Bisher 107,99 €**
105,99 €
versandkostenfrei*

inkl. MwSt.
**Früherer Preis
Sofort lieferbar
53 °P sammeln
    Gebundenes Buch

This book comprehensively surveys the results of research investigation and technologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This book will draw on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information processing, computer based information systems, sensors, detectors, and biometrics to report innovative technologies applied to information security issues.
Optical and Digital Techniques for Information
…mehr

Produktbeschreibung
This book comprehensively surveys the results of research investigation and technologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This book will draw on the diverse expertise in optical sciences and engineering, digital image processing, imaging systems, information processing, computer based information systems, sensors, detectors, and biometrics to report innovative technologies applied to information security issues.

Optical and Digital Techniques for Information Security is the first book in a series focusing on Advanced Sciences and Technologies for Security Applications.

The Advanced Sciences and Technologies for Security Applications series focuses on research monographs in the areas of:
-Recognition and identification (including optical imaging, biometrics, authentication, verification, and smart surveillance systems)
-Biological and chemical threat detection (including biosensors, aerosols, materials detection and forensics)
-Secure information systems (including encryption, and optical and photonic systems) TOC:Quantum Cryptography.- New OVDs for Personalized Documents Based on Color Holography and Lippmann Photography.- Distortion and Noise Robust Digital Watermarking Using Input and Fourier Plane Phase Encoding.- Steganography and Encryption Systems Based on Spatial Correlators with Meaningful Output Images.- Optoelectronic Information Encryption with Incoherent Light.- Information Hiding: Steganography and Watermarking.- Watermarking Streaming Video: The Temporal Synchronization Problem.- Secure Display Using Encrypted Digital Holograms.- Compression of Digital Holograms for Secure Three-Dimensional Image Storage and Transmission.- Optical Image Encryption Using Optimized Keys.- Polarization Encoding for Optical Security System.- Stream Cipher Using Optical Affine Transformation.- Applications of Digital Holography for Information Security.- Gait-Based Human Identification Using Appearance Matching.- 2-D Periodic Patterns for Image Watermarking.- Image Steganalysis.- Public-Key Cryptography: An Overview of Some Algorithms.
  • Produktdetails
  • Advanced Sciences and Technologies for Security Applications Vol.1
  • Verlag: Springer, Berlin
  • Artikelnr. des Verlages: 10939222
  • Erscheinungstermin: August 2005
  • Englisch
  • Abmessung: 241mm x 160mm x 25mm
  • Gewicht: 642g
  • ISBN-13: 9780387206165
  • ISBN-10: 0387206167
  • Artikelnr.: 12993720
Autorenporträt
Bahram Javidi, University of Connecticut, Storrs, CT, USA
Inhaltsangabe
Quantum Cryptography.- New OVDs for Personalized Documents Based on Color Holography and Lippmann Photography.- Distortion and Noise Robust Digital Watermarking Using Input and Fourier Plane Phase Encoding.- Steganography and Encryption Systems Based on Spatial Correlators with Meaningful Output Images.- Optoelectronic Information Encryption with Incoherent Light.- Information Hiding: Steganography and Watermarking.- Watermarking Streaming Video: The Temporal Synchronization Problem.- Secure Display Using Encrypted Digital Holograms.- Compression of Digital Holograms for Secure Three-Dimensional Image Storage and Transmission.- Optical Image Encryption Using Optimized Keys.- Polarization Encoding for Optical Security System.- Stream Cipher Using Optical Affine Transformation.- Applications of Digital Holography for Information Security.- Gait-Based Human Identification Using Appearance Matching.- 2-D Periodic Patterns for Image Watermarking.- Image Steganalysis.- Public-Key Cryptography: An Overview of Some Algorithms.
Rezensionen
From the reviews of the first edition:

"This book encompasses results of research investigation and technologies that can be used to secure, protect, verify, and authenticate object and information from theft, counterfeiting, and manipulation ... . This book is unique because it has diverse contributions from the field of optics ... . It has compiled recent critical breakthroughs from academic and industrial research of the leaders in the field. This work is a perfect survey of the fast developing field and should not be missed in any library." (Jörg Stettler, Optik, Vol. 117, 2006)