Digital Image Watermarking Based on DWT and SVD for Fingerprint Security
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.1073-1078, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.10731078
Abstract
Protection of biometric data is gaining interest and digital watermarking techniques are used to protect the biometric data from either accidental or intentional attacks. Among all the biometric techniques, fingerprint-based identification is the oldest method which has been successfully used in numerous applications. The information used for identification or verification of a fingerprint, mainly lies in its minutiae. Advanced image watermarking is a valuable answer for the issue of data security, copyright and system security. The proposed algorithm is based on Singular Value Decomposition (SVD) and Discrete Wavelet Transform (DWT) to improve the recognition performance as well as the security of fingerprint based biometric system which will provide adequate security to fingerprint data without degrading visual quality. The algorithm converted the minutiae into binary watermark, increasing embedded information capacity. Different experiments are performed to test the effectiveness and robustness of proposed algorithm and the experimental results shows that the scheme is effective and robust against various image processing attacks. Results shows higher PSNR and NC values under general image processing.The algorithm can satisfy the transparency and robustness of the watermarking system very well and the useful information can be extracted accurately even if the fingerprint is severely degraded.
Key-Words / Index Term
Arnold transform, Digital Watermarking, DWT, Fingerprint minutiae, Normalized coefficient, Peak signal to noise ratio, SVD
References
[1] D. Mathivadhani, C. Meena, “A Comparative Study on Fingerprint Protection Using Watermarking Techniques”. In Global Journal of Computer Science and Technology, vol. 9, no. 5, pp. 98-102, 2010.
[2] Rajlaxmi Chouhan, Pritee Khanna, “Robust Minutiae Watermarking in Wavelet Domain for Fingerprint Security”. In World Academy of Science, Engineering and Technology 60 2011.
[3] R. Chouhan, A. Mishra, P. Khanna, “Wavelet-based robust digital watermarking scheme for fingerprint authentication”. In Proc. International Conference on Intelligent Computational Systems, pp. 29-33, 2011.
[4] Khalil Zebbiche, Lahouari Ghouti, Fouad Khelifi School of Electronics, Electrical Engineering and Computer Science, “Protecting Fingerprint Data using Watermarking”. In Proceedings of the First NASA/ESA Conference on Adaptive Hardware and Systems (AHS`06) 0-7695-2614-4/06, 2006 IEEE.
[5] Ms.Jalpa M.Pate1, Mr.Prayag Patel, “A brief survey on digital image watermarking techniques”. In International Journal for Technological Research in Engineering Volume 1, Issue 7, March-2014 ISSN.
[6] ] S.D. Lin, Chin-Feng Chen, "A robust DCT-based watermarking for copyright protection", (2000) IEEE Transactions on Consumer Electronics, vol. 46, no. 3, pp. 415 - 421.
[7] Weimin Yang, Xiaoning Zhao, College of Computer and Information Engineering Central South University of Forestry & Technology Changsha, Hunan, China,” A Digital Watermarking Algorithm Using singular Value Decomposition in Wavelet Domain” 978-1-61284-774-0/11,2011 IEEE.
[8] Sachin Mehta, Rajarathnam Nallusamy, Ranjeet Vinayak Marawar, Balakrishnan Prabhakaran, “A study of DWT and SVD based Watermarking Algorithms for Patient Privacy in Medical Images”. In 2013 IEEE International Conference on Healthcare Informatics.
[9]Ravi. J, K. B. Raja, Venugopal. K. R,” Fingerprint recognization using minutiae score matching”. International Journal of Engineering Science and Technology Vol.1 (2), 2009, 35-42.
[10] Divya Saxena, Department of Applied Science, Vishveshwarya Institute of Engineering and Technology, G.B.Nagar, India,” Digital Watermarking Algorithm based on Singular Value Decomposition and Arnold Transform”. In International Journal of Electronics and Computer Science Engineering, ISSN-2277-1956.
[11] J. Delaigle, C. De Vleeschouwer, B. Macq, “ Psychovisual Approach to Digital Picture Watermarking”, Journal of Electronic Imaging, vol. 7, no. 3, pp. 628-640, 1998.
[12] A. Graphs, “An Introduction to Wavelets,” IEEE Computational Science and Engineering, vol. 2, no. 2, pp. 50-61, 1995.
[13] R.C. Gonzalez, R.E. Woods, Digital Image Processing. New Jersey: Prentice Hall, Upper Saddle River, 2002.
[14] A. Abu-Errub, A. Al-Haj, “Optimized DWT Based Image Watermarking,” (2008) Proc. IEEE First International Conference on Applications of Digital Information and Web Technologies, pp. 1-6.
[15] A. Al-Haj, "Combined DWT-DCT Digital Image Watermarking", (2007) Journal of Computer Science, vol. 3, no. 9, pp. 740-746.
[16] Pooja Chinchmalatpure, Komal. Ramteke, Prashant Dahiwale,"Adaptive DWT and SVD domain digital image watermarking for fingerprint security", (2014) Journal of Emerging Technologies and Innovative Research, Volume 2, Issue 6,DOI/ JETIR1506039.
[17] Komal. Ramteke,Swati Ramteke "Hybrid DWT and SVD based Biometric Watermarking for Fingerprint Authentication", (2017) International Journal of Advanced Research in Computer and Communication Engineering, Volume 7,Issue 1,DOI 10.17148/IJARCCE.2018.717.
[18] Pooja Chinchmalatpure, Komal. Ramteke, Prashant Dahiwale," Finger print Authentication by hybrid DWT and SVD based Watermarking ", (2014) 2nd IEEE International conference on Innovations in Information, Embedded and Communication Systems.
[19] Weimin Yang ; Xiaoning Zhao," A digital watermarking algorithm using Singular Value Decomposition in wavelet domain", (2011) International Conference on multimedia technology.
[20] Ben Wang ; Jinkou Ding ; Qiaoyan Wen ; Xin Liao ; Cuixiang Liu," AN image watermarking algorithm based on DWT DCT and SVD", (2007) IEEE International Conference on Network Infrastructure and Digital Content.
[21] Qiang Li ; Chun Yuan ; Yu-Zhuo Zhong," Adaptive DWT-SVD Domain Image Watermarking Using Human VisualModel", (2007) IEEE The 9th International Conference on Advanced Communication Technology.
[22]B.Prasanalakshmi ," Biometric Cryptosystem Involving Two Traits And Palm Vein As Key", (2011) International Conference On Communication Technology And System Design 2011 Published by Elsevier Ltd. DOI:10.1016/j.proeng.2012.01.865.
