Thesis - Proposal
Thesis - Proposal
Abhilash Poudel
MECE - 16901
Overview
● Introduction
● Problem Statement
● Objectives
● Significance of Study
● Literature Review
● Methodology
● Expected Outcomes
● Timeline
● References
2
Introduction
3
Problem Statement
4
Objectives
5
Significance of Study
6
Literature Review
7
Literature Review
8
Methodology
9
Methodology(Proposed method)
10
Methodology(Proposed method)
11
Methodology
12
Methodology(OS/Languages)
● Kubuntu 18.04
● Intel Core i7-4720 @ 2.60GHz x 8 cores
● 16GB RAM
● Python2.7
○ PIL - Image library
○ Numpy - Numerical Operations
13
Expected Outcome
14
Timeline
Identifying research
Research Question
Proposal
Implementation
Midterm Defense
Analysis
Final Presentation
Documentation
15
References
1. A. Shamir, “How to share a secret,” Commun. ACM, vol. 22, no. 11, pp.612–613, Nov. 1979.
[Online]. Available: http://doi.acm.org/10.1145/359168.359176
2. C.-C. Thien and J.-C. Lin, “Secret image sharing,”Computers &Graphics, vol. 26, no. 5,
pp. 765 – 770, 2002. [Online].
Available:http://www.sciencedirect.com/science/article/pii/S0097849302001310
3. H. S. Chyuan-Huei Thomas Yang, Yuan-Hui Huang, “Reversible secret imagesharing based
on shamir’s scheme with discrete haar wavelet transform,”978-1-4244-8165-1/11/IEEE,
September 2011
4. R. S. P. Sudeep D. Thepade, “Novel reversible image secret sharing based onthien and lin’s
scheme using discrete haar wavelet transform,”978-1-4799-6272-3/15/IEEE, January
2015
5. Z. Zhou, C. Yang, Y. Cao, and X. Sun, “Secret image sharing based on encrypted
pixels,”IEEE Access, vol. 6, pp. 15 021–15 025, 2018
6. P. Singh, B. Raman, and M. Misra, “A secure image sharing scheme based on svd and
fractional fourier transform,”Signal Processing:Image Communication, vol. 57, pp. 46 –
59, 2017.
16
Thank
You