Please use this identifier to cite or link to this item: https://etd.cput.ac.za/handle/20.500.11838/1376
DC FieldValueLanguage
dc.contributor.advisorKhan, Mohammed Tariq Ekeramodienen_US
dc.contributor.authorZhang, Boen_US
dc.date.accessioned2012-08-30T09:41:25Z-
dc.date.accessioned2016-02-20T07:08:57Z-
dc.date.available2012-08-30T09:41:25Z-
dc.date.available2016-02-20T07:08:57Z-
dc.date.issued2004-
dc.identifier.urihttp://hdl.handle.net/20.500.11838/1376-
dc.descriptionThesis (MTech (Information Technology))--Peninsula Technikon, 2004en_US
dc.description.abstractEncryption was used whenever someone wanted to send a secret message to someone. The quality of the algorithm and key combination were the factors that ensured the strength of the system. However, until there were some automation one could not use complex methods for encryption because it simply took too long to encrypt and decrypt messages (even worse for images), manually. Optical technologies have recently been employed in encryption. Compared with traditional computer and electrical systems, optical technologies offer primarily two types of benefits, namely optical systems have an inherent capability for parallel processing, that is, rapid transmission of information, and information can be hidden in any of several dimensions, such as phase or spatial frequency. Optical systems therefore have an excellent capability for encoding information. In this project an image encryption technique was developed using exclusive-OR (XOR) operations in the optical domain before the captured image entered a digital computer network for further processing. A gray-level image of the object to be encrypted was converted a binary format and a pixel by pixel exclusive OR operation was performed on it with a random key-bit by making use of polarization encoding in LCD technology, before the encrypted binary image was detected by a CCD. The image may also be used as an input to a computer for comparison with a database. However, noise alters the encrypted bit and the value of the noisy encrypted bit is no longer binary. In this research the encryption techniques was evaluated and tested for applicability to encrypt and decrypt successfully. The noise performance was tested and compared. The technique was applied for image transmission over a wireless IP broadband link. Images (optical and thermal) captured from telemedicine application was transmitted and decrypted with reasonable success in this application.en_US
dc.language.isoenen_US
dc.publisherPeninsula Technikonen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-sa/3.0/za/-
dc.subjectImage processing -- Digital techniquesen_US
dc.subjectData encryption (Computer science)en_US
dc.subjectComputer securityen_US
dc.subjectOptical communicationsen_US
dc.titleXOR based optical encryption with noise performance modeling and application to image transmission over wireless IP lanen_US
dc.typeThesisen_US
Appears in Collections:Information Technology - Master's Degree
Files in This Item:
File Description SizeFormat 
Zhang_b_MTech_IT_fid_20044.07 MBAdobe PDFThumbnail
View/Open
Show simple item record

Page view(s)

1,005
Last Week
909
Last month
909
checked on Feb 16, 2022

Download(s)

623
checked on Feb 16, 2022

Google ScholarTM

Check


This item is licensed under a Creative Commons License Creative Commons