Citation
Komal Ramteke, Akhil Anjikar, Sushil Chavhan, "Digital Image Watermarking Based on DWT and SVD for Fingerprint Security," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1073-1078, 2019.
Deviation of Remainder from Euclidean Definition, Java’s Perspective, Reason(s) and Suggestion(s).
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.1079-1083, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.10791083
Abstract
Current Era is the age of Information Technology. No single domain is untouched by digital systems. The backbone of this era is the programming languages which make such high quality software that can solve the most challenging problems to human mind and eliminate the chances of error. Java is such a language which spans across standalone software programming to web development to mobile application development to networking to cognitive programming to data mining and etc, which is the foundation of all modern programming. The remainder operation is a part of every programming language, so in Java, is a very important operation and has its use from mundane computing to the most technical implementations. This paper addresses the issue that remainder operation in mathematics is achieved by the definition given by the great mathematician Euclid, founder of geometry, whereas in Java the implementation of remainder division does not exactly follow the rules of mathematics, and due to this deviation and also for a programmer who does not know this fact can unknowingly program a software with wrong calculations which may result in catastrophe. Besides raising this issue this paper also provides suggestion(s) and solution(s) to overcome the matter and align properly with the underlying mathematics of remainder operation.
Key-Words / Index Term
Remainder, Java, Euclidean theorem, Arithmetic Operators
References
[1] H. Schildt, “Java The Complete Reference Ninth Edition”, McGraw-Hill Education, United States of America, pp. 10-22, 2014, ISBN: 978-0-07-180856-9
[2] David M. Burton, “Elementary Number Theory”, McGraw-Hill Higher Education, United States of America, pp. 26-32, 2007, ISBN-IO 0-07-305I88-8
[3] Saurabh S. Patel and Sunil N. Kore, "Case Study: Digital Advertisement Board", ISROSET-Journal (IJSRCSE) , Vol.1 , Issue.3 , pp.48-50, May-2013
[4] V. Kapoor, "Data Encryption and Decryption Using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’prime Number", Journal (IJSRNSC), Vol.1 , Issue.2 , pp.35-38, May-2013
Citation
Rishi Saxena, "Deviation of Remainder from Euclidean Definition, Java’s Perspective, Reason(s) and Suggestion(s).," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1079-1083, 2019.
Voice Based Gmail Service for Visually Challenged People
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.1084-1087, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.10841087
Abstract
In this day and age correspondence has turned out to be so natural due to reconciliation of correspondence innovations with web. In any case the outwardly tested individuals think that its exceptionally hard to use this innovation on account of the way that utilizing them requires visual observation. Despite the fact that numerous new progressions have been executed to enable them to utilize the PCs productively no innocent client who is outwardly tested can utilize this innovation as effectively as an ordinary gullible client can do that is not normal for typical clients, they require some training for utilizing the accessible advancements. This paper goes for building up an email framework that will help even a credulous outwardly disabled individual to utilize the administrations for correspondence without past preparing. The framework won`t let the client make utilization of console rather will work just on mouse activity and discourse change to content. Additionally, this framework can be utilized by any typical individual additionally for instance the person who can`t peruse. The framework is totally founded on intuitive voice reaction which will make it easy to understand and productive to utilize. Web has turned out to be one of the essential civilities for everyday living. This design will decrease psychological burden taken by visually impaired individual to keep in mind and type characters utilizing console as all activities are going also empowered through mouse. This framework can be utilized successfully by incapacitated and uneducated people.
Key-Words / Index Term
TSS(Text To Speech), ASR(Automatic Speech Recognition), IVR(Interactive Voice Response), STT(Speech To Text)
References
[1] Grussenmeyer, W., Folmer, E.,“Accessible touchscreen technology for people with visual impairments: a survey”, ACM Trans. Access. Comput. (TACCESS) 9, 6 (2017).
[2] Shoba, G., Anusha, G., Jeevitha, V., Shanmathi, R.,“An interactive email for visually impaired”, International. Journal. Adv. Res. Comput. Commun. Eng. (IJARCCE) 5089–5092, 2014.
[3] Romano, M., Bellucci, A., Aedo, I., “Understanding touch and motion gestures for blind people on mobile devices”, In: Human-Computer Interaction, pp. 38–46. Springer, Cham (2015).
[4] Biswas, P., Robinson, P. “Evaluating the design of inclusive inter-faces by simulation.” In: Proceedings of the 15th international con-ference on intelligent user interfaces, pp.7277–280 (2010).
[1] Thomas L., “A Scheme to Eliminate Redundant Rebroadcast and Reduce Transmission Delay Using Binary Exponential Algorithm in Ad-Hoc Wireless Networks”, International Journal of Computer Sciences and Engineering, Vol.3, Issue.8, pp.1-6, 2017.
[2] C.T. Lee, A. Girgensohn, J. Zhang, “Browsers to support awareness and Social Interaction,” Computer Graphics and Applications, Journal of IEEE Access , Vol.24, Issue.10, pp.66-75, 2012. doi: 10.1109/MCG.2004.24
[3] Lin C., Lee B., “Exploration of Routing Protocols in Wireless Mesh Network”, In the Proceedings of the 2015 IEEE Symposium on Colossal Big Data Analysis and Networking Security, Canada, pp.111-117, 2015.
[4] S. Tamilarasan, P.K. Sharma, “A Survey on Dynamic Resource Allocation in MIMO Heterogeneous Cognitive Radio Networks based on Priority Scheduling”, International Journal of Computer Sciences and Engineering, Vol.5, No.1, pp.53-59, 2017.
[5] Kortum, P., Sorber, M. “Measuring the usability of mobile applications for phones and tablets”. International Journal Hum. Comput. Interact. 31, 518–529 (2015).
[6] Kane, S.K., Bigham, J.P., Wobbrock, J.O.“Slide rule: making mobile touch screens accessible to blind people using multi-touch interaction techniques” In: Proceedings of the 10th international ACM SIGACCESS conference on computers and accessibility, pp.773–80 (2008).
[7] Wentz, B., Hochheiser, H., Lazar, J. “A survey of blind users on the usability of email applications” Univ. Access Inf. Soc. 12, 327–336 (2013).
[8] Verma, P., Singh, R., Singh, A.K., Yadav, V., Pandey, A. “An enhanced speech-based internet browsing system for visually challenged” In: Computer and communication technology (ICCCT), 2010 international conference on, pp.724–730 (2010).
[9] Sunitha, K.V.N., Kalyani, N. “VMAIL voice enabled mail reader” In: Recent trends in information, telecommunication and computing (ITC), 2010 international conference on, pp.7284–286 (2010).
