Please use this identifier to cite or link to this item: http://hdl.handle.net/10603/512908
Title: Computer Generated Hologram based Image Authentication using Matrix Optimization Techniques
Researcher: Nelwin Raj N R
Guide(s): Sheeja Mk
Keywords: Engineering
Engineering and Technology
Engineering Electrical and Electronic
University: APJ Abdul Kalam Technological University, Thiruvananthapuram
Completed Date: 2023
Abstract: Hologram is difficult to forge as it entails a complex procedure to reproduce it when newlinecompared to images. In order to integrate security into any digital document, holograms newlinecan be used as it ensure authenticity. Therefore Hologram turns out to be an exemplary newlinemethod for protection and is widely used in security applications. Computer Generated newlineHolography is a result of interference pattern, which is calculated with the help of a computer newlineinstead of optical techniques used in holography. It is a promising technique in newlinethe structure of complex security holograms for improving the level of protection against newlineforgery. newlineThe thesis titled Computer Generated Hologram based Image Authentication using newlineMatrix Optimization Techniques explores deeper into the Computer Generated Hologram newlinewhich could secure information in images especially in e-Certificates and digital newlinedocuments. By employing different techniques such as Low Rank Matrix Approximation newline(LRMA), Line Index Coding (LIC), Quadrant Mapping Scheme (QMS), Digital Wavelet newlineTransform (DWT) and Singular Value Decomposition (SVD), it could be identified that newlinethese techniques aid in the generation, representation in real domain, compression, watermarking and reconstruction of hologram images. newlineThe research examines the efficacy of Computer Generated Hologram (CGH), newlinewhich could be used as an image authentication system with the aid of Matrix Optimization newlineTechniques (MOT). The research scrutinizes the validation and authentication newlineof e-Certificates through the application of CGH, which is generated through the techniques newlineof MOT.The research proves that LRMA and SVD techniques reduce the computation steps newlineto about 66 percentage in the generation of CGH when compared to existing techniques. newlineThis technique is applied to compute the hologram of the candidate s face before it is embedded on to the certificate. Apart from this, the same technique is employed during the process of reconstruction at the time of verification of the e-Certificates.
Pagination: 
URI: http://hdl.handle.net/10603/512908
Appears in Departments:Sree Chitra Thirunal College of Engineering

Files in This Item:
File Description SizeFormat 
01_title.pdfAttached File26.1 kBAdobe PDFView/Open
02_preliminary pages.pdf169.41 kBAdobe PDFView/Open
03_contents.pdf24.54 kBAdobe PDFView/Open
04_abstract.pdf24.91 kBAdobe PDFView/Open
05_chapter 1.pdf61.69 kBAdobe PDFView/Open
06_chapter 2.pdf415.42 kBAdobe PDFView/Open
07_chapter 3.pdf1.28 MBAdobe PDFView/Open
08_chapter 4.pdf655.38 kBAdobe PDFView/Open
09_annexure.pdf59.48 kBAdobe PDFView/Open
80_recommendation.pdf40.64 kBAdobe PDFView/Open
Show full item record


Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).

Altmetric Badge: