Central Library, Indian Institute of Technology Delhi
केंद्रीय पुस्तकालय, भारतीय प्रौद्योगिकी संस्थान दिल्ली

Advanced secure optical image processing for communications / Ayman Al Falou, editor.

Contributor(s): Al Falou, Ayman [editor.] | Institute of Physics (Great Britain) [publisher.]Material type: TextTextSeries: IOP (Series). Release 5. | IOP series in imaging engineering | IOP expanding physicsPublisher: Bristol [England] (Temple Circus, Temple Way, Bristol BS1 6HG, UK) : IOP Publishing, [2018]Description: 1 online resource (various pagings) : illustrations (chiefly color)Content type: text Media type: electronic Carrier type: online resourceISBN: 9780750314572; 9780750314565Subject(s): Image processing | Telecommunication | Image processing | SCIENCE / Physics / Optics & LightAdditional physical formats: Print version:: No titleDDC classification: 006.4/2 LOC classification: TA1637 | .A387 2018ebOnline resources: Click here to access online Also available in print.
Contents:
1. Optical information security systems based on a gyrator wavelet transform -- 1.1. Introduction -- 1.2. Theory -- 1.3. Applications of a gyrator wavelet transform -- 1.4. Conclusion
2. Optical one-way hash function -- part A. Introduction to the one-way hash function -- A.1. One-way hash function--acquire the 'fingerprint' of a message -- A.2. Message authentication code--a message coming from the right sender -- part B. Construction of the optical one-way hash function -- B.1. Optical OWHF based on phase-truncated Fourier transform -- B.2. Optical OWHF based on two-beam interference
3. Cooperative MIMO and multi-hop relaying techniques for free-space optical communications : a survey -- 3.1. Introduction -- 3.2. Spatial diversity -- 3.3. Multi-hop relaying systems -- 3.4. Cooperative relaying systems -- 3.5. Summary
4. Coded aperture correlation holography system for recording secured digital holograms of incoherently illuminated 3D scenes -- 4.1. Introduction -- 4.2. Coded aperture correlation holography for 3D encryption -- 4.3. Noise reduction techniques for COACH -- 4.4. Spectral encryption in COACH -- 4.5. Referenceless 3D encryption in COACH -- 4.6. Single shot 3D encryption using I-COACH -- 4.7. Lensless and interferenceless COACH for 3D encryption -- 4.8. Conclusion
5. Equal modulus decomposition based asymmetric optical cryptosystems -- 5.1. Introduction -- 5.2. Overview of a phase-truncated Fourier transform based cryptosystem -- 5.3. Equal modulus decomposition -- 5.4. Cryptanalysis -- 5.5. Modifications in EMD-based optical cryptosystems -- 5.6. Conclusion
6. Information security using fractional transforms -- 6.1. Optical fractional transforms -- 6.2. The discrete algorithm of fractional transforms -- 6.3. Discrete random fractional transform -- 6.4. Single gray-level image encryption -- 6.5. Double image encryption -- 6.6. Color image encryption -- 6.7. Multi-image encryption -- 6.8. Optical image hiding scheme and asymmetric encryption scheme -- 6.9. Hyperspectral image encryption -- 6.10. Other information techniques
7. Privacy protection by multimodal biometric encryption -- 7.1. Why is encryption of information important? -- 7.2. Motivation for biometrics and privacy protection -- 7.3. The proposed cryptosystem -- 7.4. Simulation results -- 7.5. Conclusion
8. Nonlinear techniques for secure optical encryption and multifactor authentication -- 8.1. Introduction : optical implementations of double-random phase encoding (DRPE) -- 8.2. Nonlinear techniques for image retrieval (decryption) based on the JTC -- 8.3. Nonlinear techniques for information authentication and compression
9. Enhanced single random phase holographic encryption of optical images -- 9.1. Introduction -- 9.2. The proposed enhanced single random phase encryption (ESRPE) method -- 9.3. Experimental results -- 9.4. Conclusion
10. Single-pixel optical information encoding and authentication -- 10.1. Introduction -- 10.2. Single-pixel optical encoding -- 10.3. Single-pixel optical authentication -- 10.4. Discussion -- 10.5. Conclusions
11. Compressive optical image security -- 11.1. Compressive sensing -- 11.2. Compressive optical image security -- 11.3. Compressive optical image encryption -- 11.4. Compressive optical image hiding -- 11.5. Compressive optical image encryption and hiding -- 11.6. Prospects in compressive image security
12. Simultaneous encryption and arithmetic coding for performing image compression -- 12.1. Introduction -- 12.2. Prior work of video encryption methods -- 12.3. Simultaneous encryption and video compression -- 12.4. Joint compression and encryption (JCE) -- 12.5. Compression and double encryption (CDE) -- 12.6. Simulation results -- 12.7. Security analysis -- 12.8. Conclusion
13. A comparative study of CFs, LBP, HOG, SIFT, SURF, and BRIEF for security and face recognition -- 13.1. Introduction -- 13.2. Related work -- 13.3. Methods implementation -- 13.4. Results analysis -- 13.5. Conclusion and future work.
Abstract: New image processing tools and data-processing network systems have considerably increased the volume of transmitted information such as 2D and 3D images with high resolution. Thus, more complex networks and long processing times become necessary, and high image quality and transmission speeds are requested for an increasing number of applications. To satisfy these two requests, several either numerical or optical solutions were offered separately. This book explores both alternatives and describes research works that are converging towards optical/numerical hybrid solutions for high volume signal and image processing and transmission. Without being limited to hybrid approaches, the latter are particularly investigated in this book in the purpose of combining the advantages of both techniques. Additionally, pure numerical or optical solutions are also considered since they emphasize the advantages of one of the two approaches separately.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode
Ebooks Ebooks Indian Institute of Technology Delhi - Central Library
Available

