Optical Cryptosystems. Naveen K. NishchalЧитать онлайн книгу.
ction>
Optical Cryptosystems
Naveen K Nishchal
Department of Physics, Indian Institute of Technology Patna, Patna, Bihar, India
IOP Publishing, Bristol, UK
© IOP Publishing Ltd 2020
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the publisher, or as expressly permitted by law or under terms agreed with the appropriate rights organization. Multiple copying is permitted in accordance with the terms of licences issued by the Copyright Licensing Agency, the Copyright Clearance Centre and other reproduction rights organizations.
Permission to make use of IOP Publishing content other than as set out above may be sought at [email protected].
Naveen K Nishchal has asserted his right to be identified as the author of this work in accordance with sections 77 and 78 of the Copyright, Designs and Patents Act 1988.
ISBN 978-0-7503-2220-1 (ebook)
ISBN 978-0-7503-2218-8 (print)
ISBN 978-0-7503-2221-8 (myPrint)
ISBN 978-0-7503-2219-5 (mobi)
DOI 10.1088/978-0-7503-2220-1
Version: 20191201
IOP ebooks
British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library.
Published by IOP Publishing, wholly owned by The Institute of Physics, London
IOP Publishing, Temple Circus, Temple Way, Bristol, BS1 6HG, UK
US Office: IOP Publishing, Inc., 190 North Independence Mall West, Suite 601, Philadelphia, PA 19106, USA
Dedicated to the memory of my parents Shrimati Kamini Devi and Shri Balram Prasad Singh
Contents
1 Digital techniques of data and image encryption
1.1 Introduction
1.2.1 Symmetric key cryptography
1.2.2 Asymmetric key cryptography
2 Optical techniques of image encryption: symmetric cryptosystems
2.1 Introduction
2.2 Encryption using linear canonical transforms
2.2.1 Double random phase encoding
2.2.2 Encryption using fractional Fourier transform
2.2.3 Encryption using Fresnel transform
2.2.4 Encryption using gyrator transform
2.2.5 Encryption using wavelet transform
2.2.6 Encryption using cosine transform
2.2.7 Encryption using fractional Mellin transform
3 Fully-phase image encryption
3.1 Introduction
4 Joint transform correlator-based schemes for security and authentication
4.1 Introduction
4.3 Authentication using fractional non-conventional JTC
4.3.2 Authentication with a phase-encoded image
5 Image watermarking and hiding
5.1 Introduction
5.2 Information hiding and watermarking under the DRPE framework
5.3 Optical asymmetric watermarking
6 Polarization encoding
6.1 Introduction
6.2 Double random phase polarization encoding