Image encryption and decryption using computer generated holography
This thesis is submitted in partial fulfilment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2018.
Main Authors: | , , |
---|---|
其他作者: | |
格式: | Thesis |
语言: | English |
出版: |
BRAC University
2018
|
主题: | |
在线阅读: | http://hdl.handle.net/10361/10841 |
id |
10361-10841 |
---|---|
record_format |
dspace |
spelling |
10361-108412022-01-26T10:19:55Z Image encryption and decryption using computer generated holography Istiaque, Md. Asif Mahi, Md. Mainul Islam Hasan, Syed Aousaf Alam, Dr. Md. Ashraful Department of Computer Science and Engineering, BRAC University Holography Image encryption Image decryption Image processing--Digital techniques. Holography--Data processing. This thesis is submitted in partial fulfilment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2018. Cataloged from PDF version of thesis. Includes bibliographical references (pages 48-49). Holography is an optical technique to generate the interference pattern of the light field created from the interference of two coherent light sources, one being scattered from an object and another reference light being sent directly into the holographic plate. This interference pattern is then used in a 3D holographic display to view the holographic representation of the object. This is done by passing the same reference light through the interference pattern fringe in the 3D display. Computer Generated Holography (CGH) is a simulation technique to generate the same interference pattern without the object being present. Usually this is done by taking an image or a 3D representation of the object and using numerical techniques to simulate the interference pattern of the light field. CGH has many applications and one of them is image encryption and decryption. This paper describes how to generate a CGH of an image, how to overcome the general problems, namely the image overlapping problem during the reconstruction of the image from the interference pattern and how to encrypt an image and then decrypt it using the properties and principles of CGH. Md. Asif Istiaque Md. Mainul Islam Mahi Syed Aousaf Hasan B. Computer Science and Engineering 2018-11-14T04:31:08Z 2018-11-14T04:31:08Z 2018 2018 Thesis ID 13101122 ID 14101183 ID 12201061 http://hdl.handle.net/10361/10841 en BRAC University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. 49 pages application/pdf BRAC University |
institution |
Brac University |
collection |
Institutional Repository |
language |
English |
topic |
Holography Image encryption Image decryption Image processing--Digital techniques. Holography--Data processing. |
spellingShingle |
Holography Image encryption Image decryption Image processing--Digital techniques. Holography--Data processing. Istiaque, Md. Asif Mahi, Md. Mainul Islam Hasan, Syed Aousaf Image encryption and decryption using computer generated holography |
description |
This thesis is submitted in partial fulfilment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2018. |
author2 |
Alam, Dr. Md. Ashraful |
author_facet |
Alam, Dr. Md. Ashraful Istiaque, Md. Asif Mahi, Md. Mainul Islam Hasan, Syed Aousaf |
format |
Thesis |
author |
Istiaque, Md. Asif Mahi, Md. Mainul Islam Hasan, Syed Aousaf |
author_sort |
Istiaque, Md. Asif |
title |
Image encryption and decryption using computer generated holography |
title_short |
Image encryption and decryption using computer generated holography |
title_full |
Image encryption and decryption using computer generated holography |
title_fullStr |
Image encryption and decryption using computer generated holography |
title_full_unstemmed |
Image encryption and decryption using computer generated holography |
title_sort |
image encryption and decryption using computer generated holography |
publisher |
BRAC University |
publishDate |
2018 |
url |
http://hdl.handle.net/10361/10841 |
work_keys_str_mv |
AT istiaquemdasif imageencryptionanddecryptionusingcomputergeneratedholography AT mahimdmainulislam imageencryptionanddecryptionusingcomputergeneratedholography AT hasansyedaousaf imageencryptionanddecryptionusingcomputergeneratedholography |
_version_ |
1814308950032515072 |