Emerging Research in Computing, Information, Communication and Applications, 2015
X-ray image is one of the prominent modality of medical imaging used in medical diagnosis. This m... more X-ray image is one of the prominent modality of medical imaging used in medical diagnosis. This may be corrupted with Gaussian noise due to thermal fluctuations during its acquisition. For reducing these noises a method is applied which combines the Anisotropic Diffusion filter with an edge preserved Wavelet Packet Transformation. Here the edges are detected in each sub-band using Sobel edge detection operator and preserved by excluding these edge coefficients during hard thresholding. This method has proposed a new technique to calculate a threshold value for each sub-band of Wavelet Packet. The quality metrics SNR, RMSE, SSIM, Precision, Accuracy and etc. are used to measure the performance of this method and shows that this approach is better as compared to other noise reduction methods like Adaptive Median Filter, simple Anisotropic Diffusion and simple Wavelet Packet Transformation.
2008 First International Conference on Emerging Trends in Engineering and Technology, 2008
This paper describes an image-based system to detect spoof fingerprint attacks in fingerprint bio... more This paper describes an image-based system to detect spoof fingerprint attacks in fingerprint biometric systems. It is based on the observation that, real and spoof fingerprints exhibit different textural characteristics. These are based on structural, orientation, roughness, smoothness and regularity differences of diverse regions in a fingerprint image. Local binary pattern (LBP) histograms are used to capture these textural details.
Perspiration phenomenon is very significant to detect the liveness of a finger. However, it requi... more Perspiration phenomenon is very significant to detect the liveness of a finger. However, it requires two consecutive fingerprints to notice perspiration, and therefore may not be suitable for real time authentications. Some other methods in the literature need extra hardware to detect liveness. To alleviate these problems, in this paper, to detect liveness a new texture-based method using only the first fingerprint is proposed. It is based on the observation that real and spoof fingerprints exhibit different texture characteristics. Textural measures based on gray level co-occurrence matrix (GLCM) are used to characterize fingerprint texture. This is based on structural, orientation, roughness, smoothness and regularity differences of diverse regions in a fingerprint image. Wavelet energy signature is also used to obtain texture details. Dimensionalities of feature sets are reduced by Sequential Forward Floating Selection (SFFS) method. GLCM texture features and wavelet energy signa...
In this paper, face recognition technique using real Dual Tree Discrete Wavelet Transform (DT-DWT... more In this paper, face recognition technique using real Dual Tree Discrete Wavelet Transform (DT-DWT) is proposed. This approach is based on local appearance feature extraction using directional multiresolution decomposition offered by real DT-DWT. It provides a local multiscale description of images with good directional selectivity, effective edge representation and invariance to shifts and in-plane rotations. The real DT-DWT is less redundant and computationally efficient. The fusion of local coefficients of detail subbands are used to extract the facial features using feature variance. The features are used for classification process using Mahalanobis distance. The technique is validated using 9 pose and 2 pose per person of ORL face dataset and 2 pose per person of YALE face dataset. The experimental results outperform traditional methods like PCA, LDA and DCT normalization.
Breaches of multimedia security are increasing day by day as advancement in technologies have tig... more Breaches of multimedia security are increasing day by day as advancement in technologies have tightly coupled the globe and promoted easy sharing of multimedia content in no loss of time. A dual watermarking scheme ascertaining the rightful ownership and integrity of images is proposed here. A gray scale logo used as copyright information of the owner is embedded imperceptibly into the singular values of the cover image in multiple locations. The multiplicity of embedding ensures extraction of embedded information even in worst tampered scenarios and hence, prove the rightful ownership. The proposed scheme also performed pixel wise authentication which fetched the advantage of accurate tamper localization in case of alterations. The visual quality of the watermarked image is maintained high as indicated by the high Peak-Signal-to-Noise-Ratio(PSNR) values. The robustness of the scheme is tested against comprehensive set of attacks and evaluated by various objective evaluation paramet...
