Please use this identifier to cite or link to this item:
https://etd.cput.ac.za/handle/20.500.11838/1376
DC Field | Value | Language |
---|---|---|
dc.contributor.advisor | Khan, Mohammed Tariq Ekeramodien | en_US |
dc.contributor.author | Zhang, Bo | en_US |
dc.date.accessioned | 2012-08-30T09:41:25Z | - |
dc.date.accessioned | 2016-02-20T07:08:57Z | - |
dc.date.available | 2012-08-30T09:41:25Z | - |
dc.date.available | 2016-02-20T07:08:57Z | - |
dc.date.issued | 2004 | - |
dc.identifier.uri | http://hdl.handle.net/20.500.11838/1376 | - |
dc.description | Thesis (MTech (Information Technology))--Peninsula Technikon, 2004 | en_US |
dc.description.abstract | Encryption was used whenever someone wanted to send a secret message to someone. The quality of the algorithm and key combination were the factors that ensured the strength of the system. However, until there were some automation one could not use complex methods for encryption because it simply took too long to encrypt and decrypt messages (even worse for images), manually. Optical technologies have recently been employed in encryption. Compared with traditional computer and electrical systems, optical technologies offer primarily two types of benefits, namely optical systems have an inherent capability for parallel processing, that is, rapid transmission of information, and information can be hidden in any of several dimensions, such as phase or spatial frequency. Optical systems therefore have an excellent capability for encoding information. In this project an image encryption technique was developed using exclusive-OR (XOR) operations in the optical domain before the captured image entered a digital computer network for further processing. A gray-level image of the object to be encrypted was converted a binary format and a pixel by pixel exclusive OR operation was performed on it with a random key-bit by making use of polarization encoding in LCD technology, before the encrypted binary image was detected by a CCD. The image may also be used as an input to a computer for comparison with a database. However, noise alters the encrypted bit and the value of the noisy encrypted bit is no longer binary. In this research the encryption techniques was evaluated and tested for applicability to encrypt and decrypt successfully. The noise performance was tested and compared. The technique was applied for image transmission over a wireless IP broadband link. Images (optical and thermal) captured from telemedicine application was transmitted and decrypted with reasonable success in this application. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Peninsula Technikon | en_US |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-sa/3.0/za/ | - |
dc.subject | Image processing -- Digital techniques | en_US |
dc.subject | Data encryption (Computer science) | en_US |
dc.subject | Computer security | en_US |
dc.subject | Optical communications | en_US |
dc.title | XOR based optical encryption with noise performance modeling and application to image transmission over wireless IP lan | en_US |
dc.type | Thesis | en_US |
Appears in Collections: | Information Technology - Master's Degree |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Zhang_b_MTech_IT_fid_2004 | 4.07 MB | Adobe PDF | View/Open |
Page view(s)
1,103
Last Week
1
1
Last month
8
8
checked on Nov 27, 2024
Download(s)
654
checked on Nov 27, 2024
Google ScholarTM
Check
This item is licensed under a Creative Commons License