BeschreibungThere are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspects of our lives, including protecting the privacy of our ?nancial transactions and medical records, facilitating all operations of government, maintaining the integrity of national borders, securing important facilities, ensuring the safety of our food and commercial products, protecting the safety of our aviation system-even safeguarding the integrity of our very identity against theft. Information security is a vital element in all of these activities, particularly as information collection and distribution become ever more connected through electronic information delivery systems and commerce. This book encompasses results of research investigation and technologies that can be used to secure, protect, verify, and authenticate objects and inf- mation from theft, counterfeiting, and manipulation by unauthorized persons and agencies. The book has drawn on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information p- cessing, mathematical algorithms, quantum optics, computer-based infor- tion systems, sensors, detectors, and biometrics to report novel technologies that can be applied to information-security issues. The book is unique because it has diverse contributions from the ?eld of optics, which is a new emerging technology for security, and digital techniques that are very accessible and can be interfaced with optics to produce highly e?ective security systems.
InhaltsverzeichnisQuantum Cryptography.- New OVDs for Personalized Documents Based on Color Holography and Lippmann Photography.- Distortion- and Noise-Robust Digital Watermarking Using Input and Fourier-Plane Phase Encoding.- Steganography and Encryption Systems Based on Spatial Correlators with Meaningful Output Images.- Optoelectronic Information Encryption with Incoherent Light.- Information Hiding: Steganography and Watermarking.- Watermarking Streaming Video: The Temporal Synchronization Problem.- Secure Display Using Encrypted Digital Holograms.- Compression of Digital Holograms for Secure Three-Dimensional Image Storage and Transmission.- Optical Image Encryption Using Optimized Keys.- Polarization Encoding for an Optical Security System.- Stream Cipher Using Optical Affine Transformation.- Applications of Digital Holography for Information Security.- Gait-Based Human Identification Using Appearance Matching.- 2-D Periodic Patterns for Image Watermarking.- Image Steganalysis.- Public-Key Cryptography: An Overview of some Algorithms.
PressestimmenFrom the reviews of the first edition:
"This book encompasses results of research investigation and technologies that can be used to secure, protect, verify, and authenticate object and information from theft, counterfeiting, and manipulation ... . This book is unique because it has diverse contributions from the field of optics ... . It has compiled recent critical breakthroughs from academic and industrial research of the leaders in the field. This work is a perfect survey of the fast developing field and should not be missed in any library." (Jörg Stettler, Optik, Vol. 117, 2006)
Untertitel: 130 illus. , 20 in color. Sprache: Englisch.
Verlag: Springer-Verlag GmbH
Erscheinungsdatum: August 2005