Traditional k out of n visual cryptography scheme has been proposed to encrypt single secret imag... more Traditional k out of n visual cryptography scheme has been proposed to encrypt single secret image into n shares where only k or more shares can decode the secret image. Many existing schemes on visual cryptography are restricted to consider only binary images as secret which are not appropriate for many important applications. Store-and-Forward telemedicine is one such application where medical images are transmitted from one site to another via electronic medium to analyze the patient's clinical health status. The main objective of Store-and-Forward telemedicine is to provide remote clinical services via two-way communication between the patient and the healthcare provider using electronic medical image, audio and video means. In this paper, a new XOR based Continuous-tone Multi Secret Sharing scheme suitable for store-and-forward telemedicine is proposed to securely transmit the medical images. It also eliminates basic security constraints of VC like pixel expansion in shares/recovered secret images, random pattern of shares, explicit codebook requirement, lossy recovery of secret and limitation on number of secret and shares. Proposed approach is n out of n multi secret sharing scheme which is able to transmit n secret images simultaneously. All secrets could be revealed only after some computations with all n shares and one master share. Master share has been created with the secret key at encoding phase and it can be regenerated at the time of decoding using same secret key. Here all shares are meaningful in continuous-tone which may provide confidentiality to medical images during transmission. Proposed approach not only preserves all basic characteristics Shivendra Shivani
In traditional k-out-of-n visual cryptography (VC), a secret image is visually decoded only if a ... more In traditional k-out-of-n visual cryptography (VC), a secret image is visually decoded only if a subset of k or more shares are stacked together else nothing will be revealed. Progressive visual cryptography (PVC) scheme differs from the traditional VC where clarity and contrast of the decoded secret image are increased progressively with the number of stacked shares. Shares are most sensible objects since they carry secret; hence, verifying the reliability and authenticity of all shares before decoding the secret image prevents a participant from intentionally or unintentionally providing invalid data. This paper proposes a novel verifiable progressive visual cryptography approach with additional embedding capacity in each share which is used for self-embedding authentication data, copyright information along with confidential payload. These embedded informations in a share can be retrieved and verified at the time of any conflict. Proposed approach also eliminates many unnecessary encryption constraints of VC like pixel expansion, noise-like shares, explicit requirement of codebook and restriction on number of participants. Experiments show that in spite of having various credentials of participants, embedded in shares, the contrast of the decoded secret image remains 50 % without reducing the level of secrecy. By experiments, it is also confirmed that proposed approach can effectively localize the tampered region of the share.
International Journal of Computer Applications, 2013
A visual cryptography based watermarking scheme incorporating the concepts of singular value deco... more A visual cryptography based watermarking scheme incorporating the concepts of singular value decomposition (SVD) and the homogeneity analysis of the cover image is proposed here. Firstly, feature vectors are created from the singular values of the homogeneous blocks and thereby classified using the k-medoid clustering technique. A master share is then constructed based on the clustering result and thereafter, combined with the secret binary image (watermark) ownership share is build up. This ownership share is registered with the certificate authority in case to resolve any dispute regarding rightful ownership of the image in future. A two-out-of-two visual cryptography scheme is being used in the proposed methodology and robustness validated by applying comprehensive set of attacks. The peak signal to noise ratio (PSNR) and normalized cross correlation (NCC) metric values are used for evaluation of the scheme. Higher values of these metrics establish the appropriateness of the proposed methodology as compared to the other state of art schemes for copyright protection.
Emerging Research in Computing, Information, Communication and Applications, 2015
X-ray image is one of the prominent modality of medical imaging used in medical diagnosis. This m... more X-ray image is one of the prominent modality of medical imaging used in medical diagnosis. This may be corrupted with Gaussian noise due to thermal fluctuations during its acquisition. For reducing these noises a method is applied which combines the Anisotropic Diffusion filter with an edge preserved Wavelet Packet Transformation. Here the edges are detected in each sub-band using Sobel edge detection operator and preserved by excluding these edge coefficients during hard thresholding. This method has proposed a new technique to calculate a threshold value for each sub-band of Wavelet Packet. The quality metrics SNR, RMSE, SSIM, Precision, Accuracy and etc. are used to measure the performance of this method and shows that this approach is better as compared to other noise reduction methods like Adaptive Median Filter, simple Anisotropic Diffusion and simple Wavelet Packet Transformation.
2008 First International Conference on Emerging Trends in Engineering and Technology, 2008
This paper describes an image-based system to detect spoof fingerprint attacks in fingerprint bio... more This paper describes an image-based system to detect spoof fingerprint attacks in fingerprint biometric systems. It is based on the observation that, real and spoof fingerprints exhibit different textural characteristics. These are based on structural, orientation, roughness, smoothness and regularity differences of diverse regions in a fingerprint image. Local binary pattern (LBP) histograms are used to capture these textural details.
Perspiration phenomenon is very significant to detect the liveness of a finger. However, it requi... more Perspiration phenomenon is very significant to detect the liveness of a finger. However, it requires two consecutive fingerprints to notice perspiration, and therefore may not be suitable for real time authentications. Some other methods in the literature need extra hardware to detect liveness. To alleviate these problems, in this paper, to detect liveness a new texture-based method using only the first fingerprint is proposed. It is based on the observation that real and spoof fingerprints exhibit different texture characteristics. Textural measures based on gray level co-occurrence matrix (GLCM) are used to characterize fingerprint texture. This is based on structural, orientation, roughness, smoothness and regularity differences of diverse regions in a fingerprint image. Wavelet energy signature is also used to obtain texture details. Dimensionalities of feature sets are reduced by Sequential Forward Floating Selection (SFFS) method. GLCM texture features and wavelet energy signa...
