Author: | Wang, Peifeng |
Title: | Optical information authentication via nonlinear correlation based on computer-generated hologram |
Advisors: | Chen, Wen (EIE) |
Degree: | M.Sc. |
Year: | 2019 |
Subject: | Hong Kong Polytechnic University -- Dissertations Holography Image processing -- Digital techniques Data encryption (Computer science) Information technology -- Security measures |
Department: | Faculty of Engineering |
Pages: | iii, 52 pages : color illustrations |
Language: | English |
Abstract: | Based on the computer-generated hologram, many optical cryptosystems have been developed for information security. The basic idea of optical information security is to prevent the hack during image transmission. Encrypting the primary image is the most central part of the cryptosystem. After the encryption process, information of the primary image is hidden and not visually distinguished. Then the encrypted data is further sent to the decoder to decrypt the information. Finally, the whole or partial information of the primary image would be exposed, which is used for acomparison with the primary image to calculate the similarity or correlation between them. Many algorithms, such as double random phase encoding, have been developed for encryption. With the technical update iteration, phase retrieval, as a typical encryption technique, has been widely used in optical encryption and authentication.The phase retrieval is chosen as the main encryption method in this dissertation, and a new simple encryption method is proposed. The existing research about optical authentication techniques still does not fully satisfy practical applications, such as a lack of in-depth robustness analysis. Therefore, the demonstration of optical information authentication via nonlinear correlation based on the computer-generated hologram is highly desirable to resolve the existing problems. In this dissertation, a comprehensive robustness analysis is conducted to evaluate the proposed phase-modulated optical cryptosystem, and a new simple encryption method is developed. |
Rights: | All rights reserved |
Access: | restricted access |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
991022270856403411.pdf | For All Users (off-campus access for PolyU Staff & Students only) | 3.69 MB | Adobe PDF | View/Open |
Copyright Undertaking
As a bona fide Library user, I declare that:
- I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
- I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
- I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.
By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.
Please use this identifier to cite or link to this item:
https://theses.lib.polyu.edu.hk/handle/200/10105