Optical encryption and decryption:
This Spotlight introduces some classical information-security approaches, e.g., steganography, watermarking, and digital cryptographic methods. It provides an overview of optical encryption from the perspective of image (both 2-D and 3-D) and optical-information processing. Both experimental and syn...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Bellingham, Washington, USA
SPIE Press
[2019]
|
Schriftenreihe: | SPIE spotlight series
vol. SL46 |
Schlagworte: | |
Online-Zugang: | FHD01 Volltext |
Zusammenfassung: | This Spotlight introduces some classical information-security approaches, e.g., steganography, watermarking, and digital cryptographic methods. It provides an overview of optical encryption from the perspective of image (both 2-D and 3-D) and optical-information processing. Both experimental and synthesized results (images) are provided in the text for illustration. Wherever possible (space permitting), background information is provided, although some knowledge of advanced mathematics and image processing, and familiarity with standard scientific computing languages, is needed for complete comprehension |
Beschreibung: | "SPIE Digital Library."--Website |
Beschreibung: | 1 Online-Ressource (viii, 40 Seiten) |
ISBN: | 9781510626157 |
DOI: | 10.1117/3.2523506 |
Internformat
MARC
LEADER | 00000nmm a2200000 cb4500 | ||
---|---|---|---|
001 | BV045523659 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190321s2019 |||| o||u| ||||||eng d | ||
020 | |a 9781510626157 |9 978-1-5106-2615-7 | ||
035 | |a (OCoLC)1090780408 | ||
035 | |a (DE-599)BVBBV045523659 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 | ||
100 | 1 | |a Muniraj, Inbarasan |e Verfasser |4 aut | |
245 | 1 | 0 | |a Optical encryption and decryption |c by Inbarasan Muniraj and John T. Sheridan |
264 | 1 | |a Bellingham, Washington, USA |b SPIE Press |c [2019] | |
300 | |a 1 Online-Ressource (viii, 40 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a SPIE spotlight series |v vol. SL46 | |
500 | |a "SPIE Digital Library."--Website | ||
505 | 8 | |a Preface -- List of acronyms -- 1. Introduction -- 2. Data security: 2.1. Steganography; 2.2. Watermarking; 2.3. Cryptography -- 3. Optical encryption methods: 3.1. Double random phase encoding; 3.2. Phase-only optical encryption; 3.3. Polarization-based encryption; 3.4. Optical image encryption based on interference; 3.5. Optical asymmetric cryptography -- 4. Experimental implementation of the classical encryption system: 4.1. Optical/digital holographic capturing-based systems; 4.2. Non-holographic encryption systems -- 5. Low-light-power-based implementations -- 6. Cryptanalysis -- 7. Summary -- References | |
520 | |a This Spotlight introduces some classical information-security approaches, e.g., steganography, watermarking, and digital cryptographic methods. It provides an overview of optical encryption from the perspective of image (both 2-D and 3-D) and optical-information processing. Both experimental and synthesized results (images) are provided in the text for illustration. Wherever possible (space permitting), background information is provided, although some knowledge of advanced mathematics and image processing, and familiarity with standard scientific computing languages, is needed for complete comprehension | ||
650 | 4 | |a Data encryption (Computer science) | |
650 | 4 | |a Image processing / Digital techniques | |
650 | 4 | |a Image steganography | |
650 | 4 | |a Digital watermarking | |
700 | 1 | |a Sheridan, John T. |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, epub |z 978-1-5106-2616-4 |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, mobi |z 978-1-5106-2617-1 |
856 | 4 | 0 | |u https://doi.org/10.1117/3.2523506 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-50-SPI | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-030907917 | ||
966 | e | |u https://doi.org/10.1117/3.2523506 |l FHD01 |p ZDB-50-SPI |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804179477222129664 |
---|---|
any_adam_object | |
author | Muniraj, Inbarasan Sheridan, John T. |
author_facet | Muniraj, Inbarasan Sheridan, John T. |
author_role | aut aut |
author_sort | Muniraj, Inbarasan |
author_variant | i m im j t s jt jts |
building | Verbundindex |
bvnumber | BV045523659 |
collection | ZDB-50-SPI |
contents | Preface -- List of acronyms -- 1. Introduction -- 2. Data security: 2.1. Steganography; 2.2. Watermarking; 2.3. Cryptography -- 3. Optical encryption methods: 3.1. Double random phase encoding; 3.2. Phase-only optical encryption; 3.3. Polarization-based encryption; 3.4. Optical image encryption based on interference; 3.5. Optical asymmetric cryptography -- 4. Experimental implementation of the classical encryption system: 4.1. Optical/digital holographic capturing-based systems; 4.2. Non-holographic encryption systems -- 5. Low-light-power-based implementations -- 6. Cryptanalysis -- 7. Summary -- References |
ctrlnum | (OCoLC)1090780408 (DE-599)BVBBV045523659 |
doi_str_mv | 10.1117/3.2523506 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02733nmm a2200421 cb4500</leader><controlfield tag="001">BV045523659</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190321s2019 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781510626157</subfield><subfield code="9">978-1-5106-2615-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1090780408</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045523659</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Muniraj, Inbarasan</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Optical encryption and decryption</subfield><subfield code="c">by Inbarasan Muniraj and John T. Sheridan</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Bellingham, Washington, USA</subfield><subfield code="b">SPIE Press</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (viii, 40 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SPIE spotlight series</subfield><subfield code="v">vol. SL46</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"SPIE Digital Library."