The Impact of Thrust Technologies on Image Processing

$230.00

Digvijay Pandey, PhD – Department of Technical Education, Kanpur (Government of U.P), India
Rohit Anand, PhD – Assistant Professor, Department of Electronics & Communication Engineering, G.B.Pant Engineering College (Government of NCT of Delhi), New Delhi, India
Nidhi Sindhwani, PhD – Assistant Professor, ASETD Amity University, Noida, India
Binay Kumar Pandey – Assistant Professor, Department of Information Technology, College of Technology,  Govind Ballabh Pant University of Agriculture and Technology, Pantnagar, Uttarakhand, India
Reecha Sharma, PhD – Assistant Professor, Department of Electronics & Communication Engineering, Punjabi University, Patiala, India
Pankaj Dadheech, PhD – Associate Professor & Dy. HOD, Department of Computer Science & Engineering (NBA Accredited), Swami Keshvanand Institute of Technology, Management & Gramothan (SKIT), Jaipur, Rajasthan, India

Series: Technology in a Globalizing World
BISAC: TEC000000; TEC066000; TEC035000
DOI: https://doi.org/10.52305/ATJL4552

Nowadays, audiovisual content is distributed rapidly but also extensively to remote regions via the web in a number of formats, comprising images, audio, video, and textual. Everything is easily accessible and simple for all users thanks to digitized transmission via the World Wide Web. As a consequence, data protection is indeed a required and essential activity. Networking or data security has three primary goals: confidentiality, integrity, and availability. Confidentiality refers to content that is secure yet not accessed by unauthorized individuals. The term “integrity” refers to an information’s veracity, while “availability” refers to the ease in which authorized users can access essential data. Information security is insufficient on its own to assure the constant operation of data such as text, audio, video, and electronic images.

Although there are several ways to image security available, including encryption, watermarking, digital watermarking, reversible watermarking, cryptography, and steganography.  The goal of this book is to transfer secure textual data storage on public networks and IoT devices by concealing secret data in multimedia. It also covers discussions on textual image recognition using machine learning/deep learning-based methods. This book also offers advanced steganography ways for embedding textual data on the cover image, as well as a new way for secure transmission of biological imaging, imaging with machine learning and deep learning, and 2D, 3D imaging in the field of telemedicine.

Table of Contents

Preface

Chapter 1. The Investigation of Image Processing in Forensic Science
Vikas Menon¹, Bhairav Prasad¹, Mandheer Kaur¹, Harleen Kaur¹, Digvijay Pandey², and Dr. Sanwta Ram Dogiwal³
¹Chandigarh College of Technology, Landran, Mohali, Punjab, India
²Department of Technical Education, Uttar Pradesh, India
³Associate Professor, Department of Information Technology, Swami Keshvan and Institute of Technology, Management and Gramothan (SKIT), Jaipur, Rajasthan, India

Chapter 2. Integrating IoT Based Security with Image Processing
Vivek Veeraiah¹, Jay Kumar Pandey², Santanu Das³, Dilip R⁴, Makhan Kumbhkar⁵, Huma Khan⁶ and Ankur Gupta⁷
¹Research Scholar, Department of R & D Computer Science, Adichunchanagiri University, Mandya, Karnataka, India
²Shri Ramswaroop Memorial University, Dewa Road, Barabanki, Uttar Pradesh, India
³Associate Professor, Department of Biotechnology, Seshadripuram First Grade College, Yelahanka New Town, Bangalore, India
⁴Assistant Professor, Department of Electronics and Communication Engineering, Dayananda Sagar Academy of Technology & Management, Udayapura, Bengaluru, India
⁵Assistant Professor, Department of Computer Science, Christian Eminent College, Indore, Madhya Pradesh, India
⁶Assistant Professor, Department of Computer Science and Engineering, Rungta College of Engineering and Technology, Bhilai, Chhattisgarh, India
⁷Assistant Professor, Department of Computer Science and Engineering, Vaish College of Engineering, Rohtak, Haryana, India

