Startsida
Hjälp
Sök i LIBRIS databas

     

 

Sökning: onr:s2tzhg6pqkcf3dtf > Advanced Secure Opt...

Advanced Secure Optical Image Processing for Communications / Ayman Al Falou, editor.

Al Falou, Ayman (redaktör/utgivare)
ISBN 9780750314572
Publicerad: Bristol : IOP Publishing, 2018
Engelska online resource (xxii, 39, 20, 19, 19, 15, 32, 8, 33, 12, 23, 24, 24, 22 sidor)
Serie: IOP Expanding Physics, 2053-2563
  • E-bok
Innehållsförteckning Sammanfattning Ämnesord
Stäng  
  • 1. Optical information security systems based on a gyrator wavelet transform -- 1.1. Introduction -- 1.2. Theory -- 1.3. Applications of a gyrator wavelet transform -- 1.4. Conclusion -- 2. Optical one-way hash function -- part A. Introduction to the one-way hash function -- A.1. One-way hash function--acquire the 'fingerprint' of a message -- A.2. Message authentication code--a message coming from the right sender -- part B. Construction of the optical one-way hash function -- B.1. Optical OWHF based on phase-truncated Fourier transform -- B.2. Optical OWHF based on two-beam interference -- 3. Cooperative MIMO and multi-hop relaying techniques for free-space optical communications : a survey -- 3.1. Introduction -- 3.2. Spatial diversity -- 3.3. Multi-hop relaying systems -- 3.4. Cooperative relaying systems -- 3.5. Summary -- 4. Coded aperture correlation holography system for recording secured digital holograms of incoherently illuminated 3D scenes -- 4.1. Introduction -- 4.2. Coded aperture correlation holography for 3D encryption -- 4.3. Noise reduction techniques for COACH -- 4.4. Spectral encryption in COACH -- 4.5. Referenceless 3D encryption in COACH -- 4.6. Single shot 3D encryption using I-COACH -- 4.7. Lensless and interferenceless COACH for 3D encryption -- 4.8. Conclusion -- 5. Equal modulus decomposition based asymmetric optical cryptosystems -- 5.1. Introduction -- 5.2. Overview of a phase-truncated Fourier transform based cryptosystem -- 5.3. Equal modulus decomposition -- 5.4. Cryptanalysis -- 5.5. Modifications in EMD-based optical cryptosystems -- 5.6. Conclusion -- 6. Information security using fractional transforms -- 6.1. Optical fractional transforms -- 6.2. The discrete algorithm of fractional transforms -- 6.3. Discrete random fractional transform -- 6.4. Single gray-level image encryption -- 6.5. Double image encryption -- 6.6. Color image encryption -- 6.7. Multi-image encryption -- 6.8. Optical image hiding scheme and asymmetric encryption scheme -- 6.9. Hyperspectral image encryption -- 6.10. Other information techniques -- 7. Privacy protection by multimodal biometric encryption -- 7.1. Why is encryption of information important? -- 7.2. Motivation for biometrics and privacy protection -- 7.3. The proposed cryptosystem -- 7.4. Simulation results -- 7.5. Conclusion -- 8. Nonlinear techniques for secure optical encryption and multifactor authentication -- 8.1. Introduction : optical implementations of double-random phase encoding (DRPE) -- 8.2. Nonlinear techniques for image retrieval (decryption) based on the JTC -- 8.3. Nonlinear techniques for information authentication and compression -- 9. Enhanced single random phase holographic encryption of optical images -- 9.1. Introduction -- 9.2. The proposed enhanced single random phase encryption (ESRPE) method -- 9.3. Experimental results -- 9.4. Conclusion -- 10. Single-pixel optical information encoding and authentication -- 10.1. Introduction -- 10.2. Single-pixel optical encoding -- 10.3. Single-pixel optical authentication -- 10.4. Discussion -- 10.5. Conclusions -- 11. Compressive optical image security -- 11.1. Compressive sensing -- 11.2. Compressive optical image security -- 11.3. Compressive optical image encryption -- 11.4. Compressive optical image hiding -- 11.5. Compressive optical image encryption and hiding -- 11.6. Prospects in compressive image security 12. Simultaneous encryption and arithmetic coding for performing image compression -- 12.1. Introduction -- 12.2. Prior work of video encryption methods -- 12.3. Simultaneous encryption and video compression -- 12.4. Joint compression and encryption (JCE) -- 12.5. Compression and double encryption (CDE) -- 12.6. Simulation results -- 12.7. Security analysis -- 12.8. Conclusion -- 13. A comparative study of CFs, LBP, HOG, SIFT, SURF, and BRIEF for security and face recognition -- 13.1. Introduction -- 13.2. Related work -- 13.3. Methods implementation -- 13.4. Results analysis -- 13.5. Conclusion and future work.
  • New image processing tools and data-processing network systems have considerably increased the volume of transmitted information such as 2D and 3D images with high resolution. Thus, more complex networks and long processing times become necessary, and high image quality and transmission speeds are requested for an increasing number of applications. To satisfy these two requests, several either numerical or optical solutions were offered separately. This book explores both alternatives and describes research works that are converging towards optical/numerical hybrid solutions for high volume signal and image processing and transmission. Without being limited to hybrid approaches, the latter are particularly investigated in this book in the purpose of combining the advantages of both techniques. Additionally, pure numerical or optical solutions are also considered since they emphasize the advantages of one of the two approaches separately. 

Ämnesord

Image processing.  (LCSH)
Telecommunication.  (LCSH)

Indexterm och SAB-rubrik

Pueam Mönsterigenkänning

Klassifikation

TA1637 (LCC)
SCI053000 (ämneskategori)
006.42 (DDC)
Pueam (kssb/8)
Inställningar Hjälp

Titeln finns på 4 bibliotek. 

Bibliotek i västra Sverige (1)

Ange som favorit

Bibliotek i södra Sverige (3)

Ange som favorit

Sök utanför LIBRIS

Hjälp
Om LIBRIS
Sekretess
Hjälp
Fel i posten?
Kontakt
Teknik och format
Sök utifrån
Sökrutor
Plug-ins
Bookmarklet
Anpassa
Textstorlek
Kontrast
Vyer
LIBRIS söktjänster
SwePub
Uppsök

Kungliga biblioteket hanterar dina personuppgifter i enlighet med EU:s dataskyddsförordning (2018), GDPR. Läs mer om hur det funkar här.
Så här hanterar KB dina uppgifter vid användning av denna tjänst.

Copyright © LIBRIS - Nationella bibliotekssystem

 
pil uppåt Stäng

Kopiera och spara länken för att återkomma till aktuell vy