Franklin

Advanced secure optical image processing for communications / Ayman Al Falou, editor.

Publication:
Bristol [England] (Temple Circus, Temple Way, Bristol BS1 6HG, UK) : IOP Publishing, [2018]
Series:
IOP (Series). Release 5.
IOP series in imaging engineering.
IOP expanding physics
[IOP release 5]
IOP series in imaging engineering
IOP expanding physics, 2053-2563
Format/Description:
Book
1 online resource (various pagings) : illustrations (chiefly color)
Subjects:
Image processing.
Telecommunication.
System Details:
Mode of access: World Wide Web.
System requirements: Adobe Acrobat Reader, EPUB reader, or Kindle reader.
Biography/History:
Ayman Al Falou received his PhD in Telecommunications and signal processing from the French National Telecommunication Graduate Engineering School of Brittany (ENSTB-France) and of the University of Rennes in 1999. He held a Post-Doc position for one year at French National Telecommunications Graduate Engineering School of Brittany (ENSTB-France) (DGA, French Army), consisting in designing and realizing an optical compact and high rate correlator. Since June 2000, he has been a Professor of Telecommunications and signal processing at ISEN-Brest (Institut Supérieur de l'Electronique et du Numérique). At ISEN, he created the Optical Signal and Image Processing Laboratory (VISION). His research interests are signal processing and image processing, telecommunications, optical systems, optical processing, opt-electronics, lasers, and polarization. He is a senior member of OSA, senior member of IEEE, senior member of SPIE and elected member of the Institute of Physics.
Summary:
New image processing tools and data-processing network systems have considerably increased the volume of transmitted information such as 2D and 3D images with high resolution. Thus, more complex networks and long processing times become necessary, and high image quality and transmission speeds are requested for an increasing number of applications. To satisfy these two requests, several either numerical or optical solutions were offered separately. This book explores both alternatives and describes research works that are converging towards optical/numerical hybrid solutions for high volume signal and image processing and transmission. Without being limited to hybrid approaches, the latter are particularly investigated in this book in the purpose of combining the advantages of both techniques. Additionally, pure numerical or optical solutions are also considered since they emphasize the advantages of one of the two approaches separately.
Contents:
1. Optical information security systems based on a gyrator wavelet transform
1.1. Introduction
1.2. Theory
1.3. Applications of a gyrator wavelet transform
1.4. Conclusion
2. Optical one-way hash function
part A. Introduction to the one-way hash function
A.1. One-way hash function
acquire the 'fingerprint' of a message
A.2. Message authentication code
a message coming from the right sender
part B. Construction of the optical one-way hash function
B.1. Optical OWHF based on phase-truncated Fourier transform
B.2. Optical OWHF based on two-beam interference
3. Cooperative MIMO and multi-hop relaying techniques for free-space optical communications : a survey
3.1. Introduction
3.2. Spatial diversity
3.3. Multi-hop relaying systems
3.4. Cooperative relaying systems
3.5. Summary
4. Coded aperture correlation holography system for recording secured digital holograms of incoherently illuminated 3D scenes
4.1. Introduction
4.2. Coded aperture correlation holography for 3D encryption
4.3. Noise reduction techniques for COACH
4.4. Spectral encryption in COACH
4.5. Referenceless 3D encryption in COACH
4.6. Single shot 3D encryption using I-COACH
4.7. Lensless and interferenceless COACH for 3D encryption
4.8. Conclusion
5. Equal modulus decomposition based asymmetric optical cryptosystems
5.1. Introduction
5.2. Overview of a phase-truncated Fourier transform based cryptosystem
5.3. Equal modulus decomposition
5.4. Cryptanalysis
5.5. Modifications in EMD-based optical cryptosystems
5.6. Conclusion
6. Information security using fractional transforms
6.1. Optical fractional transforms
6.2. The discrete algorithm of fractional transforms
6.3. Discrete random fractional transform
6.4. Single gray-level image encryption
6.5. Double image encryption
6.6. Color image encryption
6.7. Multi-image encryption
6.8. Optical image hiding scheme and asymmetric encryption scheme
6.9. Hyperspectral image encryption
6.10. Other information techniques
7. Privacy protection by multimodal biometric encryption
7.1. Why is encryption of information important?
7.2. Motivation for biometrics and privacy protection
7.3. The proposed cryptosystem
7.4. Simulation results
7.5. Conclusion
8. Nonlinear techniques for secure optical encryption and multifactor authentication
8.1. Introduction : optical implementations of double-random phase encoding (DRPE)
8.2. Nonlinear techniques for image retrieval (decryption) based on the JTC
8.3. Nonlinear techniques for information authentication and compression
9. Enhanced single random phase holographic encryption of optical images
9.1. Introduction
9.2. The proposed enhanced single random phase encryption (ESRPE) method
9.3. Experimental results
9.4. Conclusion
10. Single-pixel optical information encoding and authentication
10.1. Introduction
10.2. Single-pixel optical encoding
10.3. Single-pixel optical authentication
10.4. Discussion
10.5. Conclusions
11. Compressive optical image security
11.1. Compressive sensing
11.2. Compressive optical image security
11.3. Compressive optical image encryption
11.4. Compressive optical image hiding
11.5. Compressive optical image encryption and hiding
11.6. Prospects in compressive image security
12. Simultaneous encryption and arithmetic coding for performing image compression
12.1. Introduction
12.2. Prior work of video encryption methods
12.3. Simultaneous encryption and video compression
12.4. Joint compression and encryption (JCE)
12.5. Compression and double encryption (CDE)
12.6. Simulation results
12.7. Security analysis
12.8. Conclusion
13. A comparative study of CFs, LBP, HOG, SIFT, SURF, and BRIEF for security and face recognition
13.1. Introduction
13.2. Related work
13.3. Methods implementation
13.4. Results analysis
13.5. Conclusion and future work.
Notes:
"Version: 20180401"--Title page verso.
Includes bibliographical references.
Title from PDF title page (viewed on May 4, 2018).
Contributor:
Al Falou, Ayman, editor.
Institute of Physics (Great Britain), publisher.
Other format:
Print version:
ISBN:
9780750314572
9780750314565
9780750314558
OCLC:
1034809052
Publisher Number:
10.1088/978-0-7503-1457-2 doi
Access Restriction:
Restricted for use by site license.
Loading...
Location Notes Your Loan Policy
Description Status Barcode Your Loan Policy