Nowadays, fog and haze are becoming a global challenge. Images captured under the hazy condition have poor contrast and corrupted colour. Such images limit the visibility and thus hinder the way for the computer vision purposes like video observation, entity recognition. Such hazy images affect the usual working in the transportation sector e.g. trains, ships etc. One of the prominent factors affecting the outdoor vision applications is poor vision and thus, it may result in an intangible loss like safety. The image captured shows this behaviour because of the air light. This paper analyses the widely used techniques for haze removal from images alias color attenuation prior based haze removal and haze removal with edge preserving. Also, the paper proposes the better haze removing techniques using fusion based approach which gives better quality haze removal compared to the bench mark haze removal techniques. Experimental results tested with NIQE have proved the worth of proposed methods.
{"title":"Improved Haze Removal Method Using Proportionate Fusion of Color Attenuation Prior and Edge Preserving","authors":"Sudeep D. Thepade, Pratibha Mishra, Rucha Udgirkar, Sahil Singh, Poonam Mengwade","doi":"10.1109/ICCUBEA.2018.8697664","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697664","url":null,"abstract":"Nowadays, fog and haze are becoming a global challenge. Images captured under the hazy condition have poor contrast and corrupted colour. Such images limit the visibility and thus hinder the way for the computer vision purposes like video observation, entity recognition. Such hazy images affect the usual working in the transportation sector e.g. trains, ships etc. One of the prominent factors affecting the outdoor vision applications is poor vision and thus, it may result in an intangible loss like safety. The image captured shows this behaviour because of the air light. This paper analyses the widely used techniques for haze removal from images alias color attenuation prior based haze removal and haze removal with edge preserving. Also, the paper proposes the better haze removing techniques using fusion based approach which gives better quality haze removal compared to the bench mark haze removal techniques. Experimental results tested with NIQE have proved the worth of proposed methods.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"956 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114428187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Cryptography and Biometrics are two efficient and powerful technologies to achieve high proven information security. As private keys act as an important component in cryptography, one of the main challenges in the cryptosystem is maintaining the confidentiality of these private keys. This problem can be solved by making use of biometric traits. Biometric authentication verifies user's identity using biometric traits. However, a biometric authentication fails to protect the user's biometric template stored in a database, as it is susceptible to various attacks. The fuzzy vault system is the form of bio-cryptosystem that combines cryptography and biometrics together to overcome the pitfalls of these technologies. This project work aims at exploring a fuzzy vault system to secure ATM pins and passwords with the fingerprint data such that only the legitimate user can access the pins and passwords by providing the valid fingerprint. The proposed system was tested using dummy fingerprint dataset to test the performance of the proposed system.
{"title":"Securing ATM Pins and Passwords Using Fingerprint Based Fuzzy Vault System","authors":"Sweedle Machado, Prajyoti D’Silva, Snehal D'mello, Supriya Solaskar, Priya Chaudhari","doi":"10.1109/ICCUBEA.2018.8697794","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697794","url":null,"abstract":"Cryptography and Biometrics are two efficient and powerful technologies to achieve high proven information security. As private keys act as an important component in cryptography, one of the main challenges in the cryptosystem is maintaining the confidentiality of these private keys. This problem can be solved by making use of biometric traits. Biometric authentication verifies user's identity using biometric traits. However, a biometric authentication fails to protect the user's biometric template stored in a database, as it is susceptible to various attacks. The fuzzy vault system is the form of bio-cryptosystem that combines cryptography and biometrics together to overcome the pitfalls of these technologies. This project work aims at exploring a fuzzy vault system to secure ATM pins and passwords with the fingerprint data such that only the legitimate user can access the pins and passwords by providing the valid fingerprint. The proposed system was tested using dummy fingerprint dataset to test the performance of the proposed system.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123435418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCUBEA.2018.8697351
Amit R. Singh, Yash Shreshthi, Neelay Waghchoure, Amey Wakchaure
Global Positioning System (GPS) has been proven to be a boon for navigation across the globe using the geographical coordinates. Although, when we have to navigate inside an enclosed space or a building these coordinates do not help in this type of navigation. So, to facilitate Indoor Navigation, there are various techniques used such as Wi-Fi Fingerprinting, Digital Compass Technologies, QR Code, RFID etc. We propose to use BLE (Bluetooth Low Energy) Beacons for this Indoor Navigation System (INS) as it is more proficient than all the other technologies in terms of range, accuracy, privacy and security. BLE is a wireless personal area technology designed and marketed by Special Interest Group (SIG) aimed at novel applications in various domains. In this paper, we have implemented an INS using these BLE Beacons which calculate the available shortest path using Dijkstra's algorithm. This algorithm finds the shortest path tree from the source by building a set of available destinations that have a minimum distance from the source to the desired destination.
