A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Roy, Sudipta
- A Novel Approach towards Development of Hybrid Image Steganography using DNA Sequences
Authors
1 Department of MCA, Academy of Technology, Adisaptagram, Aedconagar, Hooghly - 712121, West Bengal, IN
2 Department of Computer Science and Engineering, University of Calcutta, 92 A.P.C. Road, Kolkata - 700009, West Bengal, IN
Source
Indian Journal of Science and Technology, Vol 8, No 22 (2015), Pagination:Abstract
Objective: For the purpose of Data Communication Steganography is a technique which is combination of both the science and art by which we may hide information inside other covered media. Method: Here we use 3-layers steganographic data encryption, in the first stage data are encoded based upon DNA-Sequence and then the stego-key is added with individual byte then the byte streams are encoded within the image. First encrypt the data is more secure than encoding the raw data and authentication values which provide access only to authorized persons. Finding: Only Steganography is not enough secure for the present scenario. Simple Steganography is very much vulnerable in front of attack, but if we apply some encryption on the data itself and then use Steganography then that will be more secure than the use raw data in Steganography. Application: It will cover all the fields where we need Data Security and it covers a zone of data security where we need to hide the existence of data.Keywords
3-Layer Encryption, DNA-based Encryption, Image Steganography, Steganography- Combined Spatial FCM Clustering and Swarm Intelligence for Medical Image Segmentation
Authors
1 Department of Computer Science and Engineering, Manipur Institute of Technology, Takyelpat - 795001, Manipur, IN
2 Department of Electronics and Communication Engineering, Manipur Institute of Technology, Takyelpat - 795001, Manipur, IN
3 Department of Computer Science and Engineering, Assam University, Silchar - 788011, Assam, IN
Source
Indian Journal of Science and Technology, Vol 9, No 45 (2016), Pagination:Abstract
Objectives: The development of image processing tools for medical image processing has recently generated lot of interest. Medical image segmentation is one such area of focus for many researchers over the years. Methods/Statistical Analysis: In this work we have proposed an algorithm which is a combination of Fuzzy C-Means Clustering (FCM) with spatial constraints which is called spatial FCM (SFCM) and swarm intelligence optimization methods for medical image segmentation. The swarm intelligence algorithm that we have considered in this work is the Artificial Bee Colony (ABC) optimization. Findings: The algorithm is applied to brain MRI image segmentation and compared with other existing algorithm and the validation of the algorithm is evaluated by cluster a validity function which is an indication of how good a clustering result is. The results show that the combined algorithm i.e. ABCSFCM has better performance and improve the cluster validity functions as compared to SFCM. Applications/Improvements: The result is quite promising and although the proposed algorithm is tested on brain MRI image it can be extended to other problems of interest. The other variants of FCM and other natured inspired optimization are worth investigating for further improvements.Keywords
ABC, ABCSFCM, MRI, SFCM, Segmentation.- Video Shot Boundary Detection using Gray Level Cooccurrence Matrix
Authors
1 Department of Computer Science & Engineering, National Institute of Technology, Silchar - 788010, Assam, IN
2 Department of Computer Science & Engineering, Assam University, Silchar - 788011, Assam, IN
3 Department of Computer Science & Engineering, National Institute of Technology, Imphal – 795001, Manipur, IN
Source
Indian Journal of Science and Technology, Vol 9, No 7 (2016), Pagination:Abstract
Objectives :The objective of this paper is to find out the abrupt transitions between consecutive shots in a video with less false detection and high F1 score. Method/Analysis: This paper presents a video shot boundary detection approach using Gray Level Cooccurrence Matrix (GLCM). The proposed system can roughly be divided into feature extraction using GLCM and the application of the abrupt shot boundary detection. In the first step, the frames are converted into gray level and GLCM is calculated from each frame in the video. Secondly, correlation coefficient is calculated from the GLCM of two consecutive frames of the video. A threshold is set to identify the shot boundaries of the video. The proposed system can detect abrupt transitions effectively with less false detection in the uncompressed domain. Findings: The proposed system can able to achieve an average F1 score of 93.51%, which is achieve due to the reduced false detection. Novelty/Improvement: The proposed system uses the GLCM matrix directly instead of calculating the contrast, entropy,etc, i.e., the proposed system is purely based on the correlation of the pixel's co-occurrence .The proposed system also reduced the false detection there by increasing the precision and F1 score.Keywords