Citation
T. Mujawar, P. Mule, P. Fartade, P. Bhoite, N. Ashtekar, P. Kurzekar, "Voice Based Gmail Service for Visually Challenged People," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1084-1087, 2019.
StegNet: An Efficient CNN based Steganlyzer
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.1088-1093, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.10881093
Abstract
The objective of Image steganalysis is the detection of presence of hidden content in any given image. Steganalysis is a binary classification problem for classifying a given image into one of two classes either Stego or Cover. Conventional Steganalysis consisted of a two step method, feature extraction followed by classification using machine learning. This feature extraction process required an in-depth knowledge of image statistics which are affected by hiding the secret data. With the advent of Deep Learning, Convolution neural networks(CNN) are being widely used for image classification, with an advantage of automatic feature learning. CNN based Steganalysis methods have made the feature extraction step simple as the steganalyzer does not need to specify the features which are affected by data hiding. Added to this feature extraction step and classification step are integrated into a single step. In this paper we have reviewed the existing CNN based steganalysis methods and proposed a novel CNN architecture customized for the task of steganalysis named StegNet. StegNet is built based on deep residual learning. And each feature map is assigned a weight to determine the priority by using global average pooling.
Key-Words / Index Term
Steganalysis, feature leaning, CNN, Steganography, residual learning
References
[1] I. Cox, M. Miller, J. Bloom, J. Fridrich, and T. Kalker, Digital water- marking and steganography. Morgan kaufmann, 2007.
[2] J. Fridrich, Steganography in digital media: principles, algorithms, and applications. Cambridge University Press, 2009.
[3] J. Fridrich, M. Goljan, and R. Du, “Detecting lsb steganography in color, and gray-scale images,” IEEE multimedia, vol. 8, no. 4, pp. 22–28, 2001.
[4] I. Avcibas, N. Memon, and B. Sankur, “Steganalysis using image qual- ity metrics,” IEEE transactions on Image Processing, vol. 12, no. 2, pp. 221–229, 2003.
[5] S. Lyu and H. Farid, “Detecting hidden messages using higher-order statistics and support vector machines,” in International Workshop on Information Hiding, pp. 340–354, Springer, 2002.
[6] S. Liu, H. Yao, and W. Gao, “Steganalysis based on wavelet texture analysis and neural network,” in Intelligent Control and Automation, 2004. WCICA 2004. Fifth World Congress on, vol. 5, pp. 4066–4069, IEEE, 2004.
[7] H. Farid, “Detecting hidden messages using higher-order statistical mod- els,” in Image Processing. 2002. Proceedings. 2002 International Con- ference on, vol. 2, pp. II–II, IEEE, 2002.
[8] S. Lyu and H. Farid, “Steganalysis using higher-order image statistics,” IEEE transactions on Information Forensics and Security, vol. 1, no. 1, pp. 111–119, 2006.
[9] S. Lyu and H. Farid, “Steganalysis using color wavelet statistics and one- class support vector machines,” in Security, Steganography, and Water- marking of Multimedia Contents VI, vol. 5306, pp. 35–46, International Society for Optics and Photonics, 2004.
[10] W.-N. Lie and G.-S. Lin, “A feature-based classification technique for blind image steganalysis,” IEEE transactions on multimedia, vol. 7, no. 6, pp. 1007–1020, 2005.
[11] Y. Wang and P. Moulin, “Optimized feature extraction for learning- based image steganalysis,” IEEE Transactions on Information Forensics and Security, vol. 2, no. 1, pp. 31–45, 2007.
[12] X. Luo, F. Liu, S. Lian, C. Yang, and S. Gritzalis, “On the typical statistic features for image blind steganalysis,” IEEE Journal on selected areas in Communications, vol. 29, no. 7, pp. 1404–1422, 2011.
[13] S.-H. Zhan and H.-B. Zhang, “Blind steganalysis using wavelet statistics and anova,” in Machine Learning and Cybernetics, 2007 International Conference on, vol. 5, pp. 2515–2519, IEEE, 2007.
[14] X. Luo, F. Liu, J. Chen, and Y. Zhang, “Image universal steganalysis based on wavelet packet transform,” in Multimedia Signal Processing, 2008 IEEE 10th Workshop on, pp. 780–784, IEEE, 2008.
[15] J. Kodovsky`, J. J. Fridrich, and V. Holub, “Ensemble classifiers for steganalysis of digital media.,” IEEE Trans. Information Forensics and Security, vol. 7, no. 2, pp. 432–444, 2012.
[16] F. Li, X. Zhang, B. Chen, and G. Feng, “Jpeg steganalysis with high- dimensional features and bayesian ensemble classifier,” IEEE signal pro- cessing letters, vol. 20, no. 3, pp. 233–236, 2013.
[17] Z. Sun, M. Hui, and C. Guan, “Steganalysis based on co-occurrence ma- trix of differential image,” in Intelligent Information Hiding and Mul- timedia Signal Processing, 2008. IIHMSP’08 International Conference on, pp. 1097–1100, IEEE, 2008.
[18] Z. Sun, M. Hui, and C. Guan, “Steganalysis based on co-occurrence ma- trix of differential image,” in Intelligent Information Hiding and Mul- timedia Signal Processing, 2008. IIHMSP’08 International Conference on, pp. 1097–1100, IEEE, 2008
[19] Q.-l. Deng and J.-j. Lin, “A universal steganalysis using features derived from the differential image histogram in frequency domain,” in Image and Signal Processing, 2009. CISP’09. 2nd International Congress on, pp. 1–4, IEEE, 2009.
[20] J. Dong and T. Tan, “Blind image steganalysis based on run-length histogram analysis,” in Image Processing, 2008. ICIP 2008. 15th IEEE International Conference on, pp. 2064–2067, IEEE, 2008.
[21] I. Avciba¸s, M. Kharrazi, N. Memon, and B. Sankur, “Image steganalysis with binary similarity measures,” EURASIP Journal on Applied Signal Processing, vol. 2005, pp. 2749–2757, 2005.
[22] H. Sajedi and M. Jamzad, “A steganalysis method based on contourlet transform coefficients,” in Intelligent Information Hiding and Multime- dia Signal Processing, 2008. IIHMSP’08 International Conference on, pp. 245–248, IEEE, 2008
[23] M. Sheikhan, M. S. Moin, and M. Pezhmanpour, “Blind image steganal- ysis via joint co-occurrence matrix and statistical moments of contourlet transform,” in Intelligent Systems Design and Applications (ISDA), 2010 10th International Conference on, pp. 368–372, IEEE, 2010.
