Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/63621
Title: Image encryption
Authors: Ng, Kelly Xin Yi
Keywords: DRNTU::Engineering::Computer science and engineering::Data::Data encryption
Issue Date: 2015
Abstract: Images for security applications have to be encoded to ensure that the information cannot be seen by unintended persons. It is important for security applications to be able to encode the information in a way that is difficult to decode without the key, but easy if one has the key. There have been several image encryption methods through 2D transforms been proposed. I will be mainly looking at how the Fourier based optical encryption works, and how are random white sequences used to encrypt images.
URI: http://hdl.handle.net/10356/63621
Schools: School of Computer Engineering 
Research Centres: Game Lab 
Rights: Nanyang Technological University
Fulltext Permission: restricted
Fulltext Availability: With Fulltext
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)

Files in This Item:
File Description SizeFormat 
Image Encryption.pdf
  Restricted Access
989.22 kBAdobe PDFView/Open
Fig.1.jpg
  Restricted Access
83.15 kBJPEGView/Open
Fig.2.jpg
  Restricted Access
22.94 kBJPEGView/Open
Fig.3.jpg
  Restricted Access
86.2 kBJPEGView/Open
Fig.4.jpg
  Restricted Access
22.92 kBJPEGView/Open
Fig.5.png
  Restricted Access
210.87 kBimage/pngView/Open
Fig.6.jpg
  Restricted Access
65.57 kBJPEGView/Open
Fig.7.png
  Restricted Access
172.38 kBimage/pngView/Open
Fig.8.jpg
  Restricted Access
88.33 kBJPEGView/Open
Fig.9.jpg
  Restricted Access
199.54 kBJPEGView/Open

Page view(s) 50

455
Updated on May 18, 2024

Download(s) 50

48
Updated on May 18, 2024

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.