Image fusion of medical images based on Fuzzy set
Image fusion is a technique to improve the image quality. In this paper a new way is drawn to fuse two images by using max-min operations in Sugeno’s Intuitionistic fuzzy generator. It operates on image with lot of uncertainties. Firstly input images are reform into Intuitionistic fuzzy images (IFIs) and then evaluate fuzzy rules by using best entropy of input images, and IFIs are reconstructing based on black-count & white-count. This paper compares the performance of Average, Fuzzy Sets, Intuitionistic Fuzzy Sets and Sugeno’s type Intuitionistic fuzzy (proposed method) in terms of various performance measures.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Hybrid Approach for Secure Message Communication and Color Image Watermarking
This research work is nominated for an image protection technique in the area of spatial domain based digital watermarking and steganography. The proposed work has evolved a hybrid algorithm, Namely, MP-1. In this paper, a new data hiding and digital watermarking algorithm basedonimage matrix vectorization is provided. Experimental results show that the research work has achievedfew of targeted goal such as good concealment ability, large embedding capacity. The proposed algorithm can be widely used in area of spatial domain based digital watermarking and steganography.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Image Fusion using Teaching Learning Based Optimization
Image fusion is one of the techniques in Image processing. In this paper, we are going to propose a Image fusion method based on Teaching Learning Based Optimization. Taking two multifocused images, we are going to divide them into blocks then the contrast visibility of the two image blocks then is calculated. TLBO algorithm is performed to obtain optimal coefficients and fused image is acquired finally using this Optimal Coefficients. For different set of multi focus images, different quantitative measured are calculated. Then the results of proposed method are compared with existing Particle Swarm Optimization.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Image Hiding using Range Normalization
This paper proposes an image hiding technique that exhibits good quality with higher embedding capacity. In this technique, both secret and cover images are divided into non overlapping blocks. The secret image is embedded into a cover image block by block using Range Normalization Technique. This technique exhibits advantages of high embedding capacity with less computational complexity. Compared with the existing algorithms, the quality of the stego and reconstructed image is found to be good.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
A Comparison of Two Kidney Stone Segmentation Techniques
Kidney stone disease is very common among Indians and approximately 5-7 million patients suffer from stone disease.The most popular imaging modality for its treatment is ultrasound imaging.Segmentation accuracy determines the eventual success or failure of computerized analysis procedures. Traditional methods available for segmentation of kidney stones are not accurate. We use the evolutionary techniques for segmentation of the kidney stone ultrasound images for the first time based on electromagnetism optimization algorithm and harmony search algorithm for determining multilevel threshold of images. In most cases, the optimal thresholds are found by the minimizing or maximizing an objective function, which depends on the positions of the thresholds. We identify a class of objective functions for which the optimal thresholds can be found using algorithms with low time complexities. The Kapur’s entropy function and Otsu’s between class variance is maximized using these algorithms and an optimal threshold values at different levels are found out. The area of extracted stone is calculated and compared with the area given by the expert radiologist. The other metric used to compare the segmented image and the original image is the peak signal to-noise-ratio (PSNR) value. The relative error is also calculated to show the segmentation accuracy of each method.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Denoising of Images Based on Different Wavelet Thresholding by Using Various Shrinkage Methods using Basic Noise Conditions
Wavelet transforms enable us to represent signals with a high degree of scarcity. Wavelet thresholding is a signal estimation technique that exploits the capabilities of wavelet transform for signal denoising. The aim of this paper is to study various thresholding techniques such as Sure Shrink, Visu Shrink and Bayes Shrink and determine the best one for image denoising. This paper presents an overview of various threshold methods for image denoising. Wavelet transform based denoising techniques are of greater interest because of their performance over Fourier and other spatial domain techniques. Selection of optimal threshold is crucial since threshold value governs the performance of denoising algorithms. Hence it is required to tune the threshold parameter for better PSNR values. In this paper, we present various wavelet based shrinkage methods for optimal threshold selection for noise removal.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Viewer’s Perception about Code of Ethics and its Application in Political Talk Shows: A Survey Conducted at Sargodha City
