Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703321
P. Bhatia, A. Khosla, Gajendra Singh
“Visual scanning reflects a model of the world that exists inside the brain of each individual” – by Moshe Eizenman. Advancements in eye-tracking technology have led to some wide-ranging applications in fields of medical research, gaming, automation, Human- Computer Interaction(HCI) and many more. This paper presents an automated study of gaze patterns as an investigating tool to distinguish autism spectrum disorder from typical development. Gaze abnormality can be used to study the model of the world perceived by people with autism that is quite different from normal people.
{"title":"Automated analysis of Gaze Patterns for Autism Screening- Density Approach","authors":"P. Bhatia, A. Khosla, Gajendra Singh","doi":"10.1109/ICSCCC.2018.8703321","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703321","url":null,"abstract":"“Visual scanning reflects a model of the world that exists inside the brain of each individual” – by Moshe Eizenman. Advancements in eye-tracking technology have led to some wide-ranging applications in fields of medical research, gaming, automation, Human- Computer Interaction(HCI) and many more. This paper presents an automated study of gaze patterns as an investigating tool to distinguish autism spectrum disorder from typical development. Gaze abnormality can be used to study the model of the world perceived by people with autism that is quite different from normal people.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116242126","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703311
A. Mendhe, D. Gupta, K. P. Sharma
Many cryptographic techniques are available for serving the purpose of information security over the web, servers and local systems. However, there is always demand of more security which may not be meet by such cryptographic algorithms alone because of known security attacks and mathematical complexity. Thus visualizing the strategic combination of cryptography and steganography techniques can provide a higher level of security. Quick Response (QR) codes are used extensively due to their beneficial characteristics. It includes robustness, readability, error correction capability, large data capacity than traditional barcodes etc. Thus, in this work, we propose a 3-layered architecture for securing message sharing mechanism by using QR code image in one layer. This architecture utilizes the empirical and strategic use of cryptography and steganography techniques. The proposed system provides the higher level of security on the basis of quantitative and qualitative results. Also, we evaluate our system against the performance evaluation criteria discussed in the paper.
{"title":"Secure QR-Code Based Message Sharing System Using Cryptography and Steganography","authors":"A. Mendhe, D. Gupta, K. P. Sharma","doi":"10.1109/ICSCCC.2018.8703311","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703311","url":null,"abstract":"Many cryptographic techniques are available for serving the purpose of information security over the web, servers and local systems. However, there is always demand of more security which may not be meet by such cryptographic algorithms alone because of known security attacks and mathematical complexity. Thus visualizing the strategic combination of cryptography and steganography techniques can provide a higher level of security. Quick Response (QR) codes are used extensively due to their beneficial characteristics. It includes robustness, readability, error correction capability, large data capacity than traditional barcodes etc. Thus, in this work, we propose a 3-layered architecture for securing message sharing mechanism by using QR code image in one layer. This architecture utilizes the empirical and strategic use of cryptography and steganography techniques. The proposed system provides the higher level of security on the basis of quantitative and qualitative results. Also, we evaluate our system against the performance evaluation criteria discussed in the paper.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124496490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703362
Mukesh Kumar Kharita, Atul Kumar, Pardeep Singh
Collaborative filtering is one of the most effective and adequate technique used in recommendation. The fundamental aim of the recommendation is to provide prediction of the different items in which a user would be interested in based on their preferences. Recommendation systems based on collaborative filtering techniques are able to provide approximately accurate prediction when there is enough data. User based collaborative filtering taechniques have been very powerful and success in the past to recommend the items based on user’s preferences. But, there are also some certain challenges such as scalability and sparsity of data which increases as the number of users and items increases. In a large website, it is difficult to find the interested information in a certain time. But the recommendation system filter out information and items that are best suitable for us. Although there are different recommendation approaches, yet collaborative filtering technique is very popular because of the effectiveness. In this work, movie recommender system has been described, which basically uses item-based technique of collaborative filtering to provide the recommendations of items, which is dynamic and will learn from the positive feedback.