[24] T. Pevny and J. Fridrich, “Merging markov and dct features for multi- class jpeg steganalysis,” in Security, Steganography, and Watermarking of Multimedia Contents IX, vol. 6505, p. 650503, International Society for Optics and Photonics, 2007.
[25] T. Pevny, P. Bas, and J. Fridrich, “Steganalysis by subtractive pixel adjacency matrix,” IEEE Transactions on information Forensics and Security, vol. 5, no. 2, pp. 215–224, 2010.
[26] J. Fridrich and J. Kodovsky, “Rich models for steganalysis of digital im- ages,” IEEE Transactions on Information Forensics and Security, vol. 7, no. 3, pp. 868–882, 2012.
[27] V. Holub and J. Fridrich, “Random projections of residuals for digital image steganalysis,” IEEE Transactions on Information Forensics and Security, vol. 8, no. 12, pp. 1996–2006, 2013.
[28] Y. Qian, J. Dong, W. Wang, and T. Tan, “Deep learning for steganalysis via convolutional neural networks,” in Media Watermarking, Security, and Forensics 2015, vol. 9409, p. 94090J, International Society for Optics and Photonics, 2015.
[29] Y. Qian, J. Dong, W. Wang, and T. Tan, “Feature learning for ste- ganalysis using convolutional neural networks,” Multimedia Tools and Applications, pp. 1–25, 2017.
[30] W. Rawat and Z. Wang, “Deep convolutional neural networks for image classification: A comprehensive review,” Neural computation, vol. 29, no. 9, pp. 2352–2449, 2017.
[31] S. Tan and B. Li, “Stacked convolutional auto-encoders for steganalysis of digital images,” in Signal and Information Processing Association Annual Summit and Conference (APSIPA), 2014 Asia-Pacific, pp. 1–4, IEEE, 2014.
[32] T. Pevny`, T. Filler, and P. Bas, “Using high-dimensional image models to perform highly undetectable steganography,” in International Work- shop on Information Hiding, pp. 161–177, Springer, 2010.
[33] V. Holub and J. Fridrich, “Designing steganographic distortion using directional filters,” in 2012 IEEE International workshop on information forensics and security (WIFS), pp. 234–239, IEEE, 2012.
[34] V. Holub and J. Fridrich, “Digital image steganography using universal distortion,” in Proceedings of the first ACM workshop on Information hiding and multimedia security, pp. 59–68, ACM, 2013.
[35] G. Xu, H.-Z. Wu, and Y.-Q. Shi, “Structural design of convolutional neu- ral networks for steganalysis,” IEEE Signal Processing Letters, vol. 23, no. 5, pp. 708–712, 2016.
[36] Y. Qian, J. Dong, W. Wang, and T. Tan, “Learning and transferring rep- resentations for image steganalysis using convolutional neural network,” in Image Processing (ICIP), 2016 IEEE International Conference on, pp. 2752–2756, IEEE, 2016.
[37] J.-F. Couchot, R. Couturier, C. Guyeux, and M. Salomon, “Steganalysis via a convolutional neural network using large convolution filters for em- bedding process with same stego key,” arXiv preprint arXiv:1605.07946,
[38] K. He, X. Zhang, S. Ren, and J. Sun, “Deep residual learning for image recognition,” in Proceedings of the IEEE conference on computer vision and pattern recognition, pp. 770–778, 2016.
[39] J. Hu, L. Shen, and G. Sun, “Squeeze-and-excitation networks,” in Pro- ceedings of the IEEE conference on computer vision and pattern recog- nition, pp. 7132–7141, 2018.
[40] J. B. Guttikonda and R. Sridevi, “A new steganalysis approach with an efficient feature selection and classification algorithms for identifying the stego images,” Multimedia Tools and Applications, pp. 1–19, 2019.
[41] S. Wu, S. Zhong, and Y. Liu. “Deep residual learning for image steganalysis”, Multimedia tools and applications, 77(9):10437–10453, 2018.
Citation
John Babu G, Sridevi Rangu, "StegNet: An Efficient CNN based Steganlyzer," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1088-1093, 2019.
A Deep Analysis and Efficient Implementation of Supervised Machine Learning Algorithms for Enhancing The Classification Ability of System
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.1094-1101, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.10941101
Abstract
Machine Learning, a subset of Artificial Intelligence is very popular and emerging field of science which basically focus on designing the approach enabling the computer or machines to learn from the input provided or past experience. There are lots of application of Machine Learning in day-to-day life such as face detection and recognition, decision making in business forecasting, etc. It is also becoming the business subject to various giant enterprises like Amazon, Google, FaceBook, etc. In this paper, we have focused our discussion to some popular Supervised Machine Learning algorithms that are SVM, logistic regression, Multinomial Naive Bayes, KNN apart from some other supervised Machine Learning algorithms like Linear Regression, Linear Discriminant Analysis, Decision Tree, Random Forest, Naïve Bayes, etc. and we determine the most efficient classification algorithm based on the data set which is multiclass dataset. This research paper gives some clarity to the selection of algorithm specific to some application. And we have shown the comparative results.
Key-Words / Index Term
Machine Learning (ML), K-nearest neighbours (KNN), Logistic Regression (Log), Multinomial Naïve Bayes (MulNB), Support Vector Machine (SVM), Classifier
References
[1] A. Simon, M. S. Deo, S. Venkatesan, D.R. Ramesh Babu, “An Overview of Machine Learning and its Applications”, International Journal of Electrical Sciences and Engineering, 2015.
[2] S. B. Kotsiantis, “Supervised Machine Learning: A Review of Classification Techniques”, Informatica 31 (2007), pp.249-268, 2007.
[3] S. Das, A. Dey, A. Pal, N. Roy, “Applications of Artificial Intelligence in Machine Learning: Review and Prospect”, International Journal of Computer Applications (0975 – 8887), Vol. 115, No. 9, 2015.
[4] A. Dey, “Machine Learning Algorithms: A Review”, International Journal of Computer Science and Information Technologies, Vol. 7 (3), pp.1174-1179, 2016.
[5] P. Rani, “A Review of various KNN Techniques”, International Journal for Research in Applied Science & Engineering Technology, Vol. 5, Issue 8, 2017.
[6] Li-Yu Hu, Min-Wei Huang, Shih-Wen Ke, and Chih-Fong Tsai “The distance function effect on k-nearest neighbor classification for medical datasets”, Springerplus, Vol. 5(1), 2016.