Abrupt, Gradual, Gray Level Cooccurrence Matrix, Shot Boundary Detection,Video Segmentation- Moving Object Detection and Segmentation using Background Subtraction by Kalman Filter
Authors
1 Department of Computer Science and Engineering, Academy of Technology, Adisaptagram, Hooghly – 712121, West Bengal, IN
2 Department of Computer Science and Engineering, U. V. Patel College of Engineering, Ganpat University, Kherva – 384012, Gujarat, IN
Source
Indian Journal of Science and Technology, Vol 10, No 19 (2017), Pagination:Abstract
Objectives: Object tracking and detection are significant and demanding tasks in the area of computer vision such as video surveillance, vehicle navigation, and autonomous robot navigation. Methods/Statistical Analysis: This paper presents the moving object tracking using Kalman filter and reference of background generation. Kalman filter is based on two types of filters: cell Kalman filter and relation Kalman filters. The process entails separating an object into different sub-regions and discovering the relational information between sub-regions of the moving objects. Findings: In this paper, the precise and real-time method for moving object detection and tracking is based on reference background subtraction and use threshold value dynamically to achieve a more inclusive moving target. This method can effectively eliminate the impact of luminescence changes. Due to deployment of Kalman filter this fast algorithm is very straightforward to use to detect moving object in improved way and it has also a broad applicability. This technique is very authentic and typically used in video surveillance applications. Application/Improvements: This technique is very legitimate and typically used in video surveillance applications. The Kalman filtering algorithm upgrades the model and enlarges the dimensionality of the moving system state.Keywords
Background Subtraction, Detection and Segmentation, Moving Object, Kalman Filter, Object Tracking.- A Robust and Efficient Copy-Move Forgery Detection Technique based on SIFT and SVD
Authors
1 Department of Computer Science and Engineering, Assam University, Silchar – 788011, Assam, IN
2 Department of Computer Science and Engineering, National Institute of Technology, Imphal – 795001, Manipur,, IN
Source
Indian Journal of Science and Technology, Vol 10, No 14 (2017), Pagination:Abstract
Objective: To detect copy-move forgery from a given digital image by reducing false detection thus increasing precision rate and F1 score. It is also invariant to scaling, rotation, noise attack. Methods/Analysis: The paper describes an effective and novel method to detect the copy-move forgery detection using Singular Value Decomposition (SVD) and Scale-Invariant Feature Transform (SIFT) features. It divides the given image into equal sized blocks and applies keypoint detection and feature descriptor for each block of the image. Then again SVD is calculated from128 SIFT descriptor to detect the forgery part of the given image. In this approach, a correlation is calculated for different images under different attacks like scaling, rotation, and noise. Finding: The proposed system is tested using standard image data against various types of image attacks like scaling, rotation, noise, blur etc. From the result, it is found that the proposed system is robust and invariant to most of the image attacks. The proposed system easily detects the copied part of the image more efficiently compared to other block based method since SIFT feature is invariant to scaling, rotation, noise, blur etc. Novelty/Improvement: The proposed methods uses block based technique and apply SIFT and SVD technique for detecting forged region in the given image. False detection is reduced in the proposed system which increases the precision and F1 score.Keywords
