Full metadata record
DC FieldValueLanguage
dc.contributorDepartment of Electronic and Information Engineeringen_US
dc.contributor.advisorChen, Wen (EIE)en_US
dc.creatorXu, Huafeng-
dc.identifier.urihttps://theses.lib.polyu.edu.hk/handle/200/11193-
dc.languageEnglishen_US
dc.publisherHong Kong Polytechnic Universityen_US
dc.rightsAll rights reserveden_US
dc.titleComputer-generated hologram and its applicationen_US
dcterms.abstractThe investigation of optical cryptosystems plays a significant role in information security. The fundamental conception of optical information security is to avoid inevitable attacks when image is transmitted. The original encrypted image, which cannot be visually distinguished and challenging to hack, plays an integral part in the cryptosystem. Compared to conventional optical encryption technology, the computer-generated hologram has lots of advantages, e.g., non-limited to physical project and less cost and flexibility. In order to guarantee system variety and security, there is a significant number of optical encryption systems using polarization, wavelength, especially the phase as the system security keys. However, most existing optical authentication systems are limited in processing time and correction rate, only using the iteration to get the better parameters. Thus, a simple encryption method and a novel adjust parameters method are proposed in this dissertation to settle those problems. Choosing angular spectrum propagation methodology as the primary encryption method and using particle swarm optimization or genetic algorithm to adjust the parameters, the correct rate of image decryption is improved. In addition, a novel parameters adjustment algorithm is proposed to decline time-consuming.en_US
dcterms.extentiv, 58 pages : color illustrationsen_US
dcterms.isPartOfPolyU Electronic Thesesen_US
dcterms.issued2021en_US
dcterms.educationalLevelM.Sc.en_US
dcterms.educationalLevelAll Masteren_US
dcterms.LCSHData encryption (Computer science)en_US
dcterms.LCSHComputer networks -- Security measuresen_US
dcterms.LCSHComputer securityen_US
dcterms.LCSHHong Kong Polytechnic University -- Dissertationsen_US
dcterms.accessRightsrestricted accessen_US

Files in This Item:
File Description SizeFormat 
5669.pdfFor All Users (off-campus access for PolyU Staff & Students only)2.94 MBAdobe PDFView/Open


Copyright Undertaking

As a bona fide Library user, I declare that:

  1. I will abide by the rules and legal ordinances governing copyright regarding the use of the Database.
  2. I will use the Database for the purpose of my research or private study only and not for circulation or further reproduction or any other purpose.
  3. I agree to indemnify and hold the University harmless from and against any loss, damage, cost, liability or expenses arising from copyright infringement or unauthorized usage.

By downloading any item(s) listed above, you acknowledge that you have read and understood the copyright undertaking as stated above, and agree to be bound by all of its terms.

Show simple item record

Please use this identifier to cite or link to this item: https://theses.lib.polyu.edu.hk/handle/200/11193