i-manager's Journal on Software Engineering (JSE)


Volume 15 Issue 4 April - June 2021

Research Paper

A Comparative Statement for the Facial Recognition Algorithm Via Eigenfaces and the Local Binary Patterns Histograms Algorithm

Chen Wang*
Xi'an Jiaotong University, China.
Wang, C. (2021). A Comparative Statement for the Facial Recognition Algorithm Via Eigenfaces and the Local Binary Patterns Histograms Algorithm. i-manager's Journal on Software Engineering, 15(4), 1-7. https://doi.org/10.26634/jse.15.4.18429

Abstract

Face recognition systems are based on the premise that each individual has a distinct facial structure, and that by using facial symmetry, it is feasible to do computerized face matching. Since the 1960s, researchers have been working on facial recognition technology, and the results of their efforts are being utilised for security purposes in a variety of organisations and businesses all over the globe. There are a variety of algorithms available for face recognition. This article, which aims to analyze two of the face recognition method, will compare Eigenfaces and Local Binary Patterns Histogram (LBPH). Summing up the research, the accuracy of the Local Binary Patterns Histogram is higher than that of Eigenfaces, and the error rate is lower than that of Eigenfaces.

Research Paper

Low-Light Image Enhancement Using Inverted Atmospheric Light

Santhiya S.* , Nandhini S.**, Mogana Priya M. ***, K. Selva Bhuvaneswari ****
*-**** Department of Computer Science and Engineering, University College of Engineering, Kancheepuram, Tamil Nadu, India.
Santhiya, S., Nandhini, S., Priya, M. M., and Bhuvaneswari, K. S. (2021). Low-Light Image Enhancement Using Inverted Atmospheric Light. i-manager's Journal on Software Engineering, 15(4), 8-18. https://doi.org/10.26634/jse.15.4.18142

Abstract

Low-light often leads to poor image visibility, which may have a substantial influence on the performance when using computer vision algorithms. The quality of low-light images can be improved by applying modified absorption light scattering model (ALSM). The reconstruction of hidden contours and features from a low-light image using an absorption light scattering picture obtained with ALSM is possible under appropriate and uniform illumination. To restrict the resemblance, superpixels may be employed as a measure. It is proposed that a mean-standard deviation (MSD) technique be used, which operates directly on patches and is depicted using superpixels. The MSD can achieve lower transmittance than the minimal technique, and it can be automatically adjusted in response to image information.

Research Paper

Brain Tumor Identification Using Convolutional Neural Network

Divyalakshmi M.* , Haritha S. **, Priyadharshini M. ***, Jayashri K. ****
*-**** Department of Computer Science and Engineering, SRM Valliammai Engineering College, Kattankulathur, Tamil Nadu, India.
Divyalakshmi, M., Haritha, S., Priyadharshini, M., and Jayashri, K. (2021). Brain Tumor Identification Using Convolutional Neural Network. i-manager's Journal on Software Engineering, 15(4), 19-23. https://doi.org/10.26634/jse.15.4.18178

Abstract

The human brain, which is made up of a white mass of cells, is the center of nervous system. A brain tumor is a collection of abnormally growing cells found in many parts of the brain, such as glial cells, neurons, lymphatic tissues, blood vessels, pituitary glands, and other parts of the brain, which leads to cancer. There are two forms of brain cancer. The first is benign, which is not cancerous and poses no threat; the second is malignant, which is a cancerous tumor that grows unnaturally, rapidly reproducing cells and eventually kills the individual if not identified. Manually detecting and identifying the tumor is more difficult. Program division method (PDM along with MRI (magnetic resonance imaging) can be used to discover and diagnose tumors. A powerful segmentation mechanism is required to provide precise results. In order to discover a patient's brain tumor, we look at their data, such as MRI images of their brain. The key concern is the segmentation, detection, and extraction of contaminated tumor areas from MR images, but this is a difficult and time-consuming task conducted by radiologists or clinical experts, and their accuracy is solely dependent on their experience. As a result, the employment of computer-assisted technology becomes increasingly important in order to overcome these constraints. This study uses a convolutional neural network to detect the type of brain tumor from MRI scans as input.

Research Paper

Video Image Watermarking Using Hybrid Watermarking Techniques

P. Thirusenthil Kumaran* , R. Kiruba **, N. Keerthana ***, I. Agalya ****
*-**** Department of Electrical and Electronics Engineering, Rajalakshmi Engineering College, Chennai, Tamil Nadu, India.
Kumaran, P. T., Kiruba, R., Keerthana, N., and Agalya, I. (2021). Video Image Watermarking Using Hybrid Watermarking Techniques. i-manager's Journal on Software Engineering, 15(4), 24-32. https://doi.org/10.26634/jse.15.4.18232

Abstract

Currently, it is difficult to protect creative content and intellectual property due to technological advances. Digital media is incredibly easy to copy and manipulate, resulting in significant economic losses. As a result, digital watermarking is a feasible solution to this problem. Digital watermarking is a method of embedding a copyright mark into digital content that can be used to identify the original creator and owner of the media. It is widely used to track down copyright infringers. The original watermark image is compared with the extracted watermark image after many attacks to assess the robustness of the algorithm, and the Peak Signal to Noise Ratio (PSNR) and Normalized Correlation Coefficient (NC) are calculated. A new embedding technique for Discrete Wavelet Transform-based video watermarking is offered as an effective copyright protection algorithm. On the video, the Discrete Wavelet Transform (DWT) is used to translate the spatial data into the frequency domain, with low pass and high pass components. Using the watermark image and the binary Low frequency section (LL sub-band) of the video frame, the low frequency component is used to generate the key.

Research Paper

Medical Data Privacy Using Dynamic Rank-Based Ellipsoidal Curve Cryptosystem

Arshad Amir*
Arshad Amir, University of Sulaimani, Iraq.
Amir, A. (2021). Medical Data Privacy Using Dynamic Rank-Based Ellipsoidal Curve Cryptosystem. i-manager's Journal on Software Engineering, 15(4), 33-42. https://doi.org/10.26634/jse.15.4.18431

Abstract

Hierarchical and Dynamic Elliptic Curve Cryptosystem (HiDE) is a self-certified public key method used in the security of medical data. HiDE offers a hierarchical cluster-based system consisting of a Backbone Cluster and numerous Area Clusters to support a high number of sensors. A Secure Access Point (SAP) in an Area Cluster receives medical data from Secure Sensors (SSs) in the sensor network and sends it to a Root SAP in the Backbone Cluster. As a result, the Root SAP may service a large number of SSs without having to create separate secure connections with each one. HiDE provides the Elliptic Curve Cryptosystem based Self-certified Public key scheme (ESP) for creating secure sessions between each pair of Cluster Head (CH) and Cluster Member (CM) to enable dynamic secure sessions for mobile SSs joining SAP (CM). Without knowing the CM's secret key, the CH may issue a public key to a CM and calculate a Shared Session Key (SSK) with that CM in ESP. This approach meets the Zero Knowledge Proof, allowing CHs to construct secure sessions with CMs without having to manage the CM's secret keys. According to our research in realistic implementations and network simulations, ESP requires fewer computational and network resources than the Rivest-Shamir-Adleman (RSA) based public key method. Furthermore, security research reveals that the keys in ESP are properly safeguarded. HiDE can therefore maintain sufficient network performance for wireless sensor networks while protecting the confidentiality of critical medical data with minimum processing cost.