Copy-Move Forgery, Difference of Gaussian (DoG), Digital Forgery, Scale-Invariant Feature Transform (SIFT), Singular Value Decomposition (SVD), Tampered Image- A new Intelligent Brain Image Segmentation Technique using Multilevel Thresholding and Level Set
Authors
1 Department of Computer Science and Engineering, Assam University, Silchar, Assam − 788011, IN
Source
Indian Journal of Science and Technology, Vol 10, No 45 (2017), Pagination:Abstract
Objectives: In this paper, we focus our research on detecting brain tumours for various diagnostic purposes in medical field. Methods/Statistical Analysis: The method applied here is soft computing for image segmentationto detect the brain tumour from a particular MRI image which is important for various diagnostic purposes in medical field. For the purpose of identifying abnormal cells in the MRI images, which are collected from various real time situations, have been passed through a de-noising algorithm followed by a clustering approach. Findings: A new Fuzzy C Means clustering method followed by multilevel thresholding and level set algorithm have been adopted to recognise the tumour affected areas. This method has been compared against existing two techniques like multilevel thresholding and K-means algorithm. K-means algorithm is more efficient regarding time but this improved technique of image segmentation ensures more precise result. Application/improvements: This algorithm is fully tested with various medical images like MRI images and also working nicely to achieve orientation of accurate shape and size of brain tumor.Keywords
Erosion, Fuzzy C-Mean (FCM), Image Segmentation, K-Means, Level Set, Multilevel Thresholding- Assamese and BODO next Word Detection using LSTM
Authors
1 Assistant Professor, Department of Computer Science and Technology, Bodoland University Kokrajhar, Assam 783370., IN
2 Department of Computer Science and Technology Bodoland University Kokrajhar, Assam,783370., IN
3 Professor, Department of Computer Science and Engineering, Assam University Silchar, Assam 788011., IN
Source
Journal of Mines, Metals and Fuels, Vol 71, No 5 (2023), Pagination: 614-618Abstract
The official language of the Indian state of Assam is Assamese, an Eastern Indo-Aryan language. Assamese, the sole native Indo-Aryan language in the Assam Valley, has been heavily impacted by the nearby Tibeto-Burman languages in terms of lexicon, phonetics, and grammar. Its grammar is renowned for its highly inflected forms, and both honorific and non-honorific formulations can include a variety of pronouns and plural nouns. Additionally closely linked to Bengali, Assamese lacks grammatical gender distinctions like Oriya and Bengali. On the other hand, The Bodo language is a variety of dialects of the Tibeto-Burman branch of the Sino-Tibetan languages. Assam, Meghalaya, and Bangladesh are all home to speakers of the Bodo language, which is spoken in northeastern India. It shares linguistic kinship with the Dimasa, Tripura, and Lalunga languages and is written in Bengali, Latin, and Devanagari scripts.
Another name for Next Word Prediction is Language Modeling. Predicting what word will be spoken right away requires commitment. It is one of the primary functions of NLP and has a wide range of uses. Our objective is to create this model as quickly and efficiently as possible. RNNs can interpret prior material and forecast words since they have a lengthy short-term memory, which might be useful for users when building sentences. This method creates words by using letter-by-letter prediction, or letter-by-letter prediction. Users can benefit from next word prediction, which makes typing faster and more accurate. The Assamese and Bodo languages rely on next word prediction since multiple characters can be created by pressing the same consonants combined with different vowels, vowel combinations, and special keys. As a result, we present a Long Short Term Memory (LSTM) network model for Assamese and Bodo next word prediction. With 63,300 point sentences, we test the suggested network model, and it achieves 96 per cent accuracy. In addition, we contrasted the suggested model with cutting-edge models like the LSTM. The proposed network model offers a promising outcome, according to experimental findings.
Keywords
Assamese language, Bodo language, LSTM, NLP, Rnn.References
- J. Yang, H. Wang and K. Guo, (2020): “Natural Language Word Prediction Model Based on Multi-Window Con-volution and Residual Network,” in IEEE Access, vol. 8, pp. 188036-188043, doi: 10.1109/AC-CESS.2020.3031200.
