Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/512908
Title: | Computer Generated Hologram based Image Authentication using Matrix Optimization Techniques |
Researcher: | Nelwin Raj N R |
Guide(s): | Sheeja Mk |
Keywords: | Engineering Engineering and Technology Engineering Electrical and Electronic |
University: | APJ Abdul Kalam Technological University, Thiruvananthapuram |
Completed Date: | 2023 |
Abstract: | Hologram is difficult to forge as it entails a complex procedure to reproduce it when newlinecompared to images. In order to integrate security into any digital document, holograms newlinecan be used as it ensure authenticity. Therefore Hologram turns out to be an exemplary newlinemethod for protection and is widely used in security applications. Computer Generated newlineHolography is a result of interference pattern, which is calculated with the help of a computer newlineinstead of optical techniques used in holography. It is a promising technique in newlinethe structure of complex security holograms for improving the level of protection against newlineforgery. newlineThe thesis titled Computer Generated Hologram based Image Authentication using newlineMatrix Optimization Techniques explores deeper into the Computer Generated Hologram newlinewhich could secure information in images especially in e-Certificates and digital newlinedocuments. By employing different techniques such as Low Rank Matrix Approximation newline(LRMA), Line Index Coding (LIC), Quadrant Mapping Scheme (QMS), Digital Wavelet newlineTransform (DWT) and Singular Value Decomposition (SVD), it could be identified that newlinethese techniques aid in the generation, representation in real domain, compression, watermarking and reconstruction of hologram images. newlineThe research examines the efficacy of Computer Generated Hologram (CGH), newlinewhich could be used as an image authentication system with the aid of Matrix Optimization newlineTechniques (MOT). The research scrutinizes the validation and authentication newlineof e-Certificates through the application of CGH, which is generated through the techniques newlineof MOT.The research proves that LRMA and SVD techniques reduce the computation steps newlineto about 66 percentage in the generation of CGH when compared to existing techniques. newlineThis technique is applied to compute the hologram of the candidate s face before it is embedded on to the certificate. Apart from this, the same technique is employed during the process of reconstruction at the time of verification of the e-Certificates. |
Pagination: | |
URI: | http://hdl.handle.net/10603/512908 |
Appears in Departments: | Sree Chitra Thirunal College of Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 26.1 kB | Adobe PDF | View/Open |
02_preliminary pages.pdf | 169.41 kB | Adobe PDF | View/Open | |
03_contents.pdf | 24.54 kB | Adobe PDF | View/Open | |
04_abstract.pdf | 24.91 kB | Adobe PDF | View/Open | |
05_chapter 1.pdf | 61.69 kB | Adobe PDF | View/Open | |
06_chapter 2.pdf | 415.42 kB | Adobe PDF | View/Open | |
07_chapter 3.pdf | 1.28 MB | Adobe PDF | View/Open | |
08_chapter 4.pdf | 655.38 kB | Adobe PDF | View/Open | |
09_annexure.pdf | 59.48 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 40.64 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: