dc.contributor.advisor | Alam, Dr. Md. Ashraful | |
dc.contributor.author | Istiaque, Md. Asif | |
dc.contributor.author | Mahi, Md. Mainul Islam | |
dc.contributor.author | Hasan, Syed Aousaf | |
dc.date.accessioned | 2018-11-14T04:31:08Z | |
dc.date.available | 2018-11-14T04:31:08Z | |
dc.date.copyright | 2018 | |
dc.date.issued | 2018 | |
dc.identifier.other | ID 13101122 | |
dc.identifier.other | ID 14101183 | |
dc.identifier.other | ID 12201061 | |
dc.identifier.uri | http://hdl.handle.net/10361/10841 | |
dc.description | This thesis is submitted in partial fulfilment of the requirements for the degree of Bachelor of Science in Computer Science and Engineering, 2018. | en_US |
dc.description | Cataloged from PDF version of thesis. | |
dc.description | Includes bibliographical references (pages 48-49). | |
dc.description.abstract | Holography is an optical technique to generate the interference pattern of the light field created from the interference of two coherent light sources, one being scattered from an object and another reference light being sent directly into the holographic plate. This interference pattern is then used in a 3D holographic display to view the holographic representation of the object. This is done by passing the same reference light through the interference pattern fringe in the 3D display. Computer Generated Holography (CGH) is a simulation technique to generate the same interference pattern without the object being present. Usually this is done by taking an image or a 3D representation of the object and using numerical techniques to simulate the interference pattern of the light field. CGH has many applications and one of them is image encryption and decryption. This paper describes how to generate a CGH of an image, how to overcome the general problems, namely the image overlapping problem during the reconstruction of the image from the interference pattern and how to encrypt an image and then decrypt it using the properties and principles of CGH. | en_US |
dc.description.statementofresponsibility | Md. Asif Istiaque | |
dc.description.statementofresponsibility | Md. Mainul Islam Mahi | |
dc.description.statementofresponsibility | Syed Aousaf Hasan | |
dc.format.extent | 49 pages | |
dc.language.iso | en | en_US |
dc.publisher | BRAC University | en_US |
dc.rights | BRAC University theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. | |
dc.subject | Holography | en_US |
dc.subject | Image encryption | en_US |
dc.subject | Image decryption | en_US |
dc.subject.lcsh | Image processing--Digital techniques. | |
dc.subject.lcsh | Holography--Data processing. | |
dc.title | Image encryption and decryption using computer generated holography | en_US |
dc.type | Thesis | en_US |
dc.contributor.department | Department of Computer Science and Engineering, BRAC University | |
dc.description.degree | B. Computer Science and Engineering | |