Advanced secure optical image processing for communications / Ayman Al Falou, editor.

Saved in:
Bibliographic Details
Online Access: Online Access
Other Authors: Al Falou, Ayman (Editor)
Format: eBook
Language:English
Published: Bristol [England] (Temple Circus, Temple Way, Bristol BS1 6HG, UK) : IOP Publishing, [2018]
Series:IOP (Series). Release 5.
IOP series in imaging engineering.
IOP expanding physics.
Subjects:
Table of Contents:
  • 1. Optical information security systems based on a gyrator wavelet transform
  • 1.1. Introduction
  • 1.2. Theory
  • 1.3. Applications of a gyrator wavelet transform
  • 1.4. Conclusion.
  • 2. Optical one-way hash function
  • part A. Introduction to the one-way hash function
  • A.1. One-way hash function--acquire the 'fingerprint' of a message
  • A.2. Message authentication code--a message coming from the right sender
  • part B. Construction of the optical one-way hash function
  • B.1. Optical OWHF based on phase-truncated Fourier transform
  • B.2. Optical OWHF based on two-beam interference.
  • 3. Cooperative MIMO and multi-hop relaying techniques for free-space optical communications : a survey
  • 3.1. Introduction
  • 3.2. Spatial diversity
  • 3.3. Multi-hop relaying systems
  • 3.4. Cooperative relaying systems
  • 3.5. Summary.
  • 4. Coded aperture correlation holography system for recording secured digital holograms of incoherently illuminated 3D scenes
  • 4.1. Introduction
  • 4.2. Coded aperture correlation holography for 3D encryption
  • 4.3. Noise reduction techniques for COACH
  • 4.4. Spectral encryption in COACH
  • 4.5. Referenceless 3D encryption in COACH
  • 4.6. Single shot 3D encryption using I-COACH
  • 4.7. Lensless and interferenceless COACH for 3D encryption
  • 4.8. Conclusion.
  • 5. Equal modulus decomposition based asymmetric optical cryptosystems
  • 5.1. Introduction
  • 5.2. Overview of a phase-truncated Fourier transform based cryptosystem
  • 5.3. Equal modulus decomposition
  • 5.4. Cryptanalysis
  • 5.5. Modifications in EMD-based optical cryptosystems
  • 5.6. Conclusion.
  • 6. Information security using fractional transforms
  • 6.1. Optical fractional transforms
  • 6.2. The discrete algorithm of fractional transforms
  • 6.3. Discrete random fractional transform
  • 6.4. Single gray-level image encryption
  • 6.5. Double image encryption
  • 6.6. Color image encryption
  • 6.7. Multi-image encryption
  • 6.8. Optical image hiding scheme and asymmetric encryption scheme
  • 6.9. Hyperspectral image encryption
  • 6.10. Other information techniques.
  • 7. Privacy protection by multimodal biometric encryption
  • 7.1. Why is encryption of information important?
  • 7.2. Motivation for biometrics and privacy protection
  • 7.3. The proposed cryptosystem
  • 7.4. Simulation results
  • 7.5. Conclusion.
  • 8. Nonlinear techniques for secure optical encryption and multifactor authentication
  • 8.1. Introduction : optical implementations of double-random phase encoding (DRPE)
  • 8.2. Nonlinear techniques for image retrieval (decryption) based on the JTC
  • 8.3. Nonlinear techniques for information authentication and compression.
  • 9. Enhanced single random phase holographic encryption of optical images
  • 9.1. Introduction
  • 9.2. The proposed enhanced single random phase encryption (ESRPE) method
  • 9.3. Experimental results
  • 9.4. Conclusion.
  • 10. Single-pixel optical information encoding and authentication
  • 10.1. Introduction
  • 10.2. Single-pixel optical encoding
  • 10.3. Single-pixel optical authentication
  • 10.4. Discussion
  • 10.5. Conclusions.
  • 11. Compressive optical image security
  • 11.1. Compressive sensing
  • 11.2. Compressive optical image security
  • 11.3. Compressive optical image encryption
  • 11.4. Compressive optical image hiding
  • 11.5. Compressive optical image encryption and hiding
  • 11.6. Prospects in compressive image security.
  • 12. Simultaneous encryption and arithmetic coding for performing image compression
  • 12.1. Introduction
  • 12.2. Prior work of video encryption methods
  • 12.3. Simultaneous encryption and video compression
  • 12.4. Joint compression and encryption (JCE)
  • 12.5. Compression and double encryption (CDE)
  • 12.6. Simulation results
  • 12.7. Security analysis
  • 12.8. Conclusion.
  • 13. A comparative study of CFs, LBP, HOG, SIFT, SURF, and BRIEF for security and face recognition
  • 13.1. Introduction
  • 13.2. Related work
  • 13.3. Methods implementation
  • 13.4. Results analysis
  • 13.5. Conclusion and future work.