"Version: 20180401"--Title page verso.

Includes bibliographical references.

1. Optical information security systems based on a gyrator wavelet transform -- 1.1. Introduction -- 1.2. Theory -- 1.3. Applications of a gyrator wavelet transform -- 1.4. Conclusion

2. Optical one-way hash function -- part A. Introduction to the one-way hash function -- A.1. One-way hash function--acquire the 'fingerprint' of a message -- A.2. Message authentication code--a message coming from the right sender -- part B. Construction of the optical one-way hash function -- B.1. Optical OWHF based on phase-truncated Fourier transform -- B.2. Optical OWHF based on two-beam interference

3. Cooperative MIMO and multi-hop relaying techniques for free-space optical communications : a survey -- 3.1. Introduction -- 3.2. Spatial diversity -- 3.3. Multi-hop relaying systems -- 3.4. Cooperative relaying systems -- 3.5. Summary

4. Coded aperture correlation holography system for recording secured digital holograms of incoherently illuminated 3D scenes -- 4.1. Introduction -- 4.2. Coded aperture correlation holography for 3D encryption -- 4.3. Noise reduction techniques for COACH -- 4.4. Spectral encryption in COACH -- 4.5. Referenceless 3D encryption in COACH -- 4.6. Single shot 3D encryption using I-COACH -- 4.7. Lensless and interferenceless COACH for 3D encryption -- 4.8. Conclusion

5. Equal modulus decomposition based asymmetric optical cryptosystems -- 5.1. Introduction -- 5.2. Overview of a phase-truncated Fourier transform based cryptosystem -- 5.3. Equal modulus decomposition -- 5.4. Cryptanalysis -- 5.5. Modifications in EMD-based optical cryptosystems -- 5.6. Conclusion

6. Information security using fractional transforms -- 6.1. Optical fractional transforms -- 6.2. The discrete algorithm of fractional transforms -- 6.3. Discrete random fractional transform -- 6.4. Single gray-level image encryption -- 6.5. Double image encryption -- 6.6. Color image encryption -- 6.7. Multi-image encryption -- 6.8. Optical image hiding scheme and asymmetric encryption scheme -- 6.9. Hyperspectral image encryption -- 6.10. Other information techniques

7. Privacy protection by multimodal biometric encryption -- 7.1. Why is encryption of information important? -- 7.2. Motivation for biometrics and privacy protection -- 7.3. The proposed cryptosystem -- 7.4. Simulation results -- 7.5. Conclusion

8. Nonlinear techniques for secure optical encryption and multifactor authentication -- 8.1. Introduction : optical implementations of double-random phase encoding (DRPE) -- 8.2. Nonlinear techniques for image retrieval (decryption) based on the JTC -- 8.3. Nonlinear techniques for information authentication and compression

9. Enhanced single random phase holographic encryption of optical images -- 9.1. Introduction -- 9.2. The proposed enhanced single random phase encryption (ESRPE) method -- 9.3. Experimental results -- 9.4. Conclusion

10. Single-pixel optical information encoding and authentication -- 10.1. Introduction -- 10.2. Single-pixel optical encoding -- 10.3. Single-pixel optical authentication -- 10.4. Discussion -- 10.5. Conclusions

11. Compressive optical image security -- 11.1. Compressive sensing -- 11.2. Compressive optical image security -- 11.3. Compressive optical image encryption -- 11.4. Compressive optical image hiding -- 11.5. Compressive optical image encryption and hiding -- 11.6. Prospects in compressive image security

12. Simultaneous encryption and arithmetic coding for performing image compression -- 12.1. Introduction -- 12.2. Prior work of video encryption methods -- 12.3. Simultaneous encryption and video compression -- 12.4. Joint compression and encryption (JCE) -- 12.5. Compression and double encryption (CDE) -- 12.6. Simulation results -- 12.7. Security analysis -- 12.8. Conclusion

13. A comparative study of CFs, LBP, HOG, SIFT, SURF, and BRIEF for security and face recognition -- 13.1. Introduction -- 13.2. Related work -- 13.3. Methods implementation -- 13.4. Results analysis -- 13.5. Conclusion and future work.

New image processing tools and data-processing network systems have considerably increased the volume of transmitted information such as 2D and 3D images with high resolution. Thus, more complex networks and long processing times become necessary, and high image quality and transmission speeds are requested for an increasing number of applications. To satisfy these two requests, several either numerical or optical solutions were offered separately. This book explores both alternatives and describes research works that are converging towards optical/numerical hybrid solutions for high volume signal and image processing and transmission. Without being limited to hybrid approaches, the latter are particularly investigated in this book in the purpose of combining the advantages of both techniques. Additionally, pure numerical or optical solutions are also considered since they emphasize the advantages of one of the two approaches separately.

Students, researchers, and industry in the areas of optical image processing.

Also available in print.

Mode of access: World Wide Web.

System requirements: Adobe Acrobat Reader, EPUB reader, or Kindle reader.

Ayman Al Falou received his PhD in Telecommunications and signal processing from the French National Telecommunication Graduate Engineering School of Brittany (ENSTB-France) and of the University of Rennes in 1999. He held a Post-Doc position for one year at French National Telecommunications Graduate Engineering School of Brittany (ENSTB-France) (DGA, French Army), consisting in designing and realizing an optical compact and high rate correlator. Since June 2000, he has been a Professor of Telecommunications and signal processing at ISEN-Brest (Institut Supérieur de l'Electronique et du Numérique). At ISEN, he created the Optical Signal and Image Processing Laboratory (VISION). His research interests are signal processing and image processing, telecommunications, optical systems, optical processing, opt-electronics, lasers, and polarization. He is a senior member of OSA, senior member of IEEE, senior member of SPIE and elected member of the Institute of Physics.

Title from PDF title page (viewed on May 4, 2018).

There are no comments on this title.

to post a comment.
Copyright © 2022 Central Library, Indian Institute of Technology Delhi. All Rights Reserved.

Powered by Koha