{"title":"DIMENSIONALITY REDUCTION BASED CLASSIFICATION USING GENERATIVE ADVERSARIAL NETWORKS DATASET GENERATION","authors":"Narendra Gopal, Sivakumar D","doi":"10.21917/ijivp.2022.0396","DOIUrl":"https://doi.org/10.21917/ijivp.2022.0396","url":null,"abstract":"The term data augmentation refers to an approach that can be used to prevent overfitting in the training dataset, which is where the issue first manifests itself. This is based on the assumption that extra datasets can be improved by include new information that is of use. It is feasible to create an artificially larger training dataset by utilizing methods such as data warping and oversampling. This will allow for the creation of more accurate models. This idea is demonstrated through the application of a variety of different methods, some of which include neural style transfer, adversarial training, and erasure by random erasure, amongst others. By utilizing oversampling augmentations, it is feasible to create synthetic instances that can be incorporated into the training data. This is made possible by the generation of synthetic instances. There are numerous illustrations of this, including image merging, feature space enhancements, and generative adversarial networks, to name a few (GANs). In this paper, we aim to provide evidence that a Generative Adversarial Network can be used to convert regular images into Hyper Spectral Images (HSI). The purpose of the model is to generate data by including a certain amount of unpredictable noise.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49020193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CLASSIFICATION OF BRAIN TUMOR USING BEES SWARM OPTIMISATION","authors":"M. Ramkumar, M. Babu, R. Lakshminarayanan","doi":"10.21917/ijivp.2019.0287","DOIUrl":"https://doi.org/10.21917/ijivp.2019.0287","url":null,"abstract":"Nowadays, processing the medical image is a most significant diagnostic process. Usually RMI is used to detect the presence of and type of tumor. The following process is very complicated in the brain tumor classification. The treatment of medical images, such as image segmentation, image extraction, and image classification, takes various steps. Various types of properties such as intensity, forms and texture-based features are extracted from a segmented MRI image. The feature selection approach is employed to select a small subset of MRI image features that minimize redundancy and maximize target-related pertinence. This article uses the Bees Swarm Optimization (BSO) for the selection and the Neural Network Classifier to classify the type of tumor in present brain MRI images, and then takes online MRI images which contain brain tumor, then a machine-learning model.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45465888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ADVANCED COLOR COVERT IMAGE SHARING USING ARNOLD CAT MAP AND VISUAL CRYPTOGRAPHY","authors":"B. Sapna, K. Sudha","doi":"10.21917/ijivp.2019.0288","DOIUrl":"https://doi.org/10.21917/ijivp.2019.0288","url":null,"abstract":"The demand for effective information security schemes is increasing day by day with the continual growth of the internet. Visual cryptography (VC) is a very important secret sharing scheme. The essential step behind this secret sharing scheme is to convert the color covert image into multiple indecipherable image shares so it cannot reveal the data within the color covert image unless combined along by some mathematical calculation. This paper proposes an advanced color covert image-sharing scheme using Arnold cat map (ACM) and VC. The random matrix-encoding scheme encodes the color covert image into an image matrix. ACM algorithm disrupts the high correlation among the pixels of the image matrix to generate an encrypted image. The generation of shares from this encrypted image is by VC that uses pixel reversal and random matrix generator. The shares one by one does not provide any information concerning the color covert image however put together they offer back the encrypted image. The projected paradigm offers 3 levels of security and through decipherment gives back the covert image without loss of information. Related examples and experimental results reveal the effectiveness of this scheme.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42023624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A SPATIAL DOMAIN BASED SECURE AND ROBUST VIDEO WATERMARKING TECHNIQUE USING MODIFIED LSB AND SECRET IMAGE SHARING","authors":"V. Sharma, M. Gangarde, Shruti Oza","doi":"10.21917/ijivp.2019.0293","DOIUrl":"https://doi.org/10.21917/ijivp.2019.0293","url":null,"abstract":"This paper proposes a spatial domain based video watermarking scheme to improve security of the video data using a combination of modified LSB watermarking technique of spatial domain and a (n, n) secret image sharing scheme. In this scheme the secret image sharing scheme is applied during transmission right after the embedding of the watermark in the video frame to overcome the drawback of the single LSB technique. This combination ensures high security and robustness as the watermarked image is being distributed into 3 meaningless shares during transmission thus making it imperceptible to the attacker. This dual scheme improves the extraction capability of the secret message and enhances the information embedding capacity. The average PSNR obtained was 55dB which proves that the quality of reconstruction is high and higher than most of the existing watermarking techniques in similar domain.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45566262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SMART GESTURE USING REAL TIME OBJECT TRACKING","authors":"S. Bhat, N. Lavanya, M. Anusuya","doi":"10.21917/ijivp.2019.0290","DOIUrl":"https://doi.org/10.21917/ijivp.2019.0290","url":null,"abstract":"Gesture can be used to interact with the computer without any physical contact. The use of keyboard and mouse can be minimized. Gesture can be of various types. One such type is movement of hand in a particular posture. To detect these type of gestures first it must be verified that the hand is present in frame and is present in the required posture. The first one is achieved by creating a mask of the frame considering the skin color range in the HSV color space. The later part involves shape matching with some template shape. The shape matching involves computing of central moments between the mask and the template shape. The hand posture defines the start and end of gesture. All the movement of hand between start and end of gesture is tracked and gesture is recognized from the tracked data. For the purpose of recognition, Convolution Neural Network is used. An application is built on recognition. Once a gesture is recognized an event will be triggered.