Chapter 3. Pattern Analysis for Feature Extraction in Multi-Resolution Images
Ashi Agarwal¹, Arpit Saxena², Digvijay Pandey³, Binay Kumar Pandey⁴, A. Shahul Hameed⁵, A. Shaji George⁶ and Sanwta Ram Dogiwal⁷
¹Assistant Professor, CS, ABES Engineering College, Ghaziabad, UP, India
²Research Scholar, RTU, Kota
³Department of Technical Education, IET, Dr. A.P.J. Abdul Kalam Technical University, Uttar Pradesh India
⁴Department of Information Technology, College of Technology, Govind Ballabh Pant University of Agriculture and Technology Pantnagar
⁵General Manager, Department of Telecommunication, Consolidated Techniques Co. Ltd, (CTC) Riyadh, Kingdom of Saudi Arabia
⁶Professor, Department of Information and Communication Technology, Crown University, Int’l. Chartered Inc.(CUICI) Argentina Campus, South America
⁷Associate Professor, Department of Information Technology, Swami Keshvan and Institute of Technology, Management &and Gramothan (SKIT), Jaipur, Rajasthan, India

Chapter 4. The Design of Microstrip Patch Antenna for 2.4 GHz IoT Based RFID and Image Identification for Smart Vehicle Registry
Manvinder Sharma¹, Harjinder Singh², Digvijay Pandey³, Binay Kumar Pandey⁴, A. Shaji George⁵ and Pankaj Dadheech⁶
¹Professor, Department of ECE, Malla Reddy Engineering College and Management Sciences, Hydrabad, India
²Assistant Professor, Department of ECE, Punjabi University, Patiala, Punjab, India
³Assistant professor, Department of Technical Education, IET, Dr. A.P.J. Abdul Kalam Technical University, Uttar Pradesh, India
⁴Assistant professor, Department of Information Technology, College of Technology, Govind Ballabh Pant University of Agriculture and Technology, Pantnagar, India
⁵Professor, Department of Information and Communication Technology, Crown University, Int’l. Chartered Inc.(CUICI) Argentina Campus, South America
⁶Associate Professor and Dy. HOD in the Department of Computer Science and Engineering (NBA Accredited), Swami Keshvan and Institute of Technology, Management and Gramothan (SKIT), Jaipur, Rajasthan, India

Chapter 5. Kidney Stone Detection from Ultrasound Images Using Masking Techniques
Harshita Chaudhary and Binay Kumar Pandey
Department of Information Technology, College of Technology, Govind. Ballabh Pant University of Agriculture and Technology, Pantnagar Udham Singh Nagar, Uttarakhand, India

Chapter 6. Biometric Technology and Trends
Mandeep Kaur¹, Ritesh Sinha¹, Syed Ali Rizvi¹, Divyansh Jain¹, Harsh Jindal¹ and Digvijay Pandey²
¹Department of Computer Science Engineering, Chandigarh Group of Colleges, Landran, Mohali, Punjab, India
²Department of Technical Education, Uttar Pradesh, India

Chapter 7. Comparison of Digital Image Watermarking Methods: An Overview
Vibha Aggarwal, Sandeep Gupta, Navjot Kaur, Virinder Kumar Singla and Shipra
College of Engineering & Management, Punjabi University Neighborhood Campus, Rampura Phul, Punjab, India

Chapter 8. Novel Deep Transfer Learning Models on Medical Images: DINET
Harmanpreet Kaur¹, Reecha Sharma² and Gurpreet Kaur³
¹Department of Computer Science and Engineering, Chandigarh University, Punjab, India
²Department of Electronics & Communication Engineering, Punjabi University, Punjab, India
³Department of Electronics & Communication Engineering, Chandigarh University, Punjab, India

Chapter 9. A Review of the Application of Deep Learning in Image Processing
Harmanpreet Kaur¹, Reecha Sharma² and Lakwinder Kaur¹
¹Department of Computer Science and Engineering, Punjabi University, Punjab, India
²Department of Electronics & Communication Engineering, Punjabi University, Punjab, India

Chapter 10. The Survey and Challenges of Crop Disease Analysis using Various Deep Learning Techniques
P. Venkateshwari
G.B. Pant DSEU Okhla-I Campus, New Delhi, India

Chapter 11. Image Processing and Computer Vision: Relevance and Applications in the Modern World
Sukhvinder Singh Deora¹ and Mandeep Kaur²
¹Department of Computer Science and Applications, Maharshi Dayanand University, Rohtak, India
²Department of Computer Applications, Panipat Institute of Engineering and Technology, Samalkha, Panipat, India

