Optical and Digital Techniques for Information Security

Editors:

ISBN: 978-0-387-20616-5 (Print) 978-0-387-25096-0 (Online)

Table of contents (17 chapters)

  1. Front Matter

    Pages i-xiii

  2. No Access

    Book Chapter

    Pages 1-15

    Quantum Cryptography

  3. No Access

    Book Chapter

    Pages 17-35

    New OVDs for Personalized Documents Based on Color Holography and Lippmann Photography

  4. No Access

    Book Chapter

    Pages 37-57

    Distortion- and Noise-Robust Digital Watermarking Using Input and Fourier-Plane Phase Encoding

  5. No Access

    Book Chapter

    Pages 59-94

    Steganography and Encryption Systems Based on Spatial Correlators with Meaningful Output Images

  6. No Access

    Book Chapter

    Pages 95-112

    Optoelectronic Information Encryption with Incoherent Light

  7. No Access

    Book Chapter

    Pages 113-133

    Information Hiding: Steganography and Watermarking

  8. No Access

    Book Chapter

    Pages 135-153

    Watermarking Streaming Video: The Temporal Synchronization Problem

  9. No Access

    Book Chapter

    Pages 155-172

    Secure Display Using Encrypted Digital Holograms

  10. No Access

    Book Chapter

    Pages 173-191

    Compression of Digital Holograms for Secure Three-Dimensional Image Storage and Transmission

  11. No Access

    Book Chapter

    Pages 193-205

    Optical Image Encryption Using Optimized Keys

  12. No Access

    Book Chapter

    Pages 207-220

    Polarization Encoding for an Optical Security System

  13. No Access

    Book Chapter

    Pages 221-239

    Stream Cipher Using Optical Affine Transformation

  14. No Access

    Book Chapter

    Pages 241-269

    Applications of Digital Holography for Information Security

  15. No Access

    Book Chapter

    Pages 271-295

    Gait-Based Human Identification Using Appearance Matching

  16. No Access

    Book Chapter

    Pages 297-318

    2-D Periodic Patterns for Image Watermarking

  17. No Access

    Book Chapter

    Pages 319-336

    Image Steganalysis

  18. No Access

    Book Chapter

    Pages 337-351

    Public-Key Cryptography: An Overview of some Algorithms

  19. Back Matter

    Pages 353-354