-
Image Encryption Decryption Using Chaotic Logistic Map** and DNA Encoding
Authors:
Sakshi Patel,
Bharath K P,
Rajesh Kumar Muthu
Abstract:
In this paper we have proposed a method that uses chaotic logistic map** and DNA encoding to encrypt the image. A 32 bit ASCII private key is used to diffuse the image. The results demonstrated clearly show that encryption algorithm based on chaotic logistic map** and DNA encoding gives better result than encrypting only with chaotic logistic map**. The proposed method also takes into accoun…
▽ More
In this paper we have proposed a method that uses chaotic logistic map** and DNA encoding to encrypt the image. A 32 bit ASCII private key is used to diffuse the image. The results demonstrated clearly show that encryption algorithm based on chaotic logistic map** and DNA encoding gives better result than encrypting only with chaotic logistic map**. The proposed method also takes into account the possible parametric like Peak Signal to Noise Ratio and Structure Similarity.
△ Less
Submitted 14 March, 2020;
originally announced March 2020.
-
Medical Image Enhancement Using Histogram Processing and Feature Extraction for Cancer Classification
Authors:
Sakshi Patel,
Bharath K P,
Rajesh Kumar Muthu
Abstract:
MRI (Magnetic Resonance Imaging) is a technique used to analyze and diagnose the problem defined by images like cancer or tumor in a brain. Physicians require good contrast images for better treatment purpose as it contains maximum information of the disease. MRI images are low contrast images which make diagnoses difficult; hence better localization of image pixels is required. Histogram Equaliza…
▽ More
MRI (Magnetic Resonance Imaging) is a technique used to analyze and diagnose the problem defined by images like cancer or tumor in a brain. Physicians require good contrast images for better treatment purpose as it contains maximum information of the disease. MRI images are low contrast images which make diagnoses difficult; hence better localization of image pixels is required. Histogram Equalization techniques help to enhance the image so that it gives an improved visual quality and a well defined problem. The contrast and brightness is enhanced in such a way that it does not lose its original information and the brightness is preserved. We compare the different equalization techniques in this paper; the techniques are critically studied and elaborated. They are also tabulated to compare various parameters present in the image. In addition we have also segmented and extracted the tumor part out of the brain using K-means algorithm. For classification and feature extraction the method used is Support Vector Machine (SVM). The main goal of this research work is to help the medical field with a light of image processing.
△ Less
Submitted 14 March, 2020;
originally announced March 2020.
-
Medicine Strip Identification using 2-D Cepstral Feature Extraction and Multiclass Classification Methods
Authors:
Anirudh Itagi,
Ritam Sil,
Saurav Mohapatra,
Subham Rout,
Bharath K P,
Karthik R,
Rajesh Kumar Muthu
Abstract:
Misclassification of medicine is perilous to the health of a patient, more so if the said patient is visually impaired or simply did not recognize the color, shape or type of medicine strip. This paper proposes a method for identification of medicine strips by 2-D cepstral analysis of their images followed by performing classification that has been done using the K-Nearest Neighbor (KNN), Support…
▽ More
Misclassification of medicine is perilous to the health of a patient, more so if the said patient is visually impaired or simply did not recognize the color, shape or type of medicine strip. This paper proposes a method for identification of medicine strips by 2-D cepstral analysis of their images followed by performing classification that has been done using the K-Nearest Neighbor (KNN), Support Vector Machine (SVM) and Logistic Regression (LR) Classifiers. The 2-D cepstral features extracted are extremely distinct to a medicine strip and consequently make identifying them exceptionally accurate. This paper also proposes the Color Gradient and Pill shape Feature (CGPF) extraction procedure and discusses the Binary Robust Invariant Scalable Keypoints (BRISK) algorithm as well. The mentioned algorithms were implemented and their identification results have been compared.
△ Less
Submitted 3 February, 2020;
originally announced March 2020.
-
Performance Analysis of Adaptive Noise Cancellation for Speech Signal
Authors:
Pratibha Balaji,
Shruthi Narayan,
Durga Sraddha,
Bharath K P,
Karthik R,
Rajesh Kumar Muthu
Abstract:
This paper gives a broader insight on the application of adaptive filter in noise cancellation during various processes where signal is transmitted. Adaptive filtering techniques like RLS, LMS and normalized LMS are used to filter the input signal using the concept of negative feedback to predict its nature and remove it effectively from the input. In this paper a comparative study between the eff…
▽ More
This paper gives a broader insight on the application of adaptive filter in noise cancellation during various processes where signal is transmitted. Adaptive filtering techniques like RLS, LMS and normalized LMS are used to filter the input signal using the concept of negative feedback to predict its nature and remove it effectively from the input. In this paper a comparative study between the effectiveness of RLS, LMS and normalized LMS is done based on parameters like SNR (Signal to Noise ratio), MSE (Mean squared error) and cross correlation. Implementation and analysis of the filters are done by taking different step sizes on different orders of the filters.
△ Less
Submitted 3 February, 2020;
originally announced February 2020.
