Quantum Cryptography.- New OVDs for Personalized Documents Based on Color Holography and Lippmann Photography.- Distortion and Noise Robust Digital Watermarking Using Input and Fourier Plane Phase Encoding.- Steganography and Encryption Systems Based on Spatial Correlators with Meaningful Output Images.- Optoelectronic Information Encryption with Incoherent Light.- Information Hiding: Steganography and Watermarking.- Watermarking Streaming Video: The Temporal Synchronization Problem.- Secure Display Using Encrypted Digital Holograms.- Compression of Digital Holograms for Secure Three-Dimensional Image Storage and Transmission.- Optical Image Encryption Using Optimized Keys.- Polarization Encoding for Optical Security System.- Stream Cipher Using Optical Affine Transformation.- Applications of Digital Holography for Information Security.- Gait-Based Human Identification Using Appearance Matching.- 2-D Periodic Patterns for Image Watermarking.- Image Steganalysis.- Public-Key Cryptography: An Overview of Some Algorithms.
There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspects of our lives, including protecting the privacy of our ?nancial transactions and medical records, facilitating all operations of government, maintaining the integrity of national borders, securing important facilities, ensuring the safety of our food and commercial products, protecting the safety of our aviation system-even safeguarding the integrity of our very identity against theft. Information security is a vital element in all of these activities, particularly as information collection and distribution become ever more connected through electronic information delivery systems and commerce. This book encompasses results of research investigation and technologies that can be used to secure, protect, verify, and authenticate objects and inf- mation from theft, counterfeiting, and manipulation by unauthorized persons and agencies. The book has drawn on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information p- cessing, mathematical algorithms, quantum optics, computer-based infor- tion systems, sensors, detectors, and biometrics to report novel technologies that can be applied to information-security issues. The book is unique because it has diverse contributions from the ?eld of optics, which is a new emerging technology for security, and digital techniques that are very accessible and can be interfaced with optics to produce highly e?ective security systems.
One aspect of homeland security issues with wide-ranging implications
is information security. This book presents leading-edge methods to
secure, verify, recognize, track, and authenticate objects and
information from theft, counterfeiting, and manipulation by
unauthorized persons and agencies. The book will be of use for
scientists from many different areas being involved in security