Dissertations / Theses on the topic 'Image Encryption'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 dissertations / theses for your research on the topic 'Image Encryption.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Bowley, James. "Sparse image representation with encryption." Thesis, Aston University, 2013. http://publications.aston.ac.uk/20914/.
Full textAkdag, Sadik Bahaettin. "An Image Encryption Algorithm Robust To Post-encryption Bitrate Conversion." Master's thesis, METU, 2006. http://etd.lib.metu.edu.tr/upload/12607710/index.pdf.
Full textUehara, Takeyuki. "Contributions to image encryption and authentication." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20040920.124409/index.html.
Full textNorman, Kelly Robert. "Encryption of Computer Peripheral Devices." Diss., CLICK HERE for online access, 2006. http://contentdm.lib.byu.edu/ETD/image/etd1232.pdf.
Full textCheng, Howard Chi Ho. "Partial encryption for image and video communication." Thesis, National Library of Canada = Bibliothèque nationale du Canada, 1998. http://www.collectionscanada.ca/obj/s4/f2/dsk2/ftp01/MQ34345.pdf.
Full textManiccam, Suchindran S. "Image-video compression, encryption and information hiding /." Online version via UMI:, 2001.
Find full textManisekaran, Pradheep [Verfasser]. "Image Encryption by Using ACGLML / Pradheep Manisekaran." München : GRIN Verlag, 2021. http://d-nb.info/123663103X/34.
Full textWadhwani, Sandeep. "Using chaotic encryption schemes in distributed image storage." Thesis, McGill University, 2013. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=119757.
Full textBasavarasu, Srinivasa R. "Voice and Image Encryption, and, Performance Analysis of Counter Mode Advanced Encryption Standard for WiMAX." University of Toledo / OhioLINK, 2013. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1376636620.
Full textWu, Pianhui. "Research on digital image watermark encryption based on hyperchaos." Thesis, University of Derby, 2013. http://hdl.handle.net/10545/305004.
Full textChen, Hang. "Optical Encryption Techniques for Color Image and Hyperspectral Data." Thesis, Université de Lorraine, 2017. http://www.theses.fr/2017LORR0374.
Full textUllagaddi, Vishwanath. "Development of Data Encryption Algorithms for Secure Communication Using Public Images." University of Toledo / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=toledo1341524458.
Full textWang, Mengmeng. "Optical Image encryption based on apertured FrMT in the Diffraction domain." Thesis, Poitiers, 2019. http://www.theses.fr/2019POIT2326.
Full textLi, Ling Feng. "An image encryption system based on two-dimensional quantum random walks." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3950660.
Full textOrgill, Gregory Leavitt. "Java Performance of the Rijndael Encryption Algorithm Across Compilers and Virtual Machines." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd681.pdf.
Full textWong, Hon Wah. "Image watermarking and data hiding techniques /." View Abstract or Full-Text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20WONGH.
Full textRoth, Christopher. "A distributed password scheme for network operating systems." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02Jun%5FRoth.pdf.
Full textSalles, Ernesto J. "The impact on quality of service when using security-enabling filters to provide for the security of run-time extensible virtual environments." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FSalles.pdf.
Full textChan, Fuk Wing Thomas. "Preserving trust across multiple sessions in open systems /." Diss., CLICK HERE for online access, 2004. http://contentdm.lib.byu.edu/ETD/image/etd497.pdf.
Full textSmith, Bryan. "Responding to policies at runtime in TrustBuilder /." Diss., CLICK HERE for online access, 2004. http://contentdm.lib.byu.edu/ETD/image/etd414.pdf.
Full textKundur, Abhinay. "Digital and Analog Signal Encryption and Decryption in Mid RF Range Using Hybrid Acousto-Optic Chaos." University of Dayton / OhioLINK, 2012. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1336100009.
Full textHaider, Rizwan. "Modified and Efficient Image Encryption Algorithm Based on Chaos Theory, DNA Complementary Rules and SHA-256." Thesis, Mittuniversitetet, Avdelningen för informations- och kommunikationssystem, 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-29916.
Full textGuruswamy, Aarumugam Bhupathi Rajan. "Independent Domain of Symmetric Encryption using Least SignificantBit : Computer Vision, Steganography and Cryptography Techniques." Thesis, Högskolan Dalarna, Datateknik, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:du-10063.
Full textYip, Shu Kei. "Digital watermarking and data hiding /." View abstract or full-text, 2006. http://library.ust.hk/cgi/db/thesis.pl?ECED%202006%20YIP.
Full textLi, Richard Yuk Ming. "Digital watermarking and data hiding /." View abstract or full-text, 2007. http://library.ust.hk/cgi/db/thesis.pl?ECED%202007%20LIR.
