i-manager's Journal on Image Processing (JIP)


Volume 8 Issue 4 October - December 2021

Research Paper

Detection of Plant Diseases using Deep Learning Based on Convolution Neural Network (CNN)

J. H. Gan* , P. C. Teh**
*-** Department of Electronic Engineering, University Tunku Abdul Rahman, Malaysia.
Gan, J. H., and Teh, P. C. (2021). Detection of Plant Diseases using Deep Learning Based on Convolution Neural Network (CNN). i-manager’s Journal on Image Processing, 8(4), 1-8. https://doi.org/10.26634/jip.8.4.18394

Abstract

Plant diseases are one of the main threats to food security. Various methods for detecting plant diseases have been developed as a means to ensure food security and reduce food waste through early detection. Through these technological advancements, precision farming has been developed, and the application of artificial intelligence is steadily gaining popularity in this technology industry as a means of solving this problem. In this paper, transfer learning of pre-trained deep learning object classification and detection models on 2 plant species, eighteen classes in total, was performed and trained. Various approaches were applied and a classification model with a maximum data set size of 200 per class and a batch size of 32 performed best with 97.9%, 64.5%, 70.4%, and 66.1% for precision, recall, and F1- indicator, respectively, and the object detection model score COCO mAP of 91.48%. Finally, these models have been applied so that the user can insert an image and let the models predict the health of the plant. A graphical interface has also been created to allow the user to select images to be predicted by the models.

Research Paper

Standard Particle Swarm Optimization Algorithm for Image Enhancement

Mani Kumar Jogi* , Y. Srinivasa Rao**
*-** Department of Instrument Technology, Andhra University, Andhra Pradesh, India.
Jogi, M. K., and Rao, Y. S. (2021). Standard Particle Swarm Optimization Algorithm for Image Enhancement. i-manager’s Journal on Image Processing, 8(4), 9-16. https://doi.org/10.26634/jip.8.4.18441

Abstract

Image enhancement plays a crucial role in an image processing system. Improving image quality by maximizing the information content of a given input image is the primary goal of image enhancement. Many of the methods proposed earlier did not achieve a good improvement in quality. Optimization algorithms for solving the image enhancement problem are proposed. The quality of the input image is improved by choosing the optimal parameters based on the objective function formulated for the optimization process. The design of the objective function plays a crucial role in the optimization problem. This paper presents an efficient, objective approach to gray level image enhancement using the Standard Particle Swarm Optimization (SPSO) algorithm, which is an improvement on the simplest particle swarm optimization algorithm. The proposed algorithm has been tested on standard gray-level test images such as cat, stone, and eye. The proposed algorithm is evaluated based on two scenarios for improving the gray-level image and is successful in finding the optimal parameters for improving image quality.

Research Paper

Traffic Rule Violation Detection Systems

Praneeti Lohiya* , Himani Uike**, Akshay Dubey***, Snehlata Mandal****
*-**** Department of Computer Science and Engineering, Shri Shankaracharya Engineering College, Bhilai, Chhattisgarh, India.
Lohiya, P., Uike, H., Dubey, A., and Mandal, S. (2021). Traffic Rule Violation Detection Systems. i-manager’s Journal on Image Processing, 8(4), 17-20. https://doi.org/10.26634/jip.8.4.18510

Abstract

The globe is becoming more and more urbanized. As a result, the number of automobiles on the roadways of the city has increased significantly, which has led to an increase in traffic violations. This causes serious damage to the environment and property and it increases the number of accidents that can threaten the general public. To cope with an alarming situation and prevent such cases, it is necessary to identify violations of traffic rules, which have unthinkable consequences and requires the implementation of the system.

Review Paper

Image Encryption Method for Secure Image Transmission

Neelima Thakur* , Siddhartha Choubey **, Abha Choubey***
*-*** Department of Computer Science and Engineering, Shri Shankaracharya Institute of Engineering and Technology, Chhattisgarh, India.
Thakur, N., Choubey, S., and Choubey, A. (2021). Image Encryption Method for Secure Image Transmission. i-manager’s Journal on Image Processing, 8(4), 21-25. https://doi.org/10.26634/jip.8.4.18489

Abstract

This paper is mainly related to the secret writing of various images and secret writing methods. The cryptography of the image is extremely necessary for information security purposes. Security is the most difficult aspect of the network and network applications. Online and networked applications are growing rapidly, increasing the importance and therefore the value of information transmitted over the Internet or other media. The secret letter may be related to improving the security of the image by encrypting the pixels. The encryption itself protects privacy. This application is used in many areas, including network communications, medical imaging, and military communications. Due to some properties of images, such as high information redundancy and volume of information, secret writing of images is different from secret writing of texts. Secret writing is to convert information into a type of encryption code that cannot be easily understood by the user unauthorized persons.

Review Paper

Human Recognition System using Behavioral and Physical Biometrics

Ragini Pathari* , Snehlata Barde**
*-** Department of Computer Science, Shantiniketan College, Raipur, Chhatisgarh, India.
Pathari, R., and Barde, S. (2021). Human Recognition System using Behavioral and Physical Biometrics. i-manager’s Journal on Image Processing, 8(4), 26-31. https://doi.org/10.26634/jip.8.4.18466

Abstract

The use of biometric systems has grown rapidly in recent decades. This paper mainly deals with multi-modal biometric systems, fake identification, etc., and sheds light on how to achieve privacy and security in a biometric system. Comprehensive and critical studies of various detection algorithms are presented. The first step in detection is to isolate the face recognition system from the background. The paper also presents several applications in different fields, viz. basic content imaging, image acquisition, and video encoding. The article focused on various multimodal systems using various modalities and algorithms for human recognition through verification, identification, and authentication.