Skip to product information
1 of 1

Optical Cryptosystems

Regular price £120.00
Sale price £120.00 Regular price £120.00
Sale Sold out
Optical Cryptosystems introduces the subject of optical cryptography and provides up-to-date coverage of optical security schemes. Optical principles, approaches, and algorithms are discussed as we...
Read More
  • Format:
  • 30 December 2019
View Product Details

Advanced technologies such as artificial intelligence, big data, cloud computing, and the Internet of Things have changed the digital landscape, providing many new and exciting opportunities. However, they also provide ever-shifting gateways for information theft or misuse. Staying ahead requires the development of innovative and responsive security measures, and recent advances in optical technology have positioned it as a promising alternative to digital cryptography.

Optical Cryptosystems introduces the subject of optical cryptography and provides up-to-date coverage of optical security schemes. Optical principles, approaches, and algorithms are discussed as well as applications, including image/data encryption–decryption, watermarking, image/data hiding, and authentication verification. This book also includes MATLAB® codes, enabling students and research professionals to carry out exercises and develop newer methods of image/data security and authentication.

files/i.png Icon
Price: £120.00
Pages: 179
Publisher: Institute of Physics Publishing
Imprint: Institute of Physics Publishing
Publication Date: 30 December 2019
Trim Size: 10.00 X 7.00 in
ISBN: 9780750322188
Format: Hardcover
BISACs:

TECHNOLOGY & ENGINEERING / Optics, Applied optics

REVIEWS Icon

Preface viii Acknowledgement x Author’s biography xi List of acronyms xii

Chapter 1 Digital techniques of data and image encryption

Chapter 2 Optical techniques of image encryption: Symmetric cryptosystems

Chapter 3 Fully-phase image encryption

Chapter 4 Joint transform correlator-based schemes for security and authentication

Chapter 5 Image watermarking and hiding

Chapter 6 Polarization encoding

Chapter 7 Digital holography-based security schemes

Chapter 8 Securing fused multispectral data

Chapter 9 Chaos-based information security

Chapter 10 Optical asymmetric cryptosystems

Chapter 11 Attacks on optical security schemes

Chapter 12 Optical security keys/masks