Full textZhang, Bo. "XOR based optical encryption with noise performance modeling and application to image transmission over wireless IP lan." Thesis, Peninsula Technikon, 2004. http://hdl.handle.net/20.500.11838/1376.
Full textFu, Ming Sun. "Data hiding watermarking for halftone images /." View abstract or full-text, 2003. http://library.ust.hk/cgi/db/thesis.pl?ELEC%202003%20FU.
Full textLeung, Wing Pan. "Visual cryptography for color images : formal security analysis and new construction /." access full-text access abstract and table of contents, 2009. http://libweb.cityu.edu.hk/cgi-bin/ezdb/thesis.pl?mphil-cs-b23759100f.pdf.
Full textSoukal, David. "Advanced steganographic and steganalytic methods in the spatial domain." Diss., Online access via UMI:, 2006.
Find full textChaparala, Suman Krishna. "Secure Encryption and Decryption by Aperture Variations of a Photodetector in an Acousto-Optic Bragg Cell." University of Dayton / OhioLINK, 2016. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1468527741.
Full textWoo, Tim. "A Scalable, Secure, and Energy-Efficient Image Representation for Wireless Systems." Thesis, University of Waterloo, 2004. http://hdl.handle.net/10012/940.
Full textKailasanathan, Chandrapal. "Securing digital images." Access electronically, 2003. http://www.library.uow.edu.au/adt-NWU/public/adt-NWU20041026.150935/index.html.
Full textNoura, Mohamad. "Solutions cryptographiques efficaces et sécurisées pour les données médicales." Thesis, Bourgogne Franche-Comté, 2019. http://www.theses.fr/2019UBFCD037.
Full textMohamed, Ali. "Investigation of Anisoplanatic Chaos-based Signal and Image Transmission and Retrieval Through Atmospheric Phase Turbulence." University of Dayton / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=dayton1583406088398142.
Full textHe, Kun. "Content privacy and access control in image-sharing platforms." Thesis, CentraleSupélec, 2017. http://www.theses.fr/2017CSUP0007.
Full textSuresh, V. "Image Structures For Steganalysis And Encryption." Thesis, 2010. http://etd.iisc.ernet.in/handle/2005/2273.
Full textYen, Jun-Zhong, and 顏君仲. "Online/Offline Image Encryption Mechanism." Thesis, 2012. http://ndltd.ncl.edu.tw/handle/47224732554143659596.
Full textHsiao, Hung-Yi, and 蕭弘益. "A Study of Chaotic Image Encryption." Thesis, 2005. http://ndltd.ncl.edu.tw/handle/r7p54c.
Full textWu, Chang-Sian, and 巫昌憲. "A Study of Batch Image Encryption." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/93711550800291119496.
Full textOu-Yang, Yen, and 歐陽諺. "Fast Image Encryption Based on Lifting Wavelet Transform and Advanced Encryption Standard." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/89200471963606880129.
Full text劉江龍. "An Image Encryption Schme with Compression Effect." Thesis, 1995. http://ndltd.ncl.edu.tw/handle/28801436180557353851.
Full textHsu, Y. H., and 許怡樺. "Image Hybrid Encryption Based on Chaotic Systems." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/92878874310440753110.
Full textHsu, Po-Yu, and 許柏昱. "Secret Sharing with Image Encryption Access Control Mechanisms for Digital Images." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/dk5e2e.
Full textYu-Chia, Liu, and 劉育嘉. "Acceleration of the Encryption of Digital Medical Image." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/59589941446042049381.
Full textChuang, Ming-Chuan, and 莊銘權. "Suitable for JPEG 2000 Image Encryption/Decryption Scheme." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/85047454584863342890.
Full textBarakat, Mohamed L. "Hardware Realization of Chaos Based Symmetric Image Encryption." Thesis, 2012. http://hdl.handle.net/10754/234953.
Full textWang, Chin-Yuan, and 王群元. "FPGA Implementation of Chaos Algorithm for Image Encryption." Thesis, 2007. http://ndltd.ncl.edu.tw/handle/14013934425841318521.
Full textYekkala, Anil Kumar. "Analysis And Design Of Image And Video Encryption Algorithms." Thesis, 2006. http://hdl.handle.net/2005/436.
Full textChen, Ji-Tian, and 陳吉田. "Fast Image Encryption Technique for H.261 Video System." Thesis, 1996. http://ndltd.ncl.edu.tw/handle/57512107312564452704.
Full textLIU, SHANG-SHIN, and 劉尚鑫. "Reversible Data Hiding and Image Encryption in Frequency Domain." Thesis, 2017. http://ndltd.ncl.edu.tw/handle/z9quac.
Full text