Time filter

Source Type

A new group of switching vector filters based on the non-causal linear prediction for the detection of impulse noise from colour images is presented. The proposed filters utilise the non-causal linear prediction coefficients obtained from the block-by-block autocorrelation function to find prediction vector pixel value at the centre of the filter window. Thirteen prediction coefficients are selected from the autocorrelation matrix obtained from a block of an image, and these coefficients are used to predict all pixels in that block. The difference between the predicted pixel and the original decides whether the pixel is corrupted with impulse noise. Extensive simulation experiments indicate that the new vector filters outperform the other vector filters currently used to eliminate impulse noise from colour images. © 2014 RPS.

Manglem Singh K.,NIT Manipur | Chanu Y.J.,NERIST | Tuithung T.,NERIST
International Journal of Computers, Communications and Control | Year: 2014

The paper proposes a novel steganalytic technique for ±k steganography based on noncausal linear predictor using prediction coefficients obtained from the autocorrelation matrix for a block of pixels in the stego-image. The image is divided into equal-size blocks, autocorrelation matrix is found for the block, and the appropriate noncausal linear prediction coefficients is selected to predict all pixels in that block. A pixel is assumed to be embedded with message bit if the absolute difference between the original pixel value and predicted pixel value exceeds the pre-defined threshold. The effectiveness of the proposed technique is verified using different images. © 2006-2014 by CCC Publications.

Chanu Y.J.,NERIST | Tuithung T.,NERIST | Manglem Singh Kh.,NIT Manipur
Proceedings - 2012 3rd National Conference on Emerging Trends and Applications in Computer Science, NCETACS-2012 | Year: 2012

The paper describes a short survey on different types of steganography techniques for image in spatial and transform domains and steganalysis techniques for the detection of secret message in the image. The strong and weak points of these techniques are mentioned briefly so that researchers who work in steganography and steganalysis gain prior knowledge in designing these techniques and their variants. One can develop a better steganography technique by analyzing the contemporary steganalysis techniques. © 2012 IEEE.

Neelima A.,NIT Manipur | Singh K.M.,NIT Manipur
Computer Journal | Year: 2016

It is almost impossible to distinguish between the original and manipulated images subjectively due to the growth in technologies. The main aim of this paper is to develop a robust hash function, which can withstand legitimate modifications. A robust hash algorithm based on scale-invariant feature transform (SIFT) and singular value decomposition (SVD) is being proposed in this paper. Hash values are generated from the maximum singular values obtained after applying SVDs to the SIFT key-points mapped non-overlapping blocks of pixels. The experimental result shows that the proposed hashing method is robust against the various attacks. © 2015 The British Computer Society 2015. All rights reserved.

Singh T.R.,Assam University | Singh K.M.,NIT Manipur | Roy S.,Assam University
AEU - International Journal of Electronics and Communications | Year: 2013

There is wide interest in multimedia security and copyright protection due the explosion of data exchange in the Internet and the extensive use of digital media. We propose a novel video watermarking scheme based on visual cryptography and scene change detection in discrete wavelet transform domain. We start with a complete survey of the current image and video watermarking technologies, and have noticed that majority of the existing schemes are not capable of resisting all attacks. We propose the idea to use different parts of a single watermark into different scenes of a video for generation of the owner's share from the original video based on the frame mean in same scene and the binary watermark, and generation of the identification share based on the frame mean of probably attacked video. These two shares after stacking can reveal the copyright ownership. Experiments are conducted to verify the robustness through a series of experiments. The security requirement of the proposed algorithm is achieved with the visual cryptography. © 2013 Published by Elsevier GmbH.

Adhikari S.,NIT Manipur | Sinha N.,National Institute of Technology Silchar
International Journal of Computational Science and Engineering | Year: 2012

Flexible alternating current transmission systems (FACTS) devices have been proposed as an effective solution for controlling power flow and regulating bus voltage in electrical power systems, resulting in an increased transfer capability, low system loss and improved stability. However, to what extent the performance can be highly enhanced depends on location and parameters of these devices. Static synchronous series converter (SSSC) is one of the most promising FACTS devices for power flow control. In this paper, we propose an evolutionary optimisation techniques, namely bacteria foraging algorithm (BFA) to select the optimal location and optimal parameters setting of SSSC, which minimises transmission loss, production cost and voltage deviation in power network. Case studies with IEEE-30 bus system are presented to illustrate the applicability of the algorithm. Copyright © 2012 Inderscience Enterprises Ltd.

