Скачать книгу

ction>

      

      Optical Cryptosystems

       Naveen K Nishchal

       Department of Physics, Indian Institute of Technology Patna, Patna, Bihar, India

      IOP Publishing, Bristol, UK

      © IOP Publishing Ltd 2020

      All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior permission of the publisher, or as expressly permitted by law or under terms agreed with the appropriate rights organization. Multiple copying is permitted in accordance with the terms of licences issued by the Copyright Licensing Agency, the Copyright Clearance Centre and other reproduction rights organizations.

      Permission to make use of IOP Publishing content other than as set out above may be sought at [email protected].

      Naveen K Nishchal has asserted his right to be identified as the author of this work in accordance with sections 77 and 78 of the Copyright, Designs and Patents Act 1988.

      ISBN 978-0-7503-2220-1 (ebook)

      ISBN 978-0-7503-2218-8 (print)

      ISBN 978-0-7503-2221-8 (myPrint)

      ISBN 978-0-7503-2219-5 (mobi)

      DOI 10.1088/978-0-7503-2220-1

      Version: 20191201

      IOP ebooks

      British Library Cataloguing-in-Publication Data A catalogue record for this book is available from the British Library.

      Published by IOP Publishing, wholly owned by The Institute of Physics, London

      IOP Publishing, Temple Circus, Temple Way, Bristol, BS1 6HG, UK

      US Office: IOP Publishing, Inc., 190 North Independence Mall West, Suite 601, Philadelphia, PA 19106, USA

       Dedicated to the memory of my parents Shrimati Kamini Devi and Shri Balram Prasad Singh

      Contents

       Preface

       Acknowledgement

       Author biography

       List of acronyms

       1 Digital techniques of data and image encryption

       1.1 Introduction

       1.2 Types of cryptography

       1.2.1 Symmetric key cryptography

       1.2.2 Asymmetric key cryptography

       1.2.3 Hash functions

       References

       2 Optical techniques of image encryption: symmetric cryptosystems

       2.1 Introduction

       2.2 Encryption using linear canonical transforms

       2.2.1 Double random phase encoding

       2.2.2 Encryption using fractional Fourier transform

       2.2.3 Encryption using Fresnel transform

       2.2.4 Encryption using gyrator transform

       2.2.5 Encryption using wavelet transform

       2.2.6 Encryption using cosine transform

       2.2.7 Encryption using fractional Mellin transform

       MATLAB codes

       References

       3 Fully-phase image encryption

       3.1 Introduction

       3.2 Phase imaging

       3.3 Fully-phase encryption

       References

       4 Joint transform correlator-based schemes for security and authentication

       4.1 Introduction

       4.2 DRPE using JTC

       4.3 Authentication using fractional non-conventional JTC

       4.3.1 Authentication

       4.3.2 Authentication with a phase-encoded image

       4.3.3 Performance measurement

       MATLAB code

       References

       5 Image watermarking and hiding

       5.1 Introduction

       5.2 Information hiding and watermarking under the DRPE framework

       5.2.1 FRT domain watermarking

       5.3 Optical asymmetric watermarking

       References

       6 Polarization encoding

       6.1 Introduction

       6.2 Double random phase polarization encoding

       6.3 Polarization encoding-based asymmetric cryptosystem

       6.3.1

Скачать книгу