The present study is about Viewers Perceptions about Code of Ethics and its Applications in Political Talk Shows (A Survey Conducted at Sargodha City). Political talk shows Capital Talk (Geo News) Kal Tak (Express News) On the Front (Dunya News) Sawal Yeh Hai (ARY News) and News Beat (SAMAA TV) are selected for this study. Total two hundred respondents have been selected for data collection with the help of questionnaire from Sargodha city. Social responsibility theory (SRT) is use to check the application code of ethics of media in the society. The Social Responsibility Theory (SRT) claims that the media has a duty to public and this theoretical approach is a result of shifting media ethics. Present research is identified to find the impact of analysis and discussion by experts through politics talk shows and opportunity of media ethics. This is becoming a more and more essential issue in modern society. Do the anchorpersons of TV political talk shows have focus on social responsibility and respect for media ethics in order to satisfy the public? Empirical findings show that Geo News program Capital Talk is more frequently watched by viewers as compared to other political talk show. It is also finding that Geo News program Capital Talk provides more political awareness as compared to other political talk shows. Findings show that Javed Chudary in his political talk show (Kal Tak) followed code of ethics as compared to other anchorperson TV channels.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
An a new algorithm based on (general singular values decomposition) and (singular values decomposition) for image cryptography
The issue of information security is evolving on a daily basis and the Governments in the world have become e-governments. Which makes it necessary to develop ways to maintain information to protect them from hackers and and protect them from penetration. In this paper we will encrypt the image using two well known matrix analyzers, gsvd and svd, by relying on a complex cryptographic key, an image. The workflow will analyze the image matrix that we want to encrypt and matrix the key image using gsvd analysis.We also analyze the image matrix key using svd analysis. From the resulting matrices of the analyzes we form a new matrix through the process of constructing in a systematic manner and with new values considered large dispersion of the color values of the image matrix that we want to encrypt. This construct we have made will explain it by explaining the algorithm below.The resulting matrix represents the first and most important phase of encryption, a complex coding process that can never be broken. and to reduce the size of the last matrix to a quarter we fold it in a systematic way that can be reversed to retrieve the original values.What distinguishes this algorithm from the rest of the algorithms that preceded it is the readings that appear to the standards of global accuracy especially the encryption time, which did not exceed 1.9 seconds and the decoding time, which did not exceed 0.74 sec it is a very short period of unprecedented.We will make this clear through the tables below.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Application of Error-resilient Transmission of Sleep Apnea Patient Video with Sound over Mobile Network-A Research Based Review
Mobile video-audio transmission systems have delivered patient video with relevant snoring sound to quantify the severity of the sleep apnea patient over wireless networks, but few have optimized video-audio transmission in combination with transmission protocol over error-prone environments using wireless links. In this paper, the performance of the MPEG (Motion Picture Expert Group)-4 error resilient tools with UDP(User Datagram Protocol) protocol were evaluated over a wireless network to suggest the optimum combination of MPEG-4 error resilient tools and UDP packet size suitable for real-time transmission of video-audio transmission over error-prone mobile networks. Through experimentation, it was found that the packet size should correspond to IP(Internet Protocol) datagram size minus UDP and IP header for optimal video-audio quality. Also, for error resilient tool selection, the combination of resynchronization marker and data partitioning showed the best performance.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]
Image Segmentation level Key driven image tampering detection and localization Enhancement
To speed up the process of detection of tamper in an image it is withheld to segment the image, embed segment with watermark and key as to trace the tamper segment in which key is not found rather than tracing for entire image for tamper detection. Tamper detection algorithm based on superpixel segment level key encryption with svd based watermarking scheme is proposed. This method finds tamper location from watermarked superpixel segments of watermarked image. Secrete key embedded in each segment of watermarked image for finding tamper segment first. If keys not found from any of the segment that segment shows tamper segment of image then find area which is tampered from that segment. To improve the efficiency of the proposed tamper detection against various security attacks such as collage attacks, VQ attacks and content removal attacks. The experimental results shown that proposed tamper detection scheme is shows better performance in terms of efficiency of tamper detection rate higher than 99% in average complex attacks, 100% in common attack and tamper finding speed is 0.02 to 0.04 sec. in various attacks.
Please Login using your Registered Email ID and Password to download this PDF.
This article is not included in your organization's subscription.The requested content cannot be downloaded.Please contact Journal office.Click the Close button to further process.
[PDF]