{"title":"Item-Based Collaborative Filtering in Movie Recommendation in Real time","authors":"Mukesh Kumar Kharita, Atul Kumar, Pardeep Singh","doi":"10.1109/ICSCCC.2018.8703362","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703362","url":null,"abstract":"Collaborative filtering is one of the most effective and adequate technique used in recommendation. The fundamental aim of the recommendation is to provide prediction of the different items in which a user would be interested in based on their preferences. Recommendation systems based on collaborative filtering techniques are able to provide approximately accurate prediction when there is enough data. User based collaborative filtering taechniques have been very powerful and success in the past to recommend the items based on user’s preferences. But, there are also some certain challenges such as scalability and sparsity of data which increases as the number of users and items increases. In a large website, it is difficult to find the interested information in a certain time. But the recommendation system filter out information and items that are best suitable for us. Although there are different recommendation approaches, yet collaborative filtering technique is very popular because of the effectiveness. In this work, movie recommender system has been described, which basically uses item-based technique of collaborative filtering to provide the recommendations of items, which is dynamic and will learn from the positive feedback.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125588800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703302
Pushpendra Singh Rajawat, D. Gupta, S. Rathore, Avtar Singh
Diabetes is a chronic disease, which affects millions of people around the world. It causes serious damage to human health and even sometimes human lives. Various research is going on in this area to reduce its negative impact. In this paper, we propose a hybrid machine learning technique to classify people into patient and healthy classes, respectively. The patient class represents people with diabetes and the healthy class represents people with no diabetes. We evaluate the proposed model against various performance measures and found that it performs better than previously used techniques. We use Pima Indian Diabetes dataset, which has 768 instances and 9 attributes. Out of 768 instances, 268 are affected and 500 are not affected by diabetes.
糖尿病是一种慢性疾病,影响着全世界数百万人。它对人类健康造成严重损害,有时甚至危及生命。这个领域正在进行各种研究,以减少其负面影响。在本文中,我们提出了一种混合机器学习技术,将人分别分为患者和健康类。患者组代表糖尿病患者,健康组代表无糖尿病患者。我们根据各种性能指标评估了所提出的模型,发现它比以前使用的技术表现得更好。我们使用Pima Indian Diabetes数据集,它有768个实例和9个属性。在768例中,268例受糖尿病影响,500例未受糖尿病影响。
{"title":"Predictive Analysis of Medical Data using a Hybrid Machine Learning Technique","authors":"Pushpendra Singh Rajawat, D. Gupta, S. Rathore, Avtar Singh","doi":"10.1109/ICSCCC.2018.8703302","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703302","url":null,"abstract":"Diabetes is a chronic disease, which affects millions of people around the world. It causes serious damage to human health and even sometimes human lives. Various research is going on in this area to reduce its negative impact. In this paper, we propose a hybrid machine learning technique to classify people into patient and healthy classes, respectively. The patient class represents people with diabetes and the healthy class represents people with no diabetes. We evaluate the proposed model against various performance measures and found that it performs better than previously used techniques. We use Pima Indian Diabetes dataset, which has 768 instances and 9 attributes. Out of 768 instances, 268 are affected and 500 are not affected by diabetes.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126459057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703354
Umang Garg, K. Ghanshala, R. Joshi, Rahul Chauhan
Quadriplegia is a pathological condition identified through completely or partly paralysis of the limbs and torso. Smart wheelchair is an innovation that has an intention to create a difference for the activities of the people who are restricted by movement. This paper proposed an idea to ease those patients, who cannot perform hand movements in a way that can move a wheelchair. This paper peculiarly represents the working model of a smart wheelchair using Internet of things (IoT). Three different modes are proposed which assist the patient in free movement and information transmission to the person nearby and to the cloud. To provide movement of wheelchair in desired direction an accelerometer based hand glove is design. Patient can transmit the requirements to the nearer ones through hand gesture using RF transmission. Third mode provides the information on cloud which can be accessed by the doctor for diagnosis.