Chapter 12. Optimization Practices Based on the Environment in Image Processing
Shipra1, Priyanka¹, Navjot Kaur¹, Sandeep Gupta¹ and Reecha Sharma²
¹COEM, Punjabi University Neighborhood Campus, Rampura Phul, Punjab, India
²Department of Electronics and Communication Engineering, Punjabi University Patiala, Punjab, India

Chapter 13. Simulating the Integration of Compression and Deep Learning Approaches in IoT Environments for Security Systems
Harinder Singh¹, Rohit Anand², Vivek Veeraiah³, Veera Talukdar⁴, Suryansh Bhaskar Talukdar⁵, Sushma Jaiswal⁶ and Ankur Gupta⁷
¹Department of CS&IT, Sant Baba Attar Singh Khalsa College Sandaur, Punjab, India
²Department of Electronics and Communication Engineering, G. B. Pant DSEU Okhla-I Campus (Formerly G. B. Pant Engineering College), New Delhi, India
³Research Scholar, Department of R&D Computer Science, Adichunchanagiri University, Mandya, Karnataka, India
⁴Department of IT and Management, Shri Ram College of Commerce, Science and Arts, Mumbai, Maharashtra, India
⁵School of Computer Science and Engineering, VIT Bhopal, Madhya Pradesh, India
⁶Department of Computer Science and Information Technology, Guru Ghasidas Vishwavidyalaya, Bilaspur, Chhattisgarh, India
⁷Department of Computer Science and Engineering, Vaish College of Engineering, Rohtak, Haryana, India

Chapter 14. A Review of Various Text Extraction Algorithms for Images
Binay Kumar Pandey¹, Digvijay Pandey², Vinay Kumar Nassa³, A. Shahul Hameed⁴, A. Shaji George⁵, Pankaj Dadheech⁶ and Sabyasachi Pramanik⁷
¹Department of Information Technology, College of Technology, GovindBallabh Pant University of Agriculture and Technology Pantnagar
²Department of Technical Education, IET, Dr. A. P. J. Abdul Kalam Technical University, Uttar Pradesh India
³Professor. -CSE dept, Rajarambapu Institute of Technology, Rajaramnagar (Islampur-Maharshtra)
⁴General Manager, Department of Telecommunication, Consolidated Techniques Co. Ltd, (CTC) Riyadh, Kingdom of Saudi Arabia
⁵Professor, Department of Information and Communication Technology, Crown University, Int’l. Chartered Inc.(CUICI) Argentina Campus, South America
⁶Associate Professor and Dy. HOD in the Department of Computer Science and Engineering (NBA Accredited), Swami Keshvanand Institute of Technology, Management and Gramothan (SKIT), Jaipur, Rajasthan, India
⁷Department of Computer Science and Engineering, Haldia Institute of Technology

Chapter 15. Machine Learning in the Detection of Diseases
Aakash Joon¹, Nidhi Sindhwani and Komal Saxena
¹Amity University Noida, Uttar Pradesh, India

Chapter 16. Applications for the Text Extraction Method of Complex Degraded Images
Binay Kumar Pandey¹, Digvijay Pandey², Vinay Kumar Nassa³, Dr. A. Shaji George⁴, Sabyasachi Pramanik⁵ and Pankaj Dadheech⁶
¹Department of Information Technology, College of Technology, Govind Ballabh Pant University of Agriculture and Technology Pantnagar, India
²Department of Technical Education, IET, Dr. A.P.J. Abdul Kalam Technical University, Uttar Pradesh, India
³CSE dept, Rajarambapu Institute of Technology, Rajaramnagar(Islampur-Maharshtra), India
⁴Department of Information and Communication Technology, Crown University, Int’l. Chartered Inc.(CUICI) Argentina Campus, South America
⁵Department of Computer Science and Engineering, Haldia Institute of Technology, India
⁶The Department of Computer Science & Engineering (NBA Accredited), Swami Keshvan and Institute of Technology, Management &and Gramothan (SKIT), Jaipur, Rajasthan, India

Index

About the Editors

Publish with Nova Science Publishers

We publish over 800 titles annually by leading researchers from around the world. Submit a Book Proposal Now!