[7] Chich-Min Ma, Wei-Shui Yang and Bor-wen Cheng, ”How the parameter of k-nearest neighbours Algorithm impact on the Best Classification Accuracy: In case of Parkinson Dataset”, Journal of applied sciences, Vol. 14 (2), pp.171-176,2014.
[8] Murat KORKMAZ, Selami GÜNEY, Şule Yüksel YİĞÎTER, “The importance of logistic regression implementations in the turkish livestock sector and logistic regression implementations/fields”, J.Agric. Fac. HR.U., 2012.
[9] C-Y J. Peng, K. L. Lee, G. M. Ingersoll, “An introduction to logistic regression analysis and reporting”. The Journal of Educational Research, 96(1), pp.3-14, 2002.
[10] M. Szumilas, “Explaining Odds Ratios”, Journal of the Canadian Academy of Child and Adolescent Psychiatry,Vol. 19(3), 2010.
[11] A. M. Kibriya, E. Frank, B. Pfahringer, G. Holmes, “Multinomial Naive Bayes for Text Categorization Revisited”, G.I. Webb and Xinghuo Yu (Eds.): AI 2004, LNAI 3339, Springer-Verlag Berlin Heidelberg, pp. 488–499, 2004.
[12] D. Mallampati, “An Efficient Spam Filtering using Supervised Machine Learning Techniques”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 6, Issue 2, pp.33-37, 2018.
[13] A. McCallum, K. Nigam, “A Comparison of Event Model for Naïve Bayes Text Classification”, AAAI Technical Report WS-98-05, 752, 1998.
[14] R. Mohana, S. Sumathi, “Document classification using Multinomial Naïve Bayesian classifier”, International Journal of Science, Engineering and Technology Research, Vol. 3, Issue 5, 2014.
[15] H. Doshi, M. Zalte, “Performance of Naïve Bayes Classifier – Multinomial Model on Different Categories of Documents”, International Journal of Computer Applications, ETCSIT, 2011.
[16] Y. Tian, Y. Shi, X. Liu, “Recent advances on support vector machines research”, Technological And Economic Development OF Economy, Vol. 18 (1), pp.5–33, 2012.
[17] V. Sindhwani, S. S. Keerthi, “Large scale semi-supervised linear SVMs”, Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 477-484, 2006.
[18] M. A. Hearst, S.T. Dumais, E. Osman, J. C. Platt, B. Schölkopf, “Support vector machines”, Intelligent Systems and their Applications, IEEE, 1998.
[19] G. Kaur, K. Kaur, “Sentiment Detection from Punjabi Text using Support Vector Machine”, International Journal of Scientific Research in Computer Science and Engineering, Vol. 5, Issue 6, pp.39-46, 2017.
[20] Y. E. M. Idris, Li Jun, “Single to multiple kernel learning with four popular SVM kernels (survey)”, International Journal of Research in Engineering and Technology, Vol. 5, Issue 3, 2016.
[21] R. A. FISHER, “The use of multiple measurements in taxonomic problems”, Annual Eugenics, Vol. 7, Part 2, pp.179-188, 1936.
[22] E. Anderson. "The species problem in Iris". Annals of the Missouri Botanical Garden”, Vol. 23 (3), pp.457–509, 1936.
Citation
Sandeep Kumar Verma, Turendar Sahu, Manjit Jaiswal, "A Deep Analysis and Efficient Implementation of Supervised Machine Learning Algorithms for Enhancing The Classification Ability of System," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1094-1101, 2019.
MAHI As a Sketching Language
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.1102-1109, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.11021109
Abstract
The people of various domains, mechanical engineering for machine drawing, electronics engineering for circuit drawing, computer engineering for architectural design etc. generally use sketches. Sketch recognition is defined as the process of identifying symbols that user draw using single or multiple stroke. We have developed MAHI a sketching language based on geometrical rules for multi-domain Sketch Recognition MAHI offers the user more liberty for free-style sketching as well as for grouping the strokes, reducing the complexity for recognizing the sketches. And at the same time it edits the sketches as well as recognizes the sketches efficiently natural environment to the user. The recognition engine interprets the sketches based on the information obtained from the description of domains associated with the input from the user. We have created and tested a Multi-domain recognition engine for Sketch Recognition based on the system use multi-layer architecture for recognition engine.
Key-Words / Index Term
Sketch recognition, Bayesian Network, Heuristic
References
[1] Alvarado, C. (2000) ‘A natural sketching environment: bringing the computer into early stages of mechanical design’ Master’s thesis, MIT.
[2] Alvarado, C.(2004) ‘Multi-domain sketch understanding’ PhD thesis, Department of Electrical Engineering and computer science, Massachusetts Institute of Technology.
[3] Alvarado, C.(2004) ‘Sketch Recognition And User Interfaces: Guidelines for Design and Development’, AAAI Fall Symposium on Pen-Based Interaction.
[4] Alvarado, C. Davis, R. ‘Sketchread a multi-domain sketch recognition engine’ In Proceedings of UIST ’04, pp.23–32.
[5] Alvarado. C. and Oltmans. M. (2002) ‘A Framework for multi-domain sketch recognition’ Proceedings of AAAI Spring Symposium on sketch Understandings, Stanford University, pp.1-8.
[6] Alvarado, C. Oltmans, M. Davis, R (2002) ‘A Framework for multi-domain sketch recognition’ Proceedings of AAAI Spring Symposium on sketch Understandings, Stanford University, pp.1-8.
[7] Caetano, A. Goulart, N. Fonseca, M. Jorge, J. (2002) ‘ JavaSketchIt:issues in sketching the look of user interfaces’ Sketch Understanding. Papers from the AAAI Spring Symposium.
[8] Calhoun, T. F, Stahovich, T(2002)’ Recognizing multi-stroke symbols’ Proc. of AAAI 2002 Spring Symposium: Sketch Understanding Workshop
[9] Costagliola, G.; Tortora, G.; Orefice, S.; and Lucia, D. 1995. Automatic generation of visual programming environments. In IEEE Computer, 56–65
[10] Damm, C.H. Hansen, K.M. and Thomsen, M. (2000) ‘Tool support for cooperative object-oriented design: gesture based modeling on an electronic whiteboard’ In: CHI, pp.518–25.
[11] Do, EY-L.(2001) ‘Vr sketchpad—create instant 3d worlds by sketching on a transparent window’ In: de Vries B, van Leeuwen JP, Achten HH, editors. CAAD Futures 2001. pp.161–172.
[12] Hammond, T. and Davis, R.(2002) ‘Tahuti: a geometrical sketch recognition system for uml class diagrams’ AAAI Spring Symposium on Sketch Understanding, pp.59–68.