{"title":"Design and Implementation of Smart Wheelchair for Quadriplegia patients using IOT","authors":"Umang Garg, K. Ghanshala, R. Joshi, Rahul Chauhan","doi":"10.1109/ICSCCC.2018.8703354","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703354","url":null,"abstract":"Quadriplegia is a pathological condition identified through completely or partly paralysis of the limbs and torso. Smart wheelchair is an innovation that has an intention to create a difference for the activities of the people who are restricted by movement. This paper proposed an idea to ease those patients, who cannot perform hand movements in a way that can move a wheelchair. This paper peculiarly represents the working model of a smart wheelchair using Internet of things (IoT). Three different modes are proposed which assist the patient in free movement and information transmission to the person nearby and to the cloud. To provide movement of wheelchair in desired direction an accelerometer based hand glove is design. Patient can transmit the requirements to the nearer ones through hand gesture using RF transmission. Third mode provides the information on cloud which can be accessed by the doctor for diagnosis.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127219315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703203
Varuni Garg, Dr. Renu Dhir
Inpainting is a technique used to reconstruct spoiled image or missing part of an image in original image in the way that look plausible according to human perception. This technique reconstructs the picture comes under inpainting. The rebuilding of damaged photos such as aged photos and films, elimination of superimposed text, elimination/replacement of not desired objects, red eye correction, image coding comes under the application of image inpainting. It is art which is used in the past years. In this paper, Convolutional Method has been used to inpaint the image. In proposed method the diffusion kernel has been modified and the number of kernel has been increased from both left and right direction and the kernels has been convolved upon the area needed to be inpaint.
{"title":"Restoration of Image from Deterioration Using Image Inpainting","authors":"Varuni Garg, Dr. Renu Dhir","doi":"10.1109/ICSCCC.2018.8703203","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703203","url":null,"abstract":"Inpainting is a technique used to reconstruct spoiled image or missing part of an image in original image in the way that look plausible according to human perception. This technique reconstructs the picture comes under inpainting. The rebuilding of damaged photos such as aged photos and films, elimination of superimposed text, elimination/replacement of not desired objects, red eye correction, image coding comes under the application of image inpainting. It is art which is used in the past years. In this paper, Convolutional Method has been used to inpaint the image. In proposed method the diffusion kernel has been modified and the number of kernel has been increased from both left and right direction and the kernels has been convolved upon the area needed to be inpaint.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"258 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132755336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703269
P. Kaur, R. Sobti
The diversity of smart and cognitively intelligent features integrated into the modern contemporary cars is rising rapidly. Intelligent cooperative driving is one of the several applications of the IOT field in which cars interact with other vehicles on road and provide a streamlined flow of traffic smartly. The main ingredients for making this technology successful are the sensing devices mounted on every vehicle. The main purpose of this paper is to discuss the safety of future autonomous vehicles which will be sharing information of impending hazards on road with other cars. The paper provides an overview of several problems, uncertainties, and inaccuracies emerging from sensor data fusion during car-to-car interaction in autonomous vehicles. The rate at which some sensors update their information is different for different sensors which lead to incorrect scene comprehension. Several survey report results are provided showing evidence of future sensor usage in the automotive market which accounts for billions of dollars. Safety in smart cars can be guaranteed if they communicate information unambiguously to nearby cars in their vicinity.
{"title":"Sensor Fusion Algorithm For Software Based Advanced Driver-Assistance Intelligent Systems","authors":"P. Kaur, R. Sobti","doi":"10.1109/ICSCCC.2018.8703269","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703269","url":null,"abstract":"The diversity of smart and cognitively intelligent features integrated into the modern contemporary cars is rising rapidly. Intelligent cooperative driving is one of the several applications of the IOT field in which cars interact with other vehicles on road and provide a streamlined flow of traffic smartly. The main ingredients for making this technology successful are the sensing devices mounted on every vehicle. The main purpose of this paper is to discuss the safety of future autonomous vehicles which will be sharing information of impending hazards on road with other cars. The paper provides an overview of several problems, uncertainties, and inaccuracies emerging from sensor data fusion during car-to-car interaction in autonomous vehicles. The rate at which some sensors update their information is different for different sensors which lead to incorrect scene comprehension. Several survey report results are provided showing evidence of future sensor usage in the automotive market which accounts for billions of dollars. Safety in smart cars can be guaranteed if they communicate information unambiguously to nearby cars in their vicinity.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133615493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703337
R. Kaur, Rajneesh Rani
Due to the advancement in the field of information technology, medical image processing has become the most eminent image processing field in this era. The medical image needs to be stored and transmitted for telemedicine purpose. Due to the huge size of medical images, it becomes very difficult to store and transmit it over the network. Image compression is a significant toolto reduce the redundancies and irrelevant informationof the image for efficient archival and fast transmission. The paper provides the state-of-the-art survey fornon-ROI (i.e. lossless) and ROI based (i.e. hybrid region of interest)techniques available in the area of medical image compression. The paper will provide help for researchers to understand the different techniques of medical image compression with theircomparative analysis for further research in this area.
