I've completed my graduation in Electrical and Electronic Engineering. Seeking to admit me into a renowned university for Higher studies. Research interest in Bioinformatics, Signal processing, Machine learning, Neural networks.
The Badminton Activity Recognition (BAR) Dataset was collected for the sport of Badminton for 12 ... more The Badminton Activity Recognition (BAR) Dataset was collected for the sport of Badminton for 12 commonly played strokes. Besides the strokes, the objective of the dataset is to capture the associated leg movements.
2019 IEEE 5th International Conference for Convergence in Technology (I2CT), 2019
With the massive expansion of image security for day to day purposes, image watermarking has beco... more With the massive expansion of image security for day to day purposes, image watermarking has become a critical factor regarding protection schemes. Here, we proposed a watermarking plan where we created a secondary image using directive contrast of the DWT (Discrete Wavelet Transform) subbands from the host image and used this secondary image for watermark embedding using DWT-SVD transformation. The horizontal subband was decomposed up to 2-levels during insertion of the watermark into the cover image to achieve better performance against noise attacks. The obtained results depict that our scheme can resist a number of signal processing attacks maintaining good perceptual quality with PSNR above 50 dB and NC more than 0.99. The evaluations of our process justify both of the imperceptibility to human visual system and robustness against noise attacks which are the prime aspects of image watermarking.
2017 3rd International Conference on Electrical Information and Communication Technology (EICT), 2017
The rapid acceleration in the growth of digitized media has made authentication and protection of... more The rapid acceleration in the growth of digitized media has made authentication and protection of digital data through watermarking vitally important. In this paper, we proposed a semi blind watermarking scheme utilizing both Discrete Wavelength Transform (DWT) and Singular Value Decomposition (SVD). To embed the watermark, we transformed the host image into wavelet domain and generated a secondary host image using directive contrast. By remodeling the SVD coefficients of the watermark with the SVD coefficients of secondary image we inserted the watermark into the secondary image. A genuine extraction scheme has also been developed to recover the watermark from the cover image. The scheme has been employed using horizontal sub band. In addition to, evaluations have been added in terms of vertical and diagonal sub bands to compare the performance of the algorithm on the basis of specific sub bands. Experimental evaluations in terms of Normalized Correlation (NC) and Peak Signal to Noise Ratio (PSNR) give proof that our procedure is durable and imperceptible under variety of attacks.
The rapid acceleration in the growth of digitized media has made authentication and protection o... more The rapid acceleration in the growth of digitized media has made authentication and protection of digital data through watermarking vitally important. In this paper, we proposed a semi blind watermarking scheme utilizing both Discrete Wavelength Transform (DWT) and Singular Value Decomposition (SVD). To embed the watermark, we transformed the host image into wavelet domain and generated a secondary host image using directive contrast. By remodeling the SVD coefficients of the watermark with the SVD coefficients of secondary image we inserted the watermark into the secondary image. A genuine extraction scheme has also been developed to recover the watermark from the cover image. The scheme has been employed using horizontal sub band. In addition to, evaluations have been added in terms of vertical and diagonal sub bands to compare the performance of the algorithm on the basis of specific sub bands. Experimental evaluations in terms of Normalized Correlation (NC) and Peak Signal to Noise Ratio (PSNR) give proof that our procedure is durable and imperceptible under variety of attacks. Keywords—discrete wavelet transform, human visual system, singular value decomposition, watermarking, directive contrast.
— The rapid acceleration in the growth of digitized media has made authentication and protection ... more — The rapid acceleration in the growth of digitized media has made authentication and protection of digital data through watermarking vitally important. In this paper, we proposed a semi blind watermarking scheme in the joint DWT-SVD domain. To embed the watermark, we transformed the host image into wavelet domain and generated a reference image using directive contrast. By remodeling the SVD coefficients of the watermark with the SVD coefficients of reference image we inserted the watermark into the reference image. A genuine extraction scheme has also been developed to recover the watermark from the cover image. The scheme has been employed using horizontal sub band. In addition to, evaluations have been added in terms of vertical and diagonal sub bands to compare the performance of the algorithm on the basis of specific sub bands. Experimental evaluations in terms NC and PSNR give proof that our procedure is durable and imperceptible under variety of attacks.
