Advanced technologies such as artificial intelligence, big data, cloud computing, and the Internet of Things have changed the digital landscape, providing many new and exciting opportunities. However, they also provide ever-shifting gateways for information theft or misuse. Staying ahead requires the development of innovative and responsive security measures, and recent advances in optical technology have positioned it as a promising alternative to digital cryptography. Optical Cryptosystems introduces the subject of optical cryptography and provides up-to-date coverage of optical security schemes. Optical principles, approaches, and algorithms are discussed as well as applications, including image/data encryption-decryption, watermarking, image/data hiding, and authentication verification. This book also includes MATLAB(R) codes, enabling students and research professionals to carry out exercises and develop newer methods of image/data security and authentication.
Author(s): Naveen K. Nishchal
Series: IOP Series in Advances in Optics, Photonics and Optoelectronics
Publisher: IOP Publishing
Year: 2020
Language: English
Pages: 179
City: Bristol
PRELIMS.pdf
Preface
Acknowledgement
Author biography
Naveen Kumar Nishchal
List of acronyms
CH001.pdf
Chapter 1 Digital techniques of data and image encryption
1.1 Introduction
1.2 Types of cryptography
1.2.1 Symmetric key cryptography
1.2.2 Asymmetric key cryptography
1.2.3 Hash functions
References
CH002.pdf
Chapter 2 Optical techniques of image encryption: symmetric cryptosystems
2.1 Introduction
2.2 Encryption using linear canonical transforms
2.2.1 Double random phase encoding
2.2.2 Encryption using fractional Fourier transform
2.2.3 Encryption using Fresnel transform
2.2.4 Encryption using gyrator transform
2.2.5 Encryption using wavelet transform
2.2.6 Encryption using cosine transform
2.2.7 Encryption using fractional Mellin transform
MATLAB codes
References
CH003.pdf
Chapter 3 Fully-phase image encryption
3.1 Introduction
3.2 Phase imaging
3.3 Fully-phase encryption
References
CH004.pdf
Chapter 4 Joint transform correlator-based schemes for security and authentication
4.1 Introduction
4.2 DRPE using JTC
4.3 Authentication using fractional non-conventional JTC
4.3.1 Authentication
4.3.2 Authentication with a phase-encoded image
4.3.3 Performance measurement
MATLAB code
References
CH005.pdf
Chapter 5 Image watermarking and hiding
5.1 Introduction
5.2 Information hiding and watermarking under the DRPE framework
5.2.1 FRT domain watermarking
5.3 Optical asymmetric watermarking
References
CH006.pdf
Chapter 6 Polarization encoding
6.1 Introduction
6.2 Double random phase polarization encoding
6.3 Polarization encoding-based asymmetric cryptosystem
6.3.1 Color image encryption
References
CH007.pdf
Chapter 7 Digital holography-based security schemes
7.1 Introduction
7.2 Phase-shifting interferometry
7.3 Numerical reconstruction of digital holograms
7.3.1 Discrete Fresnel transformation
7.3.2 Convolution approach
7.3.3 Angular spectrum method
7.4 Information security using digital holography
7.5 Digital holography-based geometries for image encryption
7.5.1 Fourier domain DRPE through digital holography
7.5.2 FRT domain DRPE through digital holography
References
CH008.pdf
Chapter 8 Securing fused multispectral data
8.1 Introduction
8.2 Image fusion principle using wavelet transform
8.3 Security of fused data/images
8.4 Asymmetric cryptosystems with fused color components
8.5 Color image encryption using XOR operation with LED
References
CH009.pdf
Chapter 9 Chaos-based information security
9.1 Introduction
9.2 Chaos and cryptography
9.3 Chaos functions
9.4 Chaos-based optical asymmetric cryptosystem
References
CH010.pdf
Chapter 10 Optical asymmetric cryptosystems
10.1 Introduction
10.2 Asymmetric cryptosystems
10.3 Phase retrieval
10.3.1 Phase retrieval for security
10.3.2 Phase retrieval: mathematical formulation
10.3.3 Modified GS algorithm for image multiplexing and encryption
10.4 Photon counting imaging
10.5 PCI and phase-truncated FrT-based asymmetric encryption
MATLAB code for phase retrieval
References
CH011.pdf
Chapter 11 Attacks on optical security schemes
11.1 Introduction
11.2 Brute-force attack
11.3 Differential attack
11.4 Known-plaintext attack
11.5 Chosen-plaintext attack
11.6 Chosen-ciphertext attack
11.7 Specific attack
11.8 Collision attack
11.9 Occlusion attack
11.10 Effects of additive and multiplicative noise
References
CH012.pdf
Chapter 12 Optical security keys/masks
12.1 Introduction
12.2 Literature review
12.3 Random phase mask
12.4 Structured phase mask
References