-
Speech Emotion Recognition using Support Vector Machine
Authors:
Manas Jain,
Shruthi Narayan,
Pratibha Balaji,
Bharath K P,
Abhijit Bhowmick,
Karthik R,
Rajesh Kumar Muthu
Abstract:
In this project, we aim to classify the speech taken as one of the four emotions namely, sadness, anger, fear and happiness. The samples that have been taken to complete this project are taken from Linguistic Data Consortium (LDC) and UGA database. The important characteristics determined from the samples are energy, pitch, MFCC coefficients, LPCC coefficients and speaker rate. The classifier used…
▽ More
In this project, we aim to classify the speech taken as one of the four emotions namely, sadness, anger, fear and happiness. The samples that have been taken to complete this project are taken from Linguistic Data Consortium (LDC) and UGA database. The important characteristics determined from the samples are energy, pitch, MFCC coefficients, LPCC coefficients and speaker rate. The classifier used to classify these emotional states is Support Vector Machine (SVM) and this is done using two classification strategies: One against All (OAA) and Gender Dependent Classification. Furthermore, a comparative analysis has been conducted between the two and LPCC and MFCC algorithms as well.
△ Less
Submitted 3 February, 2020;
originally announced February 2020.
-
Data hiding in speech signal using steganography and encryption
Authors:
Hanisha Chowdary N,
Karan K,
Bharath K P,
Rajesh Kumar M
Abstract:
Data privacy and data security are always on highest priority in the world. We need a reliable method to encrypt the data so that it reaches the destination safely. Encryption is a simple yet effective way to protect our data while transmitting it to a destination. The proposed method has state of art technology of steganography and encryption. This paper puts forward a different approach for data…
▽ More
Data privacy and data security are always on highest priority in the world. We need a reliable method to encrypt the data so that it reaches the destination safely. Encryption is a simple yet effective way to protect our data while transmitting it to a destination. The proposed method has state of art technology of steganography and encryption. This paper puts forward a different approach for data hiding in speech signals. A ten-digit number within speech signal using audio steganography and encrypting it with a unique key for better security. At the receiver end the same unique key is used to decrypt the received signal and then hidden numbers are extracted. The proposed approach performance can be evaluated by PSNR, MSE, SSIM and bit-error rate. The simulation results give better performance compared to existing approach.
△ Less
Submitted 13 January, 2020;
originally announced February 2020.
-
OMAP-L138 LCDK Development Kit
Authors:
Bharath K P,
Sylash K,
Pravina K,
Rajesh Kumar M
Abstract:
Low cost and low power consumption processor play a vital role in the field of Digital Signal Processing (DSP). The OMAP-L138 development kit which is low cost, low power consumption, ease and speed, with a wide variety of applications includes Digital signal processing, Image processing and video processing. This paper represents the basic introduction to OMAP-L138 processor and quick procedural…
▽ More
Low cost and low power consumption processor play a vital role in the field of Digital Signal Processing (DSP). The OMAP-L138 development kit which is low cost, low power consumption, ease and speed, with a wide variety of applications includes Digital signal processing, Image processing and video processing. This paper represents the basic introduction to OMAP-L138 processor and quick procedural steps for real time and non-real time implementations with a set of programs. The real time experiments are based on audio in the applications of audio loopback, delay and echo. Whereas the non-real time experiments are generation of a sine wave, low pass and high pass filter.
△ Less
Submitted 13 January, 2020;
originally announced January 2020.
-
Radial Based Analysis of GRNN in Non-Textured Image Inpainting
Authors:
Karthik R,
Anvita Dwivedi,
Haripriya M,
Bharath K P,
Rajesh Kumar M
Abstract:
Image inpainting algorithms are used to restore some damaged or missing information region of an image based on the surrounding information. The method proposed in this paper applies the radial based analysis of image inpainting on GRNN. The damaged areas are first isolated from rest of the areas and then arranged by their size and then inpainted using GRNN. The training of the neural network is d…
▽ More
Image inpainting algorithms are used to restore some damaged or missing information region of an image based on the surrounding information. The method proposed in this paper applies the radial based analysis of image inpainting on GRNN. The damaged areas are first isolated from rest of the areas and then arranged by their size and then inpainted using GRNN. The training of the neural network is done using different radii to achieve a better outcome. A comparative analysis is done for different regression-based algorithms. The overall results are compared with the results achieved by the other algorithms as LS-SVM with reference to the PSNR value.
△ Less
Submitted 13 January, 2020;
originally announced January 2020.
-
Handwritten Character Recognition Using Unique Feature Extraction Technique
Authors:
Sai Abhishikth Ayyadevara,
P N V Sai Ram Teja,
Bharath K P,
Rajesh Kumar M
Abstract:
One of the most arduous and captivating domains under image processing is handwritten character recognition. In this paper we have proposed a feature extraction technique which is a combination of unique features of geometric, zone-based hybrid, gradient features extraction approaches and three different neural networks namely the Multilayer Perceptron network using Backpropagation algorithm (MLP…
▽ More
One of the most arduous and captivating domains under image processing is handwritten character recognition. In this paper we have proposed a feature extraction technique which is a combination of unique features of geometric, zone-based hybrid, gradient features extraction approaches and three different neural networks namely the Multilayer Perceptron network using Backpropagation algorithm (MLP BP), the Multilayer Perceptron network using Levenberg-Marquardt algorithm (MLP LM) and the Convolutional neural network (CNN) which have been implemented along with the Minimum Distance Classifier (MDC). The procedures lead to the conclusion that the proposed feature extraction algorithm is more accurate than its individual counterparts and also that Convolutional Neural Network is the most efficient neural network of the three in consideration.
△ Less
Submitted 13 January, 2020;
originally announced January 2020.