[13] Hammond, T. and Davis, R. (2003) ‘LADDER: A language to describe drawing, display, and editing in sketch recognition’ In Proceedings of the International Joint Conference on Artificial Intelligence (IJCAI-03), Acapulco, Mexico.
[14] Hammond, T. and Davis, R.(2005) ‘LADDER: A sketching language for user interface developers. Elsevier, Computers and Graphics, 28. pp.518–532.
[15] Hse, H. Shilman, M. Newton, A.R. and Landay, J.(1999) ‘Sketch-based user interfaces for collaborative object-oriented modeling’ Berkley CS260 Class Project.
[16] Landay, J.A and Myers, B.A.(1995) ‘Interactive sketching for the early stages of user interface design’ In: Proceedings of CHI ’95: Human Factors in Computing Systems, pp.43–50.
[17] Lank,E. Thorley JS, and Chen SJ-S, (2000) ‘An interactive system for recognizing hand drawn UML diagrams’ In Proceedings for CASCON, pp. 7.
[18] Lecolin et, E.(1998) ‘Designing guis by sketch drawing and visual programming’ In: Proceedings of the International Conference on Advanced Visual Interfaces (AVI 1998), AVI, New York:,ACM Press, pp.274–6.
[19] Lin, J. Newman, MW. Hong, JI. Landay, J. (2000) ‘DENIM: finding a tighter fit between tools and practice for web site design’ In: CHI Letters: Human Factors in Computing Systems, CHI, pp.510–7.
[20] Mahoney, J.V. and Fromherz, M.P.J.(2002) ‘Handling ambiguity in constraint-based recognition of stick figure sketches’SPIE Document Recognition and Retrieval IX Conference, San Jose, CA.
[21] Pittman, J. Smith, I. Cohen, P. Oviatt, S. and Yang, T.(1996) ‘Quickset: a multimodal interface for military simulations’ Proceedings of the Sixth Conference on Computer-Generated Forces and Behavioral Representation, pp.217–24.
[22] Rubine, D. 1991. Specifying gestures by example. In Computer Graphics, volume 25(4), 329–33
[23] Sahoo. G. et al. (2009) ‘MAHI: Machine and Human Interface’ International Journal of Image Processing (IJIP), Vol. 3, Issue 2, pp.80-91.
[24] Sahoo, G. and Singh, B.K.(2008) ‘MAHII: Machine And Human Interactive Interface’ International Journal of Image Processing(IJIP), Vol. 2, Issue 3, pp.1-11.
[25] Sahoo, G. and Singh, B.K. (2008) ‘A New Approach to Sketch Recognition using Heuristic’ International Journal of Computer Science and Network Security, Vol. 8, Issue 2, pp.102-108.
[26] Sahoo, G. and Singh, B.K. (2008) ‘A Human Detector and Identification System’ International Journal of Computer Science, Systems Engineering and Information Technology, Vol. 1, Issue 1, pp.39-44.
[27] Sezgin, T. M. Stahovich, Thomas. and Davis, R (2001) ‘Sketch based interfaces: Early processing for sketch understanding’ In The Proceedings of 2001 Perceptive User Interfaces Workshop (PUI’01),Orlando, FL.
[28] Sezgin, T.M.(2001) ‘Feature point detection and curve approximation for early processing in sketch recognition’ Master’s thesis, Massachusetts Institute of Technology
[29] Shum, S.J.B. MacLean, A. Bellotti, V.M.E. and Hammond, N.V.(1996) ‘Graphical argumentation and design recognition’ Human-Computer Interaction, 12(3), pp.267-300.
[30] Shilman, M. Pasula,H. Russell, S. and Newton, R.(2002) ‘Statistical visual language models for ink parsing. In Sketch
[31] BhupeshkrSingh, Luthra M, (2019) ‘Hand Sketching a Necessary Tool for Learning Computation & Automata Theory’,Inpress
[32] BhupeshkrSingh, Luthra M,(2018)’ Free Hand Sketching an Essential Tool For Unified Modelling Diagrams in object Oriented Approaches’.
Citation
Bhupesh Kumar Singh, Meghna Luthra, "MAHI As a Sketching Language," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1102-1109, 2019.
A Modified Image Encryption Technique Using Two Dimensional Sine Logistic Map
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.1110-1115, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.11101115
Abstract
A color image Chaotic systems are commonly used in cryptosystems because chaotic system is very sensitive to initial conditions and also have the property of unpredictability as well as ergodicity. We have modified the two dimensional logistic sine map. This modified two dimensional sine logistic map enhanced the unpredictability and ergodicity. It also enhances the range of chaotic map. With the help of this modified two dimensional sine logistic map image encryption is performed. In the proposed technique confusion and diffusion both operations are performed, further to enhance the security level random values are added to the original image. With the help of simulation results and analysis of security, it can be proved that modified two dimensional sine logistic map can encrypt several types of images. The proposed algorithm also has the ability to resist from different types of attack.
Key-Words / Index Term
Chaotic Logistic map, XOR operation, Modified Sine Logistic Map System
References
[1]. Zhou et.al, A novel image encryption algorithm based on chaos and Line map, Neurocomputing (2015)150-157.
[2]. Lu Xu, Zhi Li, Jian Li and Wei Hua, A novel bit level image encryption algorithm based on chaotic maps, optics and Lasers in Engineering (2016) 17-25.
[3]. Zhou et.al, Encryption method based on a new secret key algorithm for color images, International Journal of Electronics and communication (2016) 1-7.
[4]. Aditya and Deepak, Selection of Best Sorting Algorithm, International Journal of Intelligent Information Processing, 2(2) July-December 2008; pp. 363-368.
[5].https://www.cs.cmu.edu/~adamchik/15121/lectures/Sorting%20Algorithms/sorting.html.
[6]. Ullah, Atta, Sajjad Shaukat Jamal, and Tariq Shah. "A novel construction of substitution box using a combination of chaotic maps with improved chaotic range." Nonlinear Dynamics 88.4 (2017): 2757-2769.
[7]. Özkaynak F. Brief review on application of nonlinear dynamics in im- age encryption. Nonlinear Dynamics 2018;92(2):305–13.
[8]. Wei X, Guo L, Zhang Q, Zhang J, Lian S. A novel color image encryption al- gorithm based on {DNA} sequence operation and hyper-chaotic system. J Syst Software 2012;85(2):290–9.
[9]. Liu L, Zhang Q, Wei X. A rgb image encryption algorithm based on dna en- coding and chaos map. Comput Electr Eng 2012;38(5):1240–8.