The Badminton Activity Recognition (BAR) Dataset was collected for the sport of Badminton for 12 ... more The Badminton Activity Recognition (BAR) Dataset was collected for the sport of Badminton for 12 commonly played strokes. Besides the strokes, the objective of the dataset is to capture the associated leg movements.
2019 IEEE 5th International Conference for Convergence in Technology (I2CT), 2019
With the massive expansion of image security for day to day purposes, image watermarking has beco... more With the massive expansion of image security for day to day purposes, image watermarking has become a critical factor regarding protection schemes. Here, we proposed a watermarking plan where we created a secondary image using directive contrast of the DWT (Discrete Wavelet Transform) subbands from the host image and used this secondary image for watermark embedding using DWT-SVD transformation. The horizontal subband was decomposed up to 2-levels during insertion of the watermark into the cover image to achieve better performance against noise attacks. The obtained results depict that our scheme can resist a number of signal processing attacks maintaining good perceptual quality with PSNR above 50 dB and NC more than 0.99. The evaluations of our process justify both of the imperceptibility to human visual system and robustness against noise attacks which are the prime aspects of image watermarking.
2017 3rd International Conference on Electrical Information and Communication Technology (EICT), 2017
The rapid acceleration in the growth of digitized media has made authentication and protection of... more The rapid acceleration in the growth of digitized media has made authentication and protection of digital data through watermarking vitally important. In this paper, we proposed a semi blind watermarking scheme utilizing both Discrete Wavelength Transform (DWT) and Singular Value Decomposition (SVD). To embed the watermark, we transformed the host image into wavelet domain and generated a secondary host image using directive contrast. By remodeling the SVD coefficients of the watermark with the SVD coefficients of secondary image we inserted the watermark into the secondary image. A genuine extraction scheme has also been developed to recover the watermark from the cover image. The scheme has been employed using horizontal sub band. In addition to, evaluations have been added in terms of vertical and diagonal sub bands to compare the performance of the algorithm on the basis of specific sub bands. Experimental evaluations in terms of Normalized Correlation (NC) and Peak Signal to Noise Ratio (PSNR) give proof that our procedure is durable and imperceptible under variety of attacks.
The rapid acceleration in the growth of digitized media has made authentication and protection o... more The rapid acceleration in the growth of digitized media has made authentication and protection of digital data through watermarking vitally important. In this paper, we proposed a semi blind watermarking scheme utilizing both Discrete Wavelength Transform (DWT) and Singular Value Decomposition (SVD). To embed the watermark, we transformed the host image into wavelet domain and generated a secondary host image using directive contrast. By remodeling the SVD coefficients of the watermark with the SVD coefficients of secondary image we inserted the watermark into the secondary image. A genuine extraction scheme has also been developed to recover the watermark from the cover image. The scheme has been employed using horizontal sub band. In addition to, evaluations have been added in terms of vertical and diagonal sub bands to compare the performance of the algorithm on the basis of specific sub bands. Experimental evaluations in terms of Normalized Correlation (NC) and Peak Signal to Noise Ratio (PSNR) give proof that our procedure is durable and imperceptible under variety of attacks. Keywords—discrete wavelet transform, human visual system, singular value decomposition, watermarking, directive contrast.
— The rapid acceleration in the growth of digitized media has made authentication and protection ... more — The rapid acceleration in the growth of digitized media has made authentication and protection of digital data through watermarking vitally important. In this paper, we proposed a semi blind watermarking scheme in the joint DWT-SVD domain. To embed the watermark, we transformed the host image into wavelet domain and generated a reference image using directive contrast. By remodeling the SVD coefficients of the watermark with the SVD coefficients of reference image we inserted the watermark into the reference image. A genuine extraction scheme has also been developed to recover the watermark from the cover image. The scheme has been employed using horizontal sub band. In addition to, evaluations have been added in terms of vertical and diagonal sub bands to compare the performance of the algorithm on the basis of specific sub bands. Experimental evaluations in terms NC and PSNR give proof that our procedure is durable and imperceptible under variety of attacks.
Uploads
Papers by Emon Dey
Drafts by Emon Dey