{"title":"Indoor Navigation System Using Bluetooth Low Energy Beacons","authors":"Amit R. Singh, Yash Shreshthi, Neelay Waghchoure, Amey Wakchaure","doi":"10.1109/ICCUBEA.2018.8697351","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697351","url":null,"abstract":"Global Positioning System (GPS) has been proven to be a boon for navigation across the globe using the geographical coordinates. Although, when we have to navigate inside an enclosed space or a building these coordinates do not help in this type of navigation. So, to facilitate Indoor Navigation, there are various techniques used such as Wi-Fi Fingerprinting, Digital Compass Technologies, QR Code, RFID etc. We propose to use BLE (Bluetooth Low Energy) Beacons for this Indoor Navigation System (INS) as it is more proficient than all the other technologies in terms of range, accuracy, privacy and security. BLE is a wireless personal area technology designed and marketed by Special Interest Group (SIG) aimed at novel applications in various domains. In this paper, we have implemented an INS using these BLE Beacons which calculate the available shortest path using Dijkstra's algorithm. This algorithm finds the shortest path tree from the source by building a set of available destinations that have a minimum distance from the source to the desired destination.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123690202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCUBEA.2018.8697644
Shilpa Mayannavar, Bahubali K. Shiragapur, U. Wali
Orthogonal frequency division multiplexing (OFDM) is an attractive technology for wireless communication applications with high data rate capability. However an OFDM system suffers from its inherently large Peak to Average Power Ratio (PAPR). High PAPR reduces the dynamic signal range utilization and forces non-linear operation of down side components like Digital to Analog Convertor (DAC) and High Power Amplifier (HPA). A qualitative analysis of the PAPR is presented and a transformation technique to mitigate the high PAPR problem is suggested. The Double Saturating Exponential law for reduction of PAPR is compared with standard $boldsymbol{mu}$-law companding technique.
{"title":"Saturating Exponential Law for Reduction of Power and PAPR in OFDM Networks","authors":"Shilpa Mayannavar, Bahubali K. Shiragapur, U. Wali","doi":"10.1109/ICCUBEA.2018.8697644","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697644","url":null,"abstract":"Orthogonal frequency division multiplexing (OFDM) is an attractive technology for wireless communication applications with high data rate capability. However an OFDM system suffers from its inherently large Peak to Average Power Ratio (PAPR). High PAPR reduces the dynamic signal range utilization and forces non-linear operation of down side components like Digital to Analog Convertor (DAC) and High Power Amplifier (HPA). A qualitative analysis of the PAPR is presented and a transformation technique to mitigate the high PAPR problem is suggested. The Double Saturating Exponential law for reduction of PAPR is compared with standard $boldsymbol{mu}$-law companding technique.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122001215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCUBEA.2018.8697539
Sheetal Singalar, R. Banakar
The rapid developments in science and technology has led to more and more devices and systems being connected to the internet. With this, the depletion of available IPv4 addresses has increased and the requirement of a full-fledged IPv6 architecture ameliorated. There are many available transition mechanisms each with distinct requirements, operational theory and availability that help in adapting IPv6. A performance analysis can help network engineers decide the best transition mechanism for their environment. Performance metrics like RTT, throughput and bandwidth help in examining these mechanisms and to select the appropriate technique. In this paper, the main focus is to evaluate the different transition mechanisms with the help of cisco packet tracer. The analysis depicts that dual stack has better performance when compared to tunneling.
