Skip to main content
  • Book
  • © 2005

Optical and Digital Techniques for Information Security

  • Most up-to-date and #1 priority book of the state-of-the-art of security techniques
  • Edited and written by the leading experts in the field
  • Cross-disciplinary approach involving optical sciences, electrical engineering, and digital information processing
  • Most needed for scientists, engineers, and governmental agencies dealing with security issues
  • First book in a series on Advanced Sciences and Technologies for Security Applications

Part of the book series: Advanced Sciences and Technologies for Security Applications (ASTSA, volume 1)

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (17 chapters)

  1. Front Matter

    Pages i-xiii
  2. Quantum Cryptography

    • J. D. Franson, B. C. Jacobs
    Pages 1-15
  3. Optoelectronic Information Encryption with Incoherent Light

    • Enrique Tajahuerce, Jesús Lancis, Pedro Andrés, Vicent Climent, Bahram Javidi
    Pages 95-112
  4. Watermarking Streaming Video: The Temporal Synchronization Problem

    • Edward J. Delp, Eugene T. Lin
    Pages 135-153
  5. Secure Display Using Encrypted Digital Holograms

    • Osamu Matoba, Bahram Javidi
    Pages 155-172
  6. Optical Image Encryption Using Optimized Keys

    • Takanori Nomura, Bahram Javidi
    Pages 193-205
  7. Polarization Encoding for an Optical Security System

    • Takanori Nomura, Bahram Javidi
    Pages 207-220
  8. Stream Cipher Using Optical Affine Transformation

    • Jun Tanida, Toru Sasaki
    Pages 221-239
  9. Applications of Digital Holography for Information Security

    • Takanori Nomura, Enrique Tajahuerce, Osamu Matoba, Bahram Javidi
    Pages 241-269
  10. Gait-Based Human Identification Using Appearance Matching

    • A. Kale, N. Cuntoor, B. Yegnanarayana, A. N. Rajagopalan, R. Chellappa
    Pages 271-295
  11. 2-D Periodic Patterns for Image Watermarking

    • Damien Delannay, Benoit Macq
    Pages 297-318
  12. Image Steganalysis

    • Rajarathnam Chandramouli, Nasir Memon
    Pages 319-336
  13. Back Matter

    Pages 353-354

About this book

There are wide-ranging implications in information security beyond national defense. Securing our information has implications for virtually all aspects of our lives, including protecting the privacy of our ?nancial transactions and medical records, facilitating all operations of government, maintaining the integrity of national borders, securing important facilities, ensuring the safety of our food and commercial products, protecting the safety of our aviation system—even safeguarding the integrity of our very identity against theft. Information security is a vital element in all of these activities, particularly as information collection and distribution become ever more connected through electronic information delivery systems and commerce. This book encompasses results of research investigation and technologies that can be used to secure, protect, verify, and authenticate objects and inf- mation from theft, counterfeiting, and manipulation by unauthorized persons and agencies. The book has drawn on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information p- cessing, mathematical algorithms, quantum optics, computer-based infor- tion systems, sensors, detectors, and biometrics to report novel technologies that can be applied to information-security issues. The book is unique because it has diverse contributions from the ?eld of optics, which is a new emerging technology for security, and digital techniques that are very accessible and can be interfaced with optics to produce highly e?ective security systems.

Reviews

From the reviews of the first edition:

"This book encompasses results of research investigation and technologies that can be used to secure, protect, verify, and authenticate object and information from theft, counterfeiting, and manipulation … . This book is unique because it has diverse contributions from the field of optics … . It has compiled recent critical breakthroughs from academic and industrial research of the leaders in the field. This work is a perfect survey of the fast developing field and should not be missed in any library." (Jörg Stettler, Optik, Vol. 117, 2006)

Editors and Affiliations

  • Electrical & Computer Engineering Dept., University of Connecticut, Storrs, USA

    Bahram Javidi

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access