In this paper, face recognition technique using real Dual Tree Discrete Wavelet Transform (DT-DWT... more In this paper, face recognition technique using real Dual Tree Discrete Wavelet Transform (DT-DWT) is proposed. This approach is based on local appearance feature extraction using directional multiresolution decomposition offered by real DT-DWT. It provides a local multiscale description of images with good directional selectivity, effective edge representation and invariance to shifts and in-plane rotations. The real DT-DWT is less redundant and computationally efficient. The fusion of local coefficients of detail subbands are used to extract the facial features using feature variance. The features are used for classification process using Mahalanobis distance. The technique is validated using 9 pose and 2 pose per person of ORL face dataset and 2 pose per person of YALE face dataset. The experimental results outperform traditional methods like PCA, LDA and DCT normalization.
Breaches of multimedia security are increasing day by day as advancement in technologies have tig... more Breaches of multimedia security are increasing day by day as advancement in technologies have tightly coupled the globe and promoted easy sharing of multimedia content in no loss of time. A dual watermarking scheme ascertaining the rightful ownership and integrity of images is proposed here. A gray scale logo used as copyright information of the owner is embedded imperceptibly into the singular values of the cover image in multiple locations. The multiplicity of embedding ensures extraction of embedded information even in worst tampered scenarios and hence, prove the rightful ownership. The proposed scheme also performed pixel wise authentication which fetched the advantage of accurate tamper localization in case of alterations. The visual quality of the watermarked image is maintained high as indicated by the high Peak-Signal-to-Noise-Ratio(PSNR) values. The robustness of the scheme is tested against comprehensive set of attacks and evaluated by various objective evaluation paramet...
Traditional k out of n visual cryptography scheme has been proposed to encrypt single secret imag... more Traditional k out of n visual cryptography scheme has been proposed to encrypt single secret image into n shares where only k or more shares can decode the secret image. Many existing schemes on visual cryptography are restricted to consider only binary images as secret which are not appropriate for many important applications. Store-and-Forward telemedicine is one such application where medical images are transmitted from one site to another via electronic medium to analyze the patient's clinical health status. The main objective of Store-and-Forward telemedicine is to provide remote clinical services via two-way communication between the patient and the healthcare provider using electronic medical image, audio and video means. In this paper, a new XOR based Continuous-tone Multi Secret Sharing scheme suitable for store-and-forward telemedicine is proposed to securely transmit the medical images. It also eliminates basic security constraints of VC like pixel expansion in shares/recovered secret images, random pattern of shares, explicit codebook requirement, lossy recovery of secret and limitation on number of secret and shares. Proposed approach is n out of n multi secret sharing scheme which is able to transmit n secret images simultaneously. All secrets could be revealed only after some computations with all n shares and one master share. Master share has been created with the secret key at encoding phase and it can be regenerated at the time of decoding using same secret key. Here all shares are meaningful in continuous-tone which may provide confidentiality to medical images during transmission. Proposed approach not only preserves all basic characteristics Shivendra Shivani
In traditional k-out-of-n visual cryptography (VC), a secret image is visually decoded only if a ... more In traditional k-out-of-n visual cryptography (VC), a secret image is visually decoded only if a subset of k or more shares are stacked together else nothing will be revealed. Progressive visual cryptography (PVC) scheme differs from the traditional VC where clarity and contrast of the decoded secret image are increased progressively with the number of stacked shares. Shares are most sensible objects since they carry secret; hence, verifying the reliability and authenticity of all shares before decoding the secret image prevents a participant from intentionally or unintentionally providing invalid data. This paper proposes a novel verifiable progressive visual cryptography approach with additional embedding capacity in each share which is used for self-embedding authentication data, copyright information along with confidential payload. These embedded informations in a share can be retrieved and verified at the time of any conflict. Proposed approach also eliminates many unnecessary encryption constraints of VC like pixel expansion, noise-like shares, explicit requirement of codebook and restriction on number of participants. Experiments show that in spite of having various credentials of participants, embedded in shares, the contrast of the decoded secret image remains 50 % without reducing the level of secrecy. By experiments, it is also confirmed that proposed approach can effectively localize the tampered region of the share.
International Journal of Computer Applications, 2013
A visual cryptography based watermarking scheme incorporating the concepts of singular value deco... more A visual cryptography based watermarking scheme incorporating the concepts of singular value decomposition (SVD) and the homogeneity analysis of the cover image is proposed here. Firstly, feature vectors are created from the singular values of the homogeneous blocks and thereby classified using the k-medoid clustering technique. A master share is then constructed based on the clustering result and thereafter, combined with the secret binary image (watermark) ownership share is build up. This ownership share is registered with the certificate authority in case to resolve any dispute regarding rightful ownership of the image in future. A two-out-of-two visual cryptography scheme is being used in the proposed methodology and robustness validated by applying comprehensive set of attacks. The peak signal to noise ratio (PSNR) and normalized cross correlation (NCC) metric values are used for evaluation of the scheme. Higher values of these metrics establish the appropriateness of the proposed methodology as compared to the other state of art schemes for copyright protection.
Uploads
Papers by Suneeta Agarwal