{"title":"ROI and Non-ROI based Medical Image Compression Techniques: A Survey and Comparative Review","authors":"R. Kaur, Rajneesh Rani","doi":"10.1109/ICSCCC.2018.8703337","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703337","url":null,"abstract":"Due to the advancement in the field of information technology, medical image processing has become the most eminent image processing field in this era. The medical image needs to be stored and transmitted for telemedicine purpose. Due to the huge size of medical images, it becomes very difficult to store and transmit it over the network. Image compression is a significant toolto reduce the redundancies and irrelevant informationof the image for efficient archival and fast transmission. The paper provides the state-of-the-art survey fornon-ROI (i.e. lossless) and ROI based (i.e. hybrid region of interest)techniques available in the area of medical image compression. The paper will provide help for researchers to understand the different techniques of medical image compression with theircomparative analysis for further research in this area.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"161 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134317597","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703328
Yashika Arora
In this paper, the work is carried upon the security of cloud computing environment from the economic denial of service (EDOS) attacks. The cloud computing environments have become popular in the past decade, as number of businesses has shifted their work online to the cloud. The cloud service providers offer the maximum uptime for their users, which is committed in the form of service level agreements (SLAs). The uptime is the term used to indicate the availability of the cloud computing resources for client’s application to run its processes. If at any point, the client application is not able to run its operations due to non-availability of resources, it is considered as the downtime, which is negative to the uptime and considered as SLA violation. The SLAs keep the information about the SLA violations and their settlements, which is considered as the loss of the cloud service providers. For example, the uptime of 99.99% is committed by cloud service provider, and due to any internal or external reason, achieved uptime is lower than committed value, the cloud service provider may face a penalty as per defined in the SLA, which is considered direct profit loss for the service provider. In order to reduce the financial losses due to the EDOS attacks, the proposed model is designed by combining the periodic authentication, pattern analysis and data flow control mechanisms to prevent the cloud from attacks. The proposed Multi-Layered Attack Recognition (MLAR) Model has outperformed the existing controlled access based EDOS (CA-EDOS) prevention model on the basis of resource utilization and response delay parameters.
{"title":"Multi-Layered Attack Recognition (MLAR) Model to Protect Cloud From EDOS Attacks","authors":"Yashika Arora","doi":"10.1109/ICSCCC.2018.8703328","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703328","url":null,"abstract":"In this paper, the work is carried upon the security of cloud computing environment from the economic denial of service (EDOS) attacks. The cloud computing environments have become popular in the past decade, as number of businesses has shifted their work online to the cloud. The cloud service providers offer the maximum uptime for their users, which is committed in the form of service level agreements (SLAs). The uptime is the term used to indicate the availability of the cloud computing resources for client’s application to run its processes. If at any point, the client application is not able to run its operations due to non-availability of resources, it is considered as the downtime, which is negative to the uptime and considered as SLA violation. The SLAs keep the information about the SLA violations and their settlements, which is considered as the loss of the cloud service providers. For example, the uptime of 99.99% is committed by cloud service provider, and due to any internal or external reason, achieved uptime is lower than committed value, the cloud service provider may face a penalty as per defined in the SLA, which is considered direct profit loss for the service provider. In order to reduce the financial losses due to the EDOS attacks, the proposed model is designed by combining the periodic authentication, pattern analysis and data flow control mechanisms to prevent the cloud from attacks. The proposed Multi-Layered Attack Recognition (MLAR) Model has outperformed the existing controlled access based EDOS (CA-EDOS) prevention model on the basis of resource utilization and response delay parameters.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121401530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-12-01DOI: 10.1109/ICSCCC.2018.8703342
A.A. Khan, A. Arora
The mortality rates in women is highest due to breast cancer among other all the cancers in developed as well as in developing countries. As evident from the facts that mortality rate of 12.7 among 1, 00, 000 in India [1] and whereas in USA, estimated deaths of 40,610 women i.e. 6.8% of all cancer deaths in 2017. Mammography is considered to be the most accepted technique for breast cancer detection. In this paper, thermography is explored as a viable alternative to the mammography. As mammography has its own drawbacks of being a painful procedure, exposure of the body to harmful Xrays. This necessitates in exploring the other modalities preferably non-contact and without using any harmful radiations. Thermography is coming out to be an alternative to the standard mammography with advantages of being noninvasive, safe, portability and cost effectiveness. The temperature pattern of the breasts changes as a result of the high increased blood flow into affected cells. This gives the way to asymmetry between normal and cancerous breast which can be detected using different techniques. In this paper, 35 normal and 35 abnormal thermograms are taken from on line DMRDatabase for Mastology Research having breast thermograms for early detection of breast cancer. The texture features of the left and right breasts are extracted using Gabor filters. The thermograms are then classified using support vector machine (SVM) based on the textural asymmetry between the breasts into normal and cancerous cases. The accuracy achieved using Gabor features and SVM classifier is 84.5% The early detection of cancer using thermography increases the survival chances of the patient considerably as it can detect the cancer in initial stages.