{"title":"Performance Analysis of IPv4 to IPv6 Transition Mechanisms","authors":"Sheetal Singalar, R. Banakar","doi":"10.1109/ICCUBEA.2018.8697539","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697539","url":null,"abstract":"The rapid developments in science and technology has led to more and more devices and systems being connected to the internet. With this, the depletion of available IPv4 addresses has increased and the requirement of a full-fledged IPv6 architecture ameliorated. There are many available transition mechanisms each with distinct requirements, operational theory and availability that help in adapting IPv6. A performance analysis can help network engineers decide the best transition mechanism for their environment. Performance metrics like RTT, throughput and bandwidth help in examining these mechanisms and to select the appropriate technique. In this paper, the main focus is to evaluate the different transition mechanisms with the help of cisco packet tracer. The analysis depicts that dual stack has better performance when compared to tunneling.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116832774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCUBEA.2018.8697771
V. Kedia, Zubayr Khalid, Saptarsi Goswami, N. Sharma, Kavita Suryawanshi
Portfolio Management is a concept of selecting the proportions of various assets that is to be held in a portfolio to have a good return without a significant risk exposure. Portfolio optimization is one important building block in financial management and investment banking. One possible strategy for minimisation of risk is by enlarging or varying its field of operation for the portfolio. Constructing an optimal portfolio by judging and selecting the best possible combinations of different portfolio is a computationally challenging problem since it comes up with an exponential complexity. Here, we have proposed a simple k-means based clustering strategy for an optimal portfolio. BSE100 stocks are represented by their fundamental financial ratios. Clustering is performed, and a prototype stock is selected from each of the clusters. An equal investment strategy demonstrates superior return as compared to the indices as well as top mutual funds. The classification is done by considering a host of investment parameters. We compare the rate of return of these stocks to the benchmark of Indian Stock Exchange.
{"title":"Portfolio Generation for Indian Stock Markets Using Unsupervised Machine Learning","authors":"V. Kedia, Zubayr Khalid, Saptarsi Goswami, N. Sharma, Kavita Suryawanshi","doi":"10.1109/ICCUBEA.2018.8697771","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697771","url":null,"abstract":"Portfolio Management is a concept of selecting the proportions of various assets that is to be held in a portfolio to have a good return without a significant risk exposure. Portfolio optimization is one important building block in financial management and investment banking. One possible strategy for minimisation of risk is by enlarging or varying its field of operation for the portfolio. Constructing an optimal portfolio by judging and selecting the best possible combinations of different portfolio is a computationally challenging problem since it comes up with an exponential complexity. Here, we have proposed a simple k-means based clustering strategy for an optimal portfolio. BSE100 stocks are represented by their fundamental financial ratios. Clustering is performed, and a prototype stock is selected from each of the clusters. An equal investment strategy demonstrates superior return as compared to the indices as well as top mutual funds. The classification is done by considering a host of investment parameters. We compare the rate of return of these stocks to the benchmark of Indian Stock Exchange.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":" 43","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120832227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/iccubea.2018.8697358
Akshen Kadakia, D. Desai, Urvi Mistry, Mitchell D'silva
In today's busy world, travelling can be one of the therapies that can reduce all our stress. A traveller has lots of dreams but lack of plans. If the user is sure about the place to visit, yet he never finds all the required information at the same place. Even if he finds all the information of the destination; he is not sure about the reviews of the places in that destination and it would take him a number of days to make an itinerary. There are many existing systems such as tour planning websites, offline customized tour planners, etc. to help plan an itinerary, but they don't suffice all the user requirements. Also, they do not provide instant customization. Our survey confirmed that the users experienced some problems with the existing systems. Thus, this paper presents a trip planning application ‘Voyageur’ which will help the users to plan their trips more efficiently. It will help the users to find all the information required at a single place. Also, it will give freedom to the user to build their customized itinerary automatically by taking into consideration various factors such as user preferences, the distance between places to visit, etc. It will provide the user with alternative plans for their trip using genetic algorithm. It will also suggest best hotels and places to visit based on ratings available on the internet. Thus, this instant itinerary generation will save a lot of user's time.
