Journal of Image Processing and Artificial Intelligence
Latest Publications


TOTAL DOCUMENTS

14
(FIVE YEARS 14)

H-INDEX

0
(FIVE YEARS 0)

Published By MAT Journals (A Unit Of ARV Infomedia Pvt. Ltd.)

2581-3803

Author(s):  
Beena Ullala Mata B N ◽  
Rishika I. S ◽  
Nikita Jain ◽  
Kaliprasad C S ◽  
Niranjan K R

Utilizing exclusively picture handling procedures, this examination proposes an original strategy for distinguishing the presence of pneumonia mists in chest X-rays (CXR). Collected the several analogue chest CXRs from patients with normal and Pneumonia-infected lungs. Indigenous algorithms have been developed for cropping and for extraction of the lung region from the images. To detect pneumonia clouds first conducted the preprocessing of the image then used the image segmentation techniques like Otsu thresholding K-means clustering and global thresholding and then contour detection algorithm was applied which helped to detect lung boundary, the area’s ratio is used to classify the normal lung from pneumonia affected lung.


Author(s):  
T. Ramalingam ◽  
R. Umamaheswari ◽  
R. C. Karpagalakshmi ◽  
K. Chandramohan ◽  
M. S. Sabari

Agrarian efficiency is tall on which economy exceedingly depends. Typically, the as it were for cause malady discovery potted plant imperative part during horticulture park, as have to one's name illness in plants are very normal. In case legitimate care is not grip in this zone, its justification genuine impacts on potted plant through which item quality, amount or efficiency is pretentious. For occurrence a malady called small malady could be an unsafe illness establish in pine trees in Joined together condition. Location of plant infection by way of a few self-activating advantageous because it diminishes an expansive production of checking in enormous ranches of riding crop, conjointly it recognizes the side effects of illnesses they show up on plant clears out. This venture presents a calculation for image break-up strategy which is apply for framed spot and classification of plant leaf maladies. It too frames study on diverse maladies categorizes methods that can be utilized for plant leaf malady discovery. Image break-up which is an imperative part for malady discovery in plant leaf malady, is done by use inbred reckon.


Author(s):  
C. Saraswathy ◽  
S. Sarumathi

Theft is a major cause of violence around the world. Several valuable things are stolen as a result of security issues in the workplace, bank, and home. In previous years, a variety of techniques were used to reduce the risks. Two of these methods are burglar alarms and CCTV recording. However, these methods are inaccurate and disorganized due to a lack of human attention in such processes. Since such a system requires human maintenance to control the data collected by the camera, it presents a greater problem for shop or home owners. The that rate of crime causes people to struggle both financially and emotionally. As a result, there is a need to prevent theft and develop a security system. It has to be simple to use, free of false alarms, human interference-free, and cost-effective. The primary goal of this paper is to serve as both a concise overview and a reference by providing primary knowledge of various techniques used as well as various research opportunities in this field. A variety of methods for identifying the thief using artificial intelligence based on the face and behaviour recognition are demonstrated in this survey.


Author(s):  
Kaviya K ◽  
Mridula Bala ◽  
Swathy N P ◽  
Chittam Jeevana Jyothi ◽  
S.Ewins Pon Pushpa

Today, the digital and social media platforms are extremely trending, leading a demand to transmit knowledge very firmly. The information that is exchanged daily becomes ‘a victim’ to hackers. To beat this downside, one of the effective solutions is Steganography or Cryptography. In this paper, the video Steganography and cryptography thoughts are employed, where a key text is hidden behind a ‘certain frame’ of the video using Shi-Tomasi corner point detection and Least Significant Bit (LSB) algorithmic rule. Shi-Tomasi algorithmic rule is employed to observe, the corner points of the frame. In the proposed work, a ‘certain frame’ with large number of corner points is chosen from the video. Then, the secret text is embedded within the detected corner points using LSB algorithmic rule and transmitted. At the receiver end, decryption process is employed, in the reverser order of encryption to retrieve the secret data. As a technical contribution, the average variation of Mean Squared Error, Peak Signal to Noise Ratio, Structural Similarity Index are analysed for original and embedded frames and found to be 0.002, 0.016 and 0.0018 respectively.


Author(s):  
Bhagyashree Matheswaran ◽  
Srujana V Veeturi ◽  
Anu Ranjana A ◽  
Preethi L ◽  
S.Ewins Pon Puspha

In the current era, the need for transmission of confidential data is pivotal in all domains of technology. New methodologies are being proposed for this very purpose, each being developed on specific shortcomings of previously proposed methods. In this paper, one such method for embedding and communicating confidential information has been proposed which employs encryption and error correction algorithms to further improve the reliability and robustness of the system. First, the information is preprocessed by encrypting the text using RC4 algorithm. The encrypted text is processed using hamming codes (4,7) to improve its reliability. After the pre-processing stage, the video is processed to identify reliable motion regions using the MOT (Multiple Object Tracking) algorithm. The identified regions are used to embed the confidential text by calculating its DCT coefficients and manipulating its values to embed the information. The non-motion region is used to store the key used during the pre-processing stage. This completes the processes at the transmitter’s part. The inverse of the process-extraction and decoding is applied at the receiver’s side to retrieve the confidential piece of information being transferred. The proposed methodology further focusses on comparing the visual quality and hiding capacity achieved by adopting DCT and DWT algorithms, to determine the better of the two frequency domain techniques in steganographic applications.


Author(s):  
Mrinal Walia ◽  
Raghavendra . ◽  
Raihan Iqbal ◽  
Ranjith T. R ◽  
Deepak G ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document