在发达国家和发展中国家的所有癌症中,妇女因乳腺癌的死亡率最高。从以下事实可以看出,印度每10万人中有12.7人的死亡率[1],而在美国,2017年估计有40610名女性死亡,占所有癌症死亡人数的6.8%。乳房x光摄影被认为是最被接受的乳腺癌检测技术。本文探讨了热成像作为乳房x线摄影的可行替代方法。乳房x光检查有其自身的缺点,它是一个痛苦的过程,将身体暴露在有害的x射线中。这需要探索其他方式,最好是非接触和不使用任何有害辐射。热成像技术正成为标准乳房x光检查的一种替代方法,具有无创、安全、便携和成本效益等优点。乳房的温度模式的变化是由于大量的血液流入受影响的细胞。这使得正常乳房和癌性乳房之间的不对称可以通过不同的技术来检测。本文从乳腺热像图在线DMRDatabase for Mastology Research中获取35张正常和35张异常的乳房热像图,用于早期发现乳腺癌。使用Gabor滤波器提取左右乳房的纹理特征。然后使用基于乳房纹理不对称的支持向量机(SVM)将热图分类为正常和癌病例。使用Gabor特征和SVM分类器获得的准确率为84.5%。使用热成像技术早期检测癌症,因为它可以在早期阶段检测到癌症,大大增加了患者的生存机会。
{"title":"Breast Cancer Detection Through Gabor Filter Based Texture Features Using Thermograms Images","authors":"A.A. Khan, A. Arora","doi":"10.1109/ICSCCC.2018.8703342","DOIUrl":"https://doi.org/10.1109/ICSCCC.2018.8703342","url":null,"abstract":"The mortality rates in women is highest due to breast cancer among other all the cancers in developed as well as in developing countries. As evident from the facts that mortality rate of 12.7 among 1, 00, 000 in India [1] and whereas in USA, estimated deaths of 40,610 women i.e. 6.8% of all cancer deaths in 2017. Mammography is considered to be the most accepted technique for breast cancer detection. In this paper, thermography is explored as a viable alternative to the mammography. As mammography has its own drawbacks of being a painful procedure, exposure of the body to harmful Xrays. This necessitates in exploring the other modalities preferably non-contact and without using any harmful radiations. Thermography is coming out to be an alternative to the standard mammography with advantages of being noninvasive, safe, portability and cost effectiveness. The temperature pattern of the breasts changes as a result of the high increased blood flow into affected cells. This gives the way to asymmetry between normal and cancerous breast which can be detected using different techniques. In this paper, 35 normal and 35 abnormal thermograms are taken from on line DMRDatabase for Mastology Research having breast thermograms for early detection of breast cancer. The texture features of the left and right breasts are extracted using Gabor filters. The thermograms are then classified using support vector machine (SVM) based on the textural asymmetry between the breasts into normal and cancerous cases. The accuracy achieved using Gabor features and SVM classifier is 84.5% The early detection of cancer using thermography increases the survival chances of the patient considerably as it can detect the cancer in initial stages.","PeriodicalId":148491,"journal":{"name":"2018 First International Conference on Secure Cyber Computing and Communication (ICSCCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128819576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}