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43484965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SECURE TRANSMISSION OF DATA USING IMAGE STEGANOGRAPHY","authors":"Sourabh Chandra, Smita Paira","doi":"10.21917/ijivp.2019.0291","DOIUrl":"https://doi.org/10.21917/ijivp.2019.0291","url":null,"abstract":"Data is one of the most relevant and important term from the ancient Greek age to modern science and business. The amount of data and use of data transformation for organizational work is increasing. So, for the sake of security and to avoid data loss and unauthorized access of data we have designed an image Steganographic algorithm implementing both Cryptography and Steganography. This algorithm imposed a cipher text within a cover image to conceal the existence of the cipher text and the stego-image is transferred from sender to intended receiver by invoking a distributed connection among them to achieve the data authenticity.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47197528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A NOVEL SEGMENTATION AND CLASSIFICATION TECHNIQUES FOR MRI BRAIN TUMOR IMAGES","authors":"M. Abinaya, S. Padma","doi":"10.21917/ijivp.2019.0289","DOIUrl":"https://doi.org/10.21917/ijivp.2019.0289","url":null,"abstract":"Medical image process is that the most difficult and rising field these days. To solve various problems in medical imaging such as medical image segmentation, object extraction and image classification etc. This work presents a performance of the rough set based approaches. The detection and identification of brain tumour from MRI is crucial to decrease the speed of casualties. Brain tumor is tough to cure, as a result of the brain feature terribly complicated structure and also the tissues are interconnected with one another during a sophisticated manner. The proposed method uses a novel discriminative framework for multilabel automated brain tumor segmentation. The method selects the most relevant features and segments edema and tumor using a classification algorithm based on Multiple Kernel Learning (MKL). Feature selection and dictionary learning in image segmentation are usually combined with RUSBOOST classifier for identifying the tumor. The RF classifier has increased the classification accuracy as evident by quantitative results of our proposed method which are comparable or higher than the state of the art.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47599284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"STREETLIGHT OBJECTS RECOGNITION BY REGION AND HISTOGRAM FEATURES IN AN AUTONOMOUS VEHICLE SYSTEM","authors":"Martins E. Irhebhude, M. Shabi, A. Kolawole","doi":"10.21917/ijivp.2019.0292","DOIUrl":"https://doi.org/10.21917/ijivp.2019.0292","url":null,"abstract":"In this paper Streetlight object identification is addressed using the notion of image processing. An approach based on Image Processing Techniques is proposed for selection and processing of features from the images. Histogram and Region was applied on the extracted images. Histogram and Region features were then extracted and employed to train the Support Vector Machine (SVM) classifier for streetlight recognition. Experimental results shows 99.1%, 84% and 100% for histogram, region features and combination of both respectively. Experimental results have proved that the proposed method is robust, accurate, and powerful in object recognition.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42301962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DETECTION OF SEPTORIA SPOT ON BLUEBERRY LEAF IMAGES USING SVM CLASSIFIER","authors":"M. Latha, S. Jaya","doi":"10.21917/ijivp.2019.0286","DOIUrl":"https://doi.org/10.21917/ijivp.2019.0286","url":null,"abstract":"Identification and classification of the plant leaf is efficient way to preventing loss occurred in agricultural field. The Septoria leaf spot is mainly affect the leaves which caused by a fungus, flu, bacteria. The Production of blueberry fruit is decreasing due to the disease affected on its stem and leaf. Small brown spots are frequently visible on blueberry leaves at specific period in the year. The spots, generally surrounded by bright yellow halos, start on the lower leaves and slowly appear on upper leaves over time. Image processing technology has been proved to be an efficient analysis to identify and detect the disease on a leaf. This proposed paper intends to focus to detect and classify a Septoria leaf spot on blueberry using Image Processing techniques such as, k-means clustering (k-nearest neighbor) for Segmentation, Gray-Level Co-occurrence Matrix for feature extraction and Support Vector Machine classifier to detect the leaf stage whether it is affected by Septoria spot or not. Totally 13 features have been extracted from each Blueberry leaf images where dataset of 40 images were taken for training and testing process partially and obtained the accuracy level was 96.77% using F-measure.","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49076665","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"QUALITATIVE ANALYSIS OF VARIOUS EDGE DETECTION TECHNIQUES APPLIED ON CERVICAL HERNIATED SPINE IMAGES","authors":"C. Malarvizhi, P. Balamurugan","doi":"10.21917/ijivp.2019.0282","DOIUrl":"https://doi.org/10.21917/ijivp.2019.0282","url":null,"abstract":"","PeriodicalId":30615,"journal":{"name":"ICTACT Journal on Image and Video Processing","volume":" ","pages":""},"PeriodicalIF":0.0,"publicationDate":"2019-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42621674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}