i-manager's Journal on Image Processing (JIP)


Volume 3 Issue 4 October - December 2016

Research Paper

Implementation of Color Image Segmentation Using Watershed Algorithm

M. Aravind Kumar* , Srinivas Bachu**
* Assistant Professor, Department of Electronics and Communication Engineering, Grandhi Varalakshmi Venkata Rao Institute of Technology, Andhra Pradesh, India.
** Associate Professor, Department of Electronics and Communication Engineering, Guru Nanak Institutions Technical Campus (Autonomous), Telangana, India.
Kumar, M. A., and Bachu, S. (2016). Implementation Of Color Image Segmentation Using Watershed Algorithm. i-manager's Journal on Image Processing, 3(4), 1-8.

Abstract

The objective of this paper is to improve the picture by utilizing division procedure for shading pictures. The most essential characteristic of division of a picture is its luminance, plentiful for a monochrome picture and shading parts of a shading picture. This paper proposes a shading based division strategy for utilization of watershed method. The watershed calculation can perform picture division utilizing numerical morphology. The individualization of an article from an advanced picture is a typical issue in the field of picture preparing. The authors introduced a versatile concealing and a thresholding instrument over every shading channel to overcome over division issue, before consolidating the division from every channel into the last one. The proposed strategy guarantees precision and nature of the shading pictures. The exploratory results are acquired utilizing Image Quality Assessment (IQA) measurements, for example, PSNR, MSE, and Color Image Quality Measure (CQM). The watershed change consolidated with a quick calculation based and topological angle approach gives great results. The numerical tests acquired outline of the effectiveness of the methodology for picture division. This methodology along these lines give a practical new answer for picture division, which might be useful in picture recovery. The trial results illuminate the viability of our way to deal with enhanced division quality in parts of accuracy and computational time. The reenactment results exhibit that the proposed calculation is promising.

Research Paper

Image De-Noising with the Aid of Dual Tree Wavelet Transform And Artificial Bee Colony Optimization Algorithm

Yugandhar Dasari* , S.K. Nayak**
* Associate Professor, Department of Electronics and Communication Engineering, Aditya Institute of Technology and Management, Tekkali, Andhra Pradesh, India
** Professor, Department of Electronic Science, Berhampur University, Berhampur, Odisha.
Dasari, Y., and Nayak, S. K. (2016). Image De-Noising With The Aid Of Dual Tree Wavelet Transform And Artificial Bee Colony Optimization Algorithm. i-manager's Journal on Image Processing, 3(4), 9-18.

Abstract

Determination of the threshold value is extremely an important part in wavelet based image de-noising. Finding appropriate threshold value can be done either by using deterministic approaches or soft computing algorithms. Artificial Bee Colony (ABC) is one of the algorithms motivated by the intelligent behaviour of honey bees. In this paper, a nature inspired population based image de-noising technique has been implemented to find the dynamic threshold value using an ABC algorithm by using Dual Tree Complex Wavelet Transform (DT-CWT). The DT-CWT is a relatively recent enhancement to the Discrete Wavelet Transform (DWT) with two additional properties known as shift invariance and directional selectivity. These additional features are in turn used to preserve geometric image features like ridges and edges. The performance of the proposed method has been compared in terms of Peak Signal to Noise Ratio (PSNR) with conventional wavelet thresholding using DT-CWT and Adaptive Median Filter (AMF) techniques.

Research Paper

Comparative Analysis of Advanced Reversible Watermarking Techniques

V. Belmer Gladson* , Y. Sam Josuva**, R. Balasubramanian***
* Research Scholar, Department of Computer Science and Engineering, Manonmaniam Sundaranar University, Tamilnadu, India.
** Assistant Professor, Department of Computer Science and Engineering, Manonmaniam Sundaranar University, Tamilnadu, India.
*** Professor, Department of Computer Science and Engineering, Manonmaniam Sundaranar University, Tamilnadu, India.
Gladson, V. B., Josuva, Y. S., and Balasubramanian, R. (2016). Comparative Analysis of Advanced Reversible Watermarking Techniques. i-manager's Journal on Image Processing, 3(4), 19-25.