--Website</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Preface -- List of acronyms -- 1. Introduction -- 2. Data security: 2.1. Steganography; 2.2. Watermarking; 2.3. Cryptography -- 3. Optical encryption methods: 3.1. Double random phase encoding; 3.2. Phase-only optical encryption; 3.3. Polarization-based encryption; 3.4. Optical image encryption based on interference; 3.5. Optical asymmetric cryptography -- 4. Experimental implementation of the classical encryption system: 4.1. Optical/digital holographic capturing-based systems; 4.2. Non-holographic encryption systems -- 5. Low-light-power-based implementations -- 6. Cryptanalysis -- 7. Summary -- References</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This Spotlight introduces some classical information-security approaches, e.g., steganography, watermarking, and digital cryptographic methods. It provides an overview of optical encryption from the perspective of image (both 2-D and 3-D) and optical-information processing. Both experimental and synthesized results (images) are provided in the text for illustration. Wherever possible (space permitting), background information is provided, although some knowledge of advanced mathematics and image processing, and familiarity with standard scientific computing languages, is needed for complete comprehension</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data encryption (Computer science)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Image processing / Digital techniques</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Image steganography</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Digital watermarking</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sheridan, John T.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, epub</subfield><subfield code="z">978-1-5106-2616-4</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, mobi</subfield><subfield code="z">978-1-5106-2617-1</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1117/3.2523506</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-50-SPI</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030907917</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1117/3.2523506</subfield><subfield code="l">FHD01</subfield><subfield code="p">ZDB-50-SPI</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045523659 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:20:29Z |
institution | BVB |
isbn | 9781510626157 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030907917 |
oclc_num | 1090780408 |
open_access_boolean | |
owner | DE-1050 |
owner_facet | DE-1050 |
physical | 1 Online-Ressource (viii, 40 Seiten) |
psigel | ZDB-50-SPI |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | SPIE Press |
record_format | marc |
series2 | SPIE spotlight series |
spelling | Muniraj, Inbarasan Verfasser aut Optical encryption and decryption by Inbarasan Muniraj and John T. Sheridan Bellingham, Washington, USA SPIE Press [2019] 1 Online-Ressource (viii, 40 Seiten) txt rdacontent c rdamedia cr rdacarrier SPIE spotlight series vol. SL46 "SPIE Digital Library."--Website Preface -- List of acronyms -- 1. Introduction -- 2. Data security: 2.1. Steganography; 2.2. Watermarking; 2.3. Cryptography -- 3. Optical encryption methods: 3.1. Double random phase encoding; 3.2. Phase-only optical encryption; 3.3. Polarization-based encryption; 3.4. Optical image encryption based on interference; 3.5. Optical asymmetric cryptography -- 4. Experimental implementation of the classical encryption system: 4.1. Optical/digital holographic capturing-based systems; 4.2. Non-holographic encryption systems -- 5. Low-light-power-based implementations -- 6. Cryptanalysis -- 7. Summary -- References This Spotlight introduces some classical information-security approaches, e.g., steganography, watermarking, and digital cryptographic methods. It provides an overview of optical encryption from the perspective of image (both 2-D and 3-D) and optical-information processing. Both experimental and synthesized results (images) are provided in the text for illustration. Wherever possible (space permitting), background information is provided, although some knowledge of advanced mathematics and image processing, and familiarity with standard scientific computing languages, is needed for complete comprehension Data encryption (Computer science) Image processing / Digital techniques Image steganography Digital watermarking Sheridan, John T. Verfasser aut Erscheint auch als Online-Ausgabe, epub 978-1-5106-2616-4 Erscheint auch als Online-Ausgabe, mobi 978-1-5106-2617-1 https://doi.org/10.1117/3.2523506 Verlag URL des Erstveröffentlichers Volltext |
spellingShingle | Muniraj, Inbarasan Sheridan, John T. Optical encryption and decryption Preface -- List of acronyms -- 1. Introduction -- 2. Data security: 2.1. Steganography; 2.2. Watermarking; 2.3. Cryptography -- 3. Optical encryption methods: 3.1. Double random phase encoding; 3.2. Phase-only optical encryption; 3.3. Polarization-based encryption; 3.4. Optical image encryption based on interference; 3.5. Optical asymmetric cryptography -- 4. Experimental implementation of the classical encryption system: 4.1. Optical/digital holographic capturing-based systems; 4.2. Non-holographic encryption systems -- 5. Low-light-power-based implementations -- 6. Cryptanalysis -- 7. Summary -- References Data encryption (Computer science) Image processing / Digital techniques Image steganography Digital watermarking |
title | Optical encryption and decryption |
title_auth | Optical encryption and decryption |
title_exact_search | Optical encryption and decryption |
title_full | Optical encryption and decryption by Inbarasan Muniraj and John T. Sheridan |
title_fullStr | Optical encryption and decryption by Inbarasan Muniraj and John T. Sheridan |
title_full_unstemmed | Optical encryption and decryption by Inbarasan Muniraj and John T. Sheridan |
title_short | Optical encryption and decryption |
title_sort | optical encryption and decryption |
topic | Data encryption (Computer science) Image processing / Digital techniques Image steganography Digital watermarking |
topic_facet | Data encryption (Computer science) Image processing / Digital techniques Image steganography Digital watermarking |
url | https://doi.org/10.1117/3.2523506 |
work_keys_str_mv | AT munirajinbarasan opticalencryptionanddecryption AT sheridanjohnt opticalencryptionanddecryption |