- K. Terada and Y. Watanobe, (2019): “Code Completion for Programming Education based on Recurrent Neural Network,” 2019 IEEE 11th International Workshop on Computational Intelligence and Applications (IWCIA), Hiroshima, Japan, pp.109-114, doi: 10.1109/IW-CIA47330.2019.8955090.
- Habib, Md AL-Mamun, Abdullah Rahman, Md Sid-diquee, Shah Ahmed, Farruk. (2018): An Exploratory Approach to Find a Novel Metric Based Optimum Lan-guage Model for Automatic Bangla Word Prediction. International Journal of Intelligent Systems and Appli-cations. 2. 47-54. 10.5815/ijisa.2018.02.05.
- Partha Pratim Barman, Abhijit Boruah, (2018): A RNN based Approach for next word prediction in As-samese Phonetic Transcription, Procedia Computer Sci-ence, Volume 143, Pg. 117-123, ISSN 1877-0509, https:// doi.org/10.1016/j.procs.2018.10.359.
- Al-Mubaid, Hisham. (2007): A Learning- Classification Based Approach for Word Prediction. Int. Arab J. Inf. Technol. 4. 264-271.
- Pratim Barman Partha, Boruah Abhijit, (2018): “A RNN based Approach for next word prediction in Assamese Phonetic Transcription,” Procedia Computer Science, vol. 43, pp. 117–123.
- Terada Kenta and Watanobe Yutaka, (2021): “Code completion for programming education based on deep learning,” Int. J. Computational Intelligence Studies, vol. 10, no. 2–3, pp. 109–114.
- Sourabh Ambulgekar, Sanket Malewadikar, Raju Garande, and Dr. Bharti Joshi, (2021): Next Words Prediction Using Recurrent NeuralNetworks’’, Ramarao Adik Institute of Technology Mumbai, Maharashtra, ITM Web of Conferences 40, 03034.
- Omor Faruk Rakib, Shahinur Akter, Md Azim Khan, Amit Kumar Das, Khan Mohammad Habibullah, (2019): “Bangla Word Prediction and Sentence Completion Using GRU: An Extended Version of RNN on N-gram Language Model’’, Department of Computer Science and Engineering East-West University Dhaka, Bangladesh, 2019 International Conference on Sustainable Technologies for Industry 4.0 (STI), 24-25 December, Dhaka.
- Afika Rianti, Suprih Widodo, Atikah Dhani Ayuningtyas, Fadlan Bima Hermawan, (2022): “Next Word Prediction using LSTM’’, Journal of Information Technology and its Utilization, Vol.5, issue 1, june, eissn 2654-802x.
- Jordan, Michael I., and Tom M. Mitchell. (2015): “Machine learning: Trends, perspectives, and prospects.” Science 349, no. 6245: 255-260.
- Sahoo, Abhaya Kumar, Chittaranjan Pradhan, and Himansu Das. (2020): “Performance evaluation of different machine learning methods and deep-learning based convolutional neural network for health decision making.” In Nature inspired computing for data science, pp. 201-212. Springer, Cham.
- Prajapati, Gend Lal, and Rekha Saha (2019): “REEDS: Relevance and enhanced entropy based Dempster Shafer approach for next word prediction using language model.” Journal of Computational Science 35 : 1-11.
- Stremmel, Joel, and Arjun Singh. (2021): “Pretraining federated text models for next word prediction.” In Future of Information and Communication Conference, pp. 477-18. 488. Springer, Cham.
- Xiaoyun, Qu, Kang Xiaoning, Zhang Chao, Jiang Shuai, and Ma Xiuda (2016): “Short-term prediction of wind power based on deep long short-term memory.” In 2016 IEEE PES Asia-Pacific Power and Energy Engineering Conference (APPEEC), pp. 1148-1152. IEEE, 2016.