Abstract

The Reversible watermarking is a field of hiding the information, which hides the crucial information in different forms like an image, song, video for protection of illegal duplication and distribution of multimedia data. This research work is to embed data in encrypted images and decrypt the image to rebuild the original image by removing the hidden data without any distortion. There are many researches in this field and various techniques were proposed. So in order to choose which one is the best technique, a definite need arises to compare with the techniques like Least Significant Bit (LSB), Difference Expansion (DE), Reversible Contrast Mapping (RCM), Wavelet-Fuzzy (WF) and these reversible watermarking methods are analyzed with the help of metrics PSNR, MSE, Processing Time and Correlation. From the experimental results and performance evaluation, LSB is better, but based on correlation and after applying a median filter, Wavelet- Fuzzy (WF) provides better results.

Research Paper

Quantifying Deformation And Predicting Volcanic Eruption From SAR Satellite Images Using Digital Elevation Model

S. Muni Rathnam* , T. Ramashri**
* Professor & HOD, Department of Electronics and Communication Engineering, Balaji Institute of Engineering and Management Studies, Andhra Pradesh, India.
** Professor, Department of Electronics and Communication Engineering, Sri Venkateswara University, Tirupati, India.
Rathnam, S. M., and Ramashri, T. (2016). Quantifying Deformation And Predicting Volcanic Eruption From SAR Satellite Images Using Digital Elevation Model. i-manager's Journal on Image Processing, 3(4), 26-37.

Abstract

Monitoring of volcanoes using satellite images is gaining ground due to multiple advantages it offer. Satellite based radars in the form of Synthetic Aperture Radar (SAR) imaging can be a potent tool in monitoring these volcanoes. Changes in morphologies of volcano due to various deformations have been identified as precursor for volcanic activity. The deformation that can happen prior to the volcanic éruption cane enable better prediction. It has been identified through numerous researches that very strong correlation has occured between volcanic eruption and deformation. This work exploits the correlation to analyse morphological changes in volcano by creation of Digital Elevation Model (DEM). In order to create DEM, SAR images has been employed and interferogram is completed with the help of a processing implemented using MATLAB. This approach which accounts for various phase noises can result in the generation of DEM, which can identify the deformation post and preeruptions giving us on correlation between eruption and deformation.

Survey Paper

A Review of Robust Hashing Methods for Content Based Image Authentication

Lokanadham Naidu Vadlamudi* , V. V. Rama Prasad**, D. Vasumathi***
* Assistant Professor, Department of Information Technology, Sree Vidyanikethan Engineering College, Andhra Pradesh, India.
** Professor, Department of Computer Science and Engineering, Sree Vidyanikethan Engineering College, Andhra Pradesh, India.
*** Professor, Department of Computer Science and Engineering, Jawaharlal Nehru Technological University, Telangana, India.
Vadlamudi, L. N., Vaddella, R. P. V., and Devara, V. (2016). A Review Of Robust Hashing Methods For Content Based Image Authentication. i-manager's Journal on Image Processing, 3(4), 38-45.

Abstract

At present, the multimedia data will be transmitted rapidly using an internet. But, whether the data reaches the recipient without tampering is questionable. The current multimedia editing software allows adversaries to alter multimedia data without changing its visual perception. Different categories of approaches exist for verifying the integrity as well as authenticity of multimedia data. The Content Based Authentication (CBA) is one among them. This review paper describes various Content Based Image Authentication (CBIA) methods, which have been developed for integrity verification of images. And also, this paper summarizes various techniques used in existing image authentication methods to extract robust features. In addition, this paper discusses the important characteristics of a CBIA approach, limitations of existing methods and future research directions. The development of robust and secure image authentication method for content authentication is still an open challenge for current researchers.