{"title":"Voyageur","authors":"Akshen Kadakia, D. Desai, Urvi Mistry, Mitchell D'silva","doi":"10.1109/iccubea.2018.8697358","DOIUrl":"https://doi.org/10.1109/iccubea.2018.8697358","url":null,"abstract":"In today's busy world, travelling can be one of the therapies that can reduce all our stress. A traveller has lots of dreams but lack of plans. If the user is sure about the place to visit, yet he never finds all the required information at the same place. Even if he finds all the information of the destination; he is not sure about the reviews of the places in that destination and it would take him a number of days to make an itinerary. There are many existing systems such as tour planning websites, offline customized tour planners, etc. to help plan an itinerary, but they don't suffice all the user requirements. Also, they do not provide instant customization. Our survey confirmed that the users experienced some problems with the existing systems. Thus, this paper presents a trip planning application ‘Voyageur’ which will help the users to plan their trips more efficiently. It will help the users to find all the information required at a single place. Also, it will give freedom to the user to build their customized itinerary automatically by taking into consideration various factors such as user preferences, the distance between places to visit, etc. It will provide the user with alternative plans for their trip using genetic algorithm. It will also suggest best hotels and places to visit based on ratings available on the internet. Thus, this instant itinerary generation will save a lot of user's time.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125866302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCUBEA.2018.8697860
M V Patil, Meenakshi Patil
Object tracking is an important task in the field of computer vision. In which the camera tracking have become a common requirement in today's society. The inexpensive video camera and the high quality lens generate a great interest in the object tracking field. Generally, it is not easy to track human behavior in an environment with a large view. So the project aims to solve the big problems which are associated with the large view camera system to track the people in the large area which is single targets in nonlinear motion, handle occlusion & to reduce the processing time. In this paper a new algorithm is used to solve the problems which are by using a GbLN-BCO & model based particle filter. The proposed algorithm is tested on the several set of video data. The accuracy of the tracking perform is greater than the previous techniques i.e. unscented Kalman filter & Parzen Particle Filter.
{"title":"Tracking Human Movements in Large View Cases","authors":"M V Patil, Meenakshi Patil","doi":"10.1109/ICCUBEA.2018.8697860","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697860","url":null,"abstract":"Object tracking is an important task in the field of computer vision. In which the camera tracking have become a common requirement in today's society. The inexpensive video camera and the high quality lens generate a great interest in the object tracking field. Generally, it is not easy to track human behavior in an environment with a large view. So the project aims to solve the big problems which are associated with the large view camera system to track the people in the large area which is single targets in nonlinear motion, handle occlusion & to reduce the processing time. In this paper a new algorithm is used to solve the problems which are by using a GbLN-BCO & model based particle filter. The proposed algorithm is tested on the several set of video data. The accuracy of the tracking perform is greater than the previous techniques i.e. unscented Kalman filter & Parzen Particle Filter.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124644242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCUBEA.2018.8697355
A. Londhe, Vikrant Bhalerao, Suyog Ghodey, S. Kate, Niranjan Dandekar, Shubham Bhange
Large, distributed network systems such as the Cloud cater to the immense data storage needs of people around the world. This data stored upon the cloud may be sensitive, which makes the Security aspect of these Cloud systems extremely imperative. The Cloud nodes host this data. If these nodes are compromised by a malicious entity then consequences may be dire. In this paper we have proposed and put forth the results of a system which will implement a storage methodology that uses the Division and Replication strategy for storing the data. In this system, the file will be fragmented and these fragments will be replicated according to the replication factor before storing it upon the cloud. The fragments are dispersed such that consecutive nodes on the Cloud do not hold the fragments of a same file and so that even if a node is compromised no significant information is leaked to the attacker. This system will enhance cloud security using Division and Replication of data in Cloud for Optimal Performance and Security (DROPS) methodology. This additional security will come without any cryptographic techniques being applied. Lack of these computation heavy cryptographic techniques will mean that security will come without the compromise of increasing the computation load. The system will analyze the performance of our methodology by portraying it in a virtual environment comprising of virtual machines which form a Cloud network. We will depict the results of our system and how it handled storing data onto the cloud.