[10]. Wu X, Wang K, Wang X, Kan H, Kurths J. Color image DNA encryption using NCA map-based CML and one-time keys. Signal Processing 2018;148:272–87.
[11]. Ravichandran D, Praveenkumar P, Rayappan JBB, Amirtharajan R. Chaos based crossover and mutation for securing dicom image. Comput Biol Med 2016;72:170–84.
[12]. Rao KD, Gangadhar C. Discrete wavelet transform and modified chaotic key- based algorithm for image encryption and its vlsi realization. IETE J Res 2012;58(2):114–20.
[13]. Mahesh M, Srinivasan D, Kankanala M, Amutha R. Image cryptography using discrete haar wavelet transform and arnold cat map. In: 2015 International Conference on Communications and Signal Processing (ICCSP); 2015. p. 1849– 55.
[14]. Saffari RM, Mirzakuchaki S. A novel image encryption algorithm based on dis- crete wavelet transform using two dimensional logistic map. In: 2016 24th Iranian Conference on Electrical Engineering (ICEE); 2016. p. 1785–90.
[15]. Kumar M, Kumar S, Das M, Budhiraja R, Singh S. Securing images with a diffusion mechanism based on fractional brownian motion. Journal of Information Security and Applications, 2018;40:134–44.
[16]. Wang X-Y, Li P, Zhang Y-Q, Liu L-Y, Zhang H, Wang X. A novel color image encryption scheme using dna permutation based on the lorenz system. Multimed Tools Appl 2018;77(5):6243–65.
[17]. Zhang Y-Q, Wang X-Y, Liu J, Chi Z-L. An image encryption scheme based on the mlncml system using dna sequences. Opt Lasers Eng 2016;82:95–103.
[18]. Zhang Y-Q, Wang X-Y. Analysis and improvement of a chaos-based symmetric image encryption scheme using a bit-level permutation. Nonlinear Dyn 2014;77(3):687–98.
[19]. Liang Zhu Z, Zhang W, Wong K, Yu H. A chaos-based symmetric image encryption scheme using a bit-level permutation. Inf Sci 2011;181(6):1171–86.
[20]. Zhang Y-Q, Wang X-Y. Spatio temporal chaos in mixed linear nonlinear coupled logistic map lattice. Physica A 2014;402:104–18.
[21]. Zhang Y-Q, Wang X-Y, Liu L-Y, He Y, Liu J. Spatio temporal chaos of fractional order logistic equation in nonlinear coupled lattices. Commun Nonlinear Sci Numer Simul 2017;52:52–61.
[22]. Zhang Y-Q, He Y, Wang X-Y. Spatiotemporal chaos in mixed linear nonlinear two-dimensional coupled logistic map lattice. Physica A 2018;4 90:14 8–60.
[23]. Xiang T, Wong K, Liao X. Selective image encryption using a spatiotemporal chaotic system. Chaos 2007;17(2):023115.
[24]. Li P, Li Z, Halang WA, Chen G. A stream cipher based on a spatiotempo- ral chaotic system. Chaos Solitons Fractals 2007;32(5):1867–76.
[25]. Wang S, Kuang J, Li J, Luo Y, Lu H, Hu G. Chaos-based secure communications in a large community. Phys Rev E 2002;66:065202.
[26]. Li H, Wang S, Li X, Tang G, Kuang J, Ye W, et al. A new spatio temporally chaotic cryptosystem and its security and performance analyses. Chaos 2004;14(3):617–29.
[27]. Lü L, Li Y, Sun A. Parameter identification and chaos synchronization for un- certain coupled map lattices. Nonlinear Dyn 2013;73(4):2111–17.
[28]. Leyuan Wang, Hongjun Song and Ping, A novel hybrid color image encryption algorithm using two complex chaotic systems optics and Lasers in Engineering (2016) 118-125.
[29]. X.Y. Wang and L. Teng, X. Qin, A novel colour image encryption algorithm based on chaos, Signal process, (2012), 1101-1108.
[30]. Yu Changa, GuanrongChenb, Complex dynamics in Chen’s system, Chaos, Solitons & Fractals Volume 27, Issue 1, January 2006, Pages 75–86.
[31]. Guanrong Chen, Yaobin Mao, Charles K. Chui, A symmetric image encryption scheme based on 3D chaotic cat maps, chaos, Solutions and Fractals 21(2004) 749-761.
[32]. Mahmoud GM, Bountis T, Mahmoud.EE, Active control and global synchronization of the complex Chen and Lüsystems.Int. J Bifurcat Chaos2007; 17 (12):4295–308.
[33]. Xiao-Jun Tong, Design of an image encryption scheme based on a multiple chaotic map, Commun Nonlinear Sci Number Simulation 18 (2013) 17251733.
Citation
Subodh Kumar, Rajendra Kumar, "A Modified Image Encryption Technique Using Two Dimensional Sine Logistic Map," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1110-1115, 2019.
A Financial Exchange Using Novel Stock Prediction
Research Paper | Journal Paper
Vol.7 , Issue.3 , pp.1116-1120, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.11161120
Abstract
This paper clarifies the expectation of a stock utilizing Machine Learning. The specialized and crucial or the time arrangement investigation is utilized by the vast majority of the stockbrokers while making the stock expectations. In this setting this investigation utilizes an AI system called Support Vector Machine to foresee stock costs for the vast and little capitalizations and in the three distinct markets, utilizing costs with both every day and regularly updated frequencies. In the money world stock exchanging is a standout amongst the most imperative exercises. Securities exchange expectation is a demonstration of attempting to decide the future estimation of a stock other money related instrument exchanged on a budgetary trade. In this paper, propose a Machine Learning and novel stock prediction approach that will be prepared from the accessible stocks information and increase insight and after that utilizes the procured learning for an exact forecast. The programming language is utilized to foresee the financial exchange utilizing AI.
Key-Words / Index Term
Support vector machine, Machine Learning, Artificial Intelligence
References
[1] Sykes A. O., "An Introduction to Regression Analysis", The Inaugural Coase Lecture, 1993 [2] Yue Xu S., "Stock Price Forecasting Using Information from Yahoo Finance and Google Trend", UC Berkeley, 2012
[3] Duke, “Stationarity and differencing”, [Online], Available: http://people.duke.edu/~rnau/411diff.htm [Accessed January 2017]
[4] Vapnik V. N., "An Overview of Statistical Learning Theory" IEEE TRANSACTIONS ON NEURAL NETWORKS, 1999.
[5] Kim K. "Financial time series forecasting using support vector machines", Department of Information Systems, Dongguk University 2003.
[6] Panigrahi S. S. and Mantri J. K., "A text based Decision Tree model for stock market forecasting," Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on, Noida, 2015.
[7] G. Iuhasz, M. Tirea and V. Negru, "Neural Network Predictions of Stock Price Fluctuations," Symbolic and Numeric Algorithms for Scientific Computing (SYNASC), 2012 14th International Symposium on, Timisoara, 2012.
[8] Siripurapu A., "Convolutional Networks for Stock Trading", Stanford University, Department of Computer Science, 2014.
[9] Qiu M. and Song Y. “Predicting the Direction of Stock Market Index Movement Using an Optimized Artificial Neural Network”, Department of Systems Management, Fukuoka Institute of Technology, Fukuoka, Japan, 2016.
Citation
S.Srividhya, R.Kayalvizhi, "A Financial Exchange Using Novel Stock Prediction," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1116-1120, 2019.
Thyroid Disease Detection and Classification using Machine Learning Techniques: A Review
Review Paper | Journal Paper
Vol.7 , Issue.3 , pp.1121-1125, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.11211125
Abstract
The thyroid is one in every of the foremost necessary organ in our body. It secretes thyroid hormones that area unit to blame for dominant metabolism. The less secretion endocrine causes adenosis and far secretion of thyroid causes glandular disease. For deciding, data processing technique is principally employed in tending sectors, sickness identification and giving higher treatment to the patients. during this paper we`ve got bestowed an summary and comparison of assorted existing data processing techniques used for thyroid diseases identification. most ordinarily used techniques area unit call Tree, Support Vector Machine and Neural Networks that has been resulted as a high accuracy. the most objective of this study are to hold out the survey of knowledge mining techniques accustomed identification of assorted thyroid ailments, to gift the techniques used and its accuracy.
Key-Words / Index Term
Thyroid diseases, Neural network, Support Vector Machine, Decision tree, KNN, Learning Vector Quantization, etc.
References
[1] Dr. Sahai BS, Thyroid Disorders[online]. Available :Http://www.homoeopathyclinic.com/articles/diseases/tyroid.pdf.
[2]http://www.foxnews.com/health/2012/02/10/hypothyroidism–versus-hyperthyroidism.html
[3]Nikita Singh, Alka Jindal, “A Segmentation Method and Comparison of Classification Methods for Thyroid Ultrasound Images”, International Journal of Computer Applications (0975 – 8887) Volume 50 – No.11, July 2012
[4] Mary C. Frates, Carol B. Benson, J.WilliamCharboneau and Edmund S. “Management of Thyroid Nodules Detected at US: Society of Radiologists in US consensus”, conference statement management of thyroid nodules detected at US Volume 237, Number3.
[5] F. S. Gharehchopogh, M. Molany and F. D.Mokri, ”Using Artificial Neural Network In Diagnosis Of Thyroid Disease: A Case Study”, International Journal on Computational Sciences &Applications (IJCSA) Vol.3, No.4, August 2013
[6] ShivaneePandey, RohitMiri, S. R. Tandan, "Diagnosis and Classification of Hypothyroid Disease Using Data Mining Technique", TJERT, June 2013.
[7] AnupamShukla, PrabhdeepKaur, RituTiwari and R.R. Janghel, Diagnosis of Thyroid disease using Artificial Neural Network. In Proceedings of IEEE IACC 2009, pages 1016-1020.
[8] FeyzullahTemurtas” A comparative study on thyroid disease diagnosis using neural networks” Expert Systems with Applications 36 (2009) 944–949.
[9]Li-Na Li,Ji-Hong Ouyang ,Hui-Ling Chen &Da-You Liu”A Computer Aided Diagnosis System for Thyroid Disease
Using Extreme Learning Machine”J Med Syst (2012) 3327–3337.
[10] SumanPandey, Deepak Kumar Gour, Vivek Sharma” Comparative Study on Classification of Thyroid Diseases” International Journal of Engineering Trends and Technology (IJETT) – Volume 28 Number 9 - October 2015.
[11]G. RasithaBanu“ A Role of decision Tree classification data Mining Technique in Diagnosing Thyroid disease” International Journal of Computer Sciences and EngineeringVolume-4, Issue-11 2016.
[12]. Muhammad Anjum Qureshi, Kubilay Eksioglu, “Expert Advice Ensemble for Thyroid Disease Diagnosis”, IEEE, 2017.
[13] Jamil Ahmed, M. Abdul Rehman Soomrani,” TDTD: Thyroid Disease Type Diagnostics”, IEEE, 2016.
[14]. Ahmad Taher Azar , Aboul Ella Hassanien, “Expert System Based On Neural-Fuzzy Rules for Thyroid Diseases Diagnosis”, IEEE, 2018.
[15] Keles,et al ESTDD: expert system for thyroid diseasesdiagnosis. Expert Syst. Appl. 34(1):242–246, 2008.
[16] Feyzullah Temurtas” A comparative study on thyroid disease diagnosis using neural networks” Expert Systems with Applications 36 (2009) 944–949.
[17]Li-Na Li,Ji-Hong Ouyang ,Hui-Ling Chen &Da-You Liu”A Computer Aided Diagnosis System for Thyroid Disease
Using Extreme Learning Machine”J Med Syst (2012) 3327– 3337.
[18]Prerana, Parveen Sehgal, Khushboo Taneja”Predictive Data Mining for Diagnosis of Thyroid Disease using Neural Network” International Journal of Research in Management, Science & Technology Vol. 3, No. 2, April 2015.
[19] S. Sathya Priya, Dr. D. Anitha ”Survey on Thyroid Diagnosis using Data Mining Techniques” International Journal of Advanced Research in Computer and Communication Engineering Vol. 6, Special Issue 1, January 2017.
[20] Zhang GP, Berardi. An investigation of neural network in thyroid function diagnosis. Health Care Management Science, 1998;1:29-37
[21] Suman Pandey, Deepak Kumar Gour, Vivek Sharma” Comparative Study on Classification of Thyroid Diseases” International Journal of Engineering Trends and Technology (IJETT) – Volume 28 Number 9 - October 2015.
[22]G. Rasitha Banu “ A Role of decision Tree classification data Mining Technique in Diagnosing Thyroid disease” International Journal of Computer Sciences and Engineering Volume-4, Issue.
Citation
Anuradha Shyam, Mohanrao Mamdikar, Pooja Patre, "Thyroid Disease Detection and Classification using Machine Learning Techniques: A Review," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1121-1125, 2019.
Detection of Bacterial and Fungal Leaf Diseases using Image Processing and