Please use this identifier to cite or link to this item: https://hdl.handle.net/10356/63621
Full metadata record
DC FieldValueLanguage
dc.contributor.authorNg, Kelly Xin Yi
dc.date.accessioned2015-05-18T02:09:51Z
dc.date.available2015-05-18T02:09:51Z
dc.date.copyright2015en_US
dc.date.issued2015
dc.identifier.urihttp://hdl.handle.net/10356/63621
dc.description.abstractImages for security applications have to be encoded to ensure that the information cannot be seen by unintended persons. It is important for security applications to be able to encode the information in a way that is difficult to decode without the key, but easy if one has the key. There have been several image encryption methods through 2D transforms been proposed. I will be mainly looking at how the Fourier based optical encryption works, and how are random white sequences used to encrypt images.en_US
dc.format.extent30 p.en_US
dc.language.isoenen_US
dc.rightsNanyang Technological University
dc.subjectDRNTU::Engineering::Computer science and engineering::Data::Data encryptionen_US
dc.titleImage encryptionen_US
dc.typeFinal Year Project (FYP)en_US
dc.contributor.supervisorQian Kemaoen_US
dc.contributor.schoolSchool of Computer Engineeringen_US
dc.description.degreeBachelor of Engineering (Computer Science)en_US
dc.contributor.researchGame Laben_US
item.fulltextWith Fulltext-
item.grantfulltextrestricted-
Appears in Collections:SCSE Student Reports (FYP/IA/PA/PI)
Files in This Item:
File Description SizeFormat 
Image Encryption.pdf
  Restricted Access
989.22 kBAdobe PDFView/Open
Fig.1.jpg
  Restricted Access
83.15 kBJPEGView/Open
Fig.2.jpg
  Restricted Access
22.94 kBJPEGView/Open
Fig.3.jpg
  Restricted Access
86.2 kBJPEGView/Open
Fig.4.jpg
  Restricted Access
22.92 kBJPEGView/Open
Fig.5.png
  Restricted Access
210.87 kBimage/pngView/Open
Fig.6.jpg
  Restricted Access
65.57 kBJPEGView/Open
Fig.7.png
  Restricted Access
172.38 kBimage/pngView/Open
Fig.8.jpg
  Restricted Access
88.33 kBJPEGView/Open
Fig.9.jpg
  Restricted Access
199.54 kBJPEGView/Open

Page view(s) 50

458
Updated on Jun 17, 2024

Download(s) 50

48
Updated on Jun 17, 2024

Google ScholarTM

Check

Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.