Digital image security techniques and applications

This book will highlight cutting-edge research with a particular emphasis on interdisciplinary approaches, novel techniques, and solutions to provide digital image security for applications in diverse areas.

Gespeichert in:
Bibliographische Detailangaben
Weitere Verfasser: Singh, Amit Kumar (VerfasserIn), Berretti, Stefano (MitwirkendeR), Anand, Ashima (MitwirkendeR), Agrawal, Amrit Kumar (MitwirkendeR)
Format: UnknownFormat
Sprache:eng
Veröffentlicht: Boca Raton, London, New York CRC Press 2024
Ausgabe:First edition
Schlagworte:
Online Zugang:Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:This book will highlight cutting-edge research with a particular emphasis on interdisciplinary approaches, novel techniques, and solutions to provide digital image security for applications in diverse areas.
Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- About the editors -- List of contributors -- Chapter 1: COVID-19 electronic health data security for smart hospitals -- 1.1 Introduction -- 1.2 Literature survey -- 1.3 Preliminary concepts -- 1.3.1 Non-Subsampled Contourlet Transform (NSCT) -- 1.3.2 Hessenberg Decomposition (HD) -- 1.3.3 Multiresolution Singular Value Decomposition (MSVD) -- 1.4 Proposed method -- 1.5 Results and analysis -- 1.6 Conclusion -- Acknowledgements -- References -- Chapter 2: Image security using quantum hash functions -- 2.1 Introduction -- 2.2 Classical cryptographic system -- 2.2.1 Transposition-based algorithm -- 2.2.2 Value-substitution-based algorithm -- 2.2.3 Position-substitution-based algorithm -- 2.3 Quantum computing -- 2.3.1 Quantum image processing -- 2.4 Representation of images in quantum computing -- 2.4.1 Flexible Representation of Quantum Images (FRQI) -- 2.4.2 Real Ket image format -- 2.4.3 Qubit lattice format -- 2.5 Data security in post quantum cryptography -- 2.6 Image security in post quantum cryptography -- 2.7 Classical hash functions -- 2.7.1 Cryptographic hash function -- 2.8 Quantum hash functions -- 2.8.1 Generation of QHF -- 2.9 Quantum key distribution -- 2.9.1 Types of QKD -- 2.10 T22 protocol -- 2.10.1 Two qubit entangled states -- 2.10.2 Bell states -- 2.10.3 T22 methodology -- 2.10.4 Probability of getting the correct measurement -- 2.11 Conclusion -- References -- Chapter 3: Post-quantum image security: Challenges and opportunities -- 3.1 Introduction -- 3.2 Classical image security -- 3.2.1 Asymmetric key encryption -- 3.2.1.1 RSA algorithm -- 3.2.2 Image security -- 3.2.3 Discussion and analysis -- 3.3 Quantum computing primer -- 3.3.1 Emergence of quantum computing -- 3.3.2 Quantum mechanics and quantum computing -- 3.3.2.1 Wave-particle duality.
Beschreibung:Enthält Literaturangaben und Index
Beschreibung:xi, 338 Seiten
Illustrationen, Diagramme
ISBN:9781032408590
978-1-032-40859-0
9781032743783
978-1-032-74378-3