Digital image security techniques and applications
This book will highlight cutting-edge research with a particular emphasis on interdisciplinary approaches, novel techniques, and solutions to provide digital image security for applications in diverse areas.
Gespeichert in:
Weitere Verfasser: | , , , |
---|---|
Format: | UnknownFormat |
Sprache: | eng |
Veröffentlicht: |
Boca Raton, London, New York
CRC Press
2024
|
Ausgabe: | First edition |
Schlagworte: | |
Online Zugang: | Inhaltsverzeichnis |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | This book will highlight cutting-edge research with a particular emphasis on interdisciplinary approaches, novel techniques, and solutions to provide digital image security for applications in diverse areas. Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- About the editors -- List of contributors -- Chapter 1: COVID-19 electronic health data security for smart hospitals -- 1.1 Introduction -- 1.2 Literature survey -- 1.3 Preliminary concepts -- 1.3.1 Non-Subsampled Contourlet Transform (NSCT) -- 1.3.2 Hessenberg Decomposition (HD) -- 1.3.3 Multiresolution Singular Value Decomposition (MSVD) -- 1.4 Proposed method -- 1.5 Results and analysis -- 1.6 Conclusion -- Acknowledgements -- References -- Chapter 2: Image security using quantum hash functions -- 2.1 Introduction -- 2.2 Classical cryptographic system -- 2.2.1 Transposition-based algorithm -- 2.2.2 Value-substitution-based algorithm -- 2.2.3 Position-substitution-based algorithm -- 2.3 Quantum computing -- 2.3.1 Quantum image processing -- 2.4 Representation of images in quantum computing -- 2.4.1 Flexible Representation of Quantum Images (FRQI) -- 2.4.2 Real Ket image format -- 2.4.3 Qubit lattice format -- 2.5 Data security in post quantum cryptography -- 2.6 Image security in post quantum cryptography -- 2.7 Classical hash functions -- 2.7.1 Cryptographic hash function -- 2.8 Quantum hash functions -- 2.8.1 Generation of QHF -- 2.9 Quantum key distribution -- 2.9.1 Types of QKD -- 2.10 T22 protocol -- 2.10.1 Two qubit entangled states -- 2.10.2 Bell states -- 2.10.3 T22 methodology -- 2.10.4 Probability of getting the correct measurement -- 2.11 Conclusion -- References -- Chapter 3: Post-quantum image security: Challenges and opportunities -- 3.1 Introduction -- 3.2 Classical image security -- 3.2.1 Asymmetric key encryption -- 3.2.1.1 RSA algorithm -- 3.2.2 Image security -- 3.2.3 Discussion and analysis -- 3.3 Quantum computing primer -- 3.3.1 Emergence of quantum computing -- 3.3.2 Quantum mechanics and quantum computing -- 3.3.2.1 Wave-particle duality. |
---|---|
Beschreibung: | Enthält Literaturangaben und Index |
Beschreibung: | xi, 338 Seiten Illustrationen, Diagramme |
ISBN: | 9781032408590 978-1-032-40859-0 9781032743783 978-1-032-74378-3 |