Advanced secure optical image processing for communications / Ayman Al Falou, editor.
Saved in:
Online Access: |
Online Access |
---|---|
Other Authors: | |
Format: | eBook |
Language: | English |
Published: |
Bristol [England] (Temple Circus, Temple Way, Bristol BS1 6HG, UK) :
IOP Publishing,
[2018]
|
Series: | IOP (Series). Release 5.
IOP series in imaging engineering. IOP expanding physics. |
Subjects: |
Table of Contents:
- 1. Optical information security systems based on a gyrator wavelet transform
- 1.1. Introduction
- 1.2. Theory
- 1.3. Applications of a gyrator wavelet transform
- 1.4. Conclusion.
- 2. Optical one-way hash function
- part A. Introduction to the one-way hash function
- A.1. One-way hash function--acquire the 'fingerprint' of a message
- A.2. Message authentication code--a message coming from the right sender
- part B. Construction of the optical one-way hash function
- B.1. Optical OWHF based on phase-truncated Fourier transform
- B.2. Optical OWHF based on two-beam interference.
- 3. Cooperative MIMO and multi-hop relaying techniques for free-space optical communications : a survey
- 3.1. Introduction
- 3.2. Spatial diversity
- 3.3. Multi-hop relaying systems
- 3.4. Cooperative relaying systems
- 3.5. Summary.
- 4. Coded aperture correlation holography system for recording secured digital holograms of incoherently illuminated 3D scenes
- 4.1. Introduction
- 4.2. Coded aperture correlation holography for 3D encryption
- 4.3. Noise reduction techniques for COACH
- 4.4. Spectral encryption in COACH
- 4.5. Referenceless 3D encryption in COACH
- 4.6. Single shot 3D encryption using I-COACH
- 4.7. Lensless and interferenceless COACH for 3D encryption
- 4.8. Conclusion.
- 5. Equal modulus decomposition based asymmetric optical cryptosystems
- 5.1. Introduction
- 5.2. Overview of a phase-truncated Fourier transform based cryptosystem
- 5.3. Equal modulus decomposition
- 5.4. Cryptanalysis
- 5.5. Modifications in EMD-based optical cryptosystems
- 5.6. Conclusion.
- 6. Information security using fractional transforms
- 6.1. Optical fractional transforms
- 6.2. The discrete algorithm of fractional transforms
- 6.3. Discrete random fractional transform
- 6.4. Single gray-level image encryption
- 6.5. Double image encryption
- 6.6. Color image encryption
- 6.7. Multi-image encryption
- 6.8. Optical image hiding scheme and asymmetric encryption scheme
- 6.9. Hyperspectral image encryption
- 6.10. Other information techniques.
- 7. Privacy protection by multimodal biometric encryption
- 7.1. Why is encryption of information important?
- 7.2. Motivation for biometrics and privacy protection
- 7.3. The proposed cryptosystem
- 7.4. Simulation results
- 7.5. Conclusion.
- 8. Nonlinear techniques for secure optical encryption and multifactor authentication
- 8.1. Introduction : optical implementations of double-random phase encoding (DRPE)
- 8.2. Nonlinear techniques for image retrieval (decryption) based on the JTC
- 8.3. Nonlinear techniques for information authentication and compression.
- 9. Enhanced single random phase holographic encryption of optical images
- 9.1. Introduction
- 9.2. The proposed enhanced single random phase encryption (ESRPE) method
- 9.3. Experimental results
- 9.4. Conclusion.
- 10. Single-pixel optical information encoding and authentication
- 10.1. Introduction
- 10.2. Single-pixel optical encoding
- 10.3. Single-pixel optical authentication
- 10.4. Discussion
- 10.5. Conclusions.
- 11. Compressive optical image security
- 11.1. Compressive sensing
- 11.2. Compressive optical image security
- 11.3. Compressive optical image encryption
- 11.4. Compressive optical image hiding
- 11.5. Compressive optical image encryption and hiding
- 11.6. Prospects in compressive image security.
- 12. Simultaneous encryption and arithmetic coding for performing image compression
- 12.1. Introduction
- 12.2. Prior work of video encryption methods
- 12.3. Simultaneous encryption and video compression
- 12.4. Joint compression and encryption (JCE)
- 12.5. Compression and double encryption (CDE)
- 12.6. Simulation results
- 12.7. Security analysis
- 12.8. Conclusion.
- 13. A comparative study of CFs, LBP, HOG, SIFT, SURF, and BRIEF for security and face recognition
- 13.1. Introduction
- 13.2. Related work
- 13.3. Methods implementation
- 13.4. Results analysis
- 13.5. Conclusion and future work.