{"title":"Data Division and Replication Approach for Improving Security and Availability of Cloud Storage","authors":"A. Londhe, Vikrant Bhalerao, Suyog Ghodey, S. Kate, Niranjan Dandekar, Shubham Bhange","doi":"10.1109/ICCUBEA.2018.8697355","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697355","url":null,"abstract":"Large, distributed network systems such as the Cloud cater to the immense data storage needs of people around the world. This data stored upon the cloud may be sensitive, which makes the Security aspect of these Cloud systems extremely imperative. The Cloud nodes host this data. If these nodes are compromised by a malicious entity then consequences may be dire. In this paper we have proposed and put forth the results of a system which will implement a storage methodology that uses the Division and Replication strategy for storing the data. In this system, the file will be fragmented and these fragments will be replicated according to the replication factor before storing it upon the cloud. The fragments are dispersed such that consecutive nodes on the Cloud do not hold the fragments of a same file and so that even if a node is compromised no significant information is leaked to the attacker. This system will enhance cloud security using Division and Replication of data in Cloud for Optimal Performance and Security (DROPS) methodology. This additional security will come without any cryptographic techniques being applied. Lack of these computation heavy cryptographic techniques will mean that security will come without the compromise of increasing the computation load. The system will analyze the performance of our methodology by portraying it in a virtual environment comprising of virtual machines which form a Cloud network. We will depict the results of our system and how it handled storing data onto the cloud.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129420598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-08-01DOI: 10.1109/ICCUBEA.2018.8697671
R. Badgujar, P. Deore
Several diseases have adverb effect on visual system of human visual system (eye) and diabetes is leading one among them. Prolong and uncontrolled diabetic patient is prone to Diabetic Retinopathy (DR). DR is asymptomatic disease hence requires detection in early stages to avoid big loss in vision. It shows immediate necessity of screening system to access eye images and analyze for DR detection. Microaneurysms (MAs) are primary lesion of DR, so their detection can give time for patient and ophthalmologist to prevent further vision loss. Region growing segmentation method is proposed for accurate detection of MAs. The preprocessing of retinal images uses non local means (NLM) filter and contrast limited adaptive histogram equalization (CLAHE) for noise removal and enhancement image quality. In segmentation, region growing algorithm in which the seeds for the grower are selected and positioned by means of Forstner Corner Detection theory is utilized. After segmentation, the redundant areas are removed using morphological operations (Niblack Adaptive Thresholding) and finally the Predator prey optimizer is used for optimizing the features for MA detection.
{"title":"Region Growing Based Segmentation Using Forstner Corner Detection Theory for Accurate Microaneurysms Detection in Retinal Fundus Images","authors":"R. Badgujar, P. Deore","doi":"10.1109/ICCUBEA.2018.8697671","DOIUrl":"https://doi.org/10.1109/ICCUBEA.2018.8697671","url":null,"abstract":"Several diseases have adverb effect on visual system of human visual system (eye) and diabetes is leading one among them. Prolong and uncontrolled diabetic patient is prone to Diabetic Retinopathy (DR). DR is asymptomatic disease hence requires detection in early stages to avoid big loss in vision. It shows immediate necessity of screening system to access eye images and analyze for DR detection. Microaneurysms (MAs) are primary lesion of DR, so their detection can give time for patient and ophthalmologist to prevent further vision loss. Region growing segmentation method is proposed for accurate detection of MAs. The preprocessing of retinal images uses non local means (NLM) filter and contrast limited adaptive histogram equalization (CLAHE) for noise removal and enhancement image quality. In segmentation, region growing algorithm in which the seeds for the grower are selected and positioned by means of Forstner Corner Detection theory is utilized. After segmentation, the redundant areas are removed using morphological operations (Niblack Adaptive Thresholding) and finally the Predator prey optimizer is used for optimizing the features for MA detection.","PeriodicalId":422920,"journal":{"name":"2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128324412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}