Thingom I.,NIT Manipur | Khundrakpam P.,NIT Manipur
Proceedings of the 2016 IEEE International Conference on Wireless Communications, Signal Processing and Networking, WiSPNET 2016 | Year: 2016

The fundamental operations of a Finite Impulse Response (FIR) digital filter are multiply and accumulate (MAC). Thus, the complexity of the filter largely depends on the complexity of the multiplier blocks. There exist several techniques to efficiently implement the multiplier using add and shift operations exclusively. Such designs are termed as multiplierless. The Single Constant Multiplication/Multiple Constant Multiplication (SCM/MCM) problem is finding the minimum number of additions and subtractions. This paper presents an FIR filter based on the RADIX-2r recoding technique and implemented on a Field Programmable Gate Array (FPGA). The proposed filter performs better than a filter designed using generic multipliers. © 2016 IEEE.

Singh K.P.,Assam University | Singh K.M.,NIT Manipur | Dewri M.,Assam University
Research in Astronomy and Astrophysics | Year: 2016

On studying some new models of Robertson-Walker universes with a Brans-Dicke scalar field, it is found that most of these universes contain a dark energy like fluid which confirms the present scenario of the expansion of the universe. In one of the cases, the exact solution of the field equations gives a universe with a false vacuum, while in another it reduces to that of dust distribution in the Brans-Dicke cosmology when the cosmological constant is not in the picture. In one particular model it is found that the universe may undergo a Big Rip in the future, and thus it will be very interesting to investigate such models further. © 2016 National Astronomical Observatories, Chinese Academy of Sciences and IOP Publishing Ltd.

Singh T.R.,Assam University | Roy S.,Assam University | Singh K.M.,N.I.T. Manipur
Proceedings - 2013 International Symposium on Computational and Business Intelligence, ISCBI 2013 | Year: 2013

Power Law Transformation (PLT) is a standard transformation function used in image enhancement techniques. PLT associates two constant parameters which can change an input value in different ways. The two PLT parameters can take different roles on different domains like spatial and transform domain. Discrete Cosine Transformation(DCT) is the popular transform domain used in image processing. Alpha Rooting (AR) and DCT block domain techniques are popular image contrast enhancement techniques which apply PLT on DCT domain. They are limited to edge contrast enhancement only. This paper describes an image enhancement technique which applies PLT on a global DCT domain like AR. PLT is applied only on AC coefficients while AR applies to all the DCT coefficients. This new technique can enhance global contrast, edge contrast and brightness of an image through a single function with three parameters. The results of this technique are compared with other techniques, applied on transformed domain for quality and quantity measure. This technique outperforms than the other techniques reported so far. © 2013 IEEE.

Singh Y.S.,NIT Manipur | Devi B.P.,NIT Manipur | Singh K.M.,NIT Manipur
Proceedings of the 2012 World Congress on Information and Communication Technologies, WICT 2012 | Year: 2012

The performance of Multilayer Feed Forward Artificial Neural Network in image compression using Conjugate Gradient algorithm is examined in this paper. One of the essential factors that affect the performance of Artificial Neural Networks is the learning algorithm. In this paper we presented the algorithm for implementation of digital image compression using MFFANN with 64 input neurons, 13 or 64 neurons in hidden layer that are determining compression rate and 64 output neurons. Based on Conjugate Gradient algorithm compressed for TIF, JPEG, PNG and BMP images. Compression of image in any form is an active field and big business. Image compression is a subset of this huge field of data compression, where we undertake the compression of image data specifically. The performance of compression is evaluated using some standard images. It is shown that the development of architecture and training algorithm provide high compression ratio. The results of simulation are shown and compared different quality parameter of it's by applying on various images. © 2012 IEEE.

Loading NIT Manipur collaborators
Loading NIT Manipur collaborators