlusion attack -- 11.10. Effects of additive and multiplicative noise , 12. Optical security keys/masks -- 12.1. Introduction -- 12.2. Literature review -- 12.3. Random phase mask -- 12.4. Structured phase mask. , Also available in print. , Mode of access: World Wide Web. , System requirements: Adobe Acrobat Reader, EPUB reader, or Kindle reader.
    Additional Edition: Print version: ISBN 9780750322188
    Additional Edition: ISBN 9780750322218
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9780750320801?
Did you mean 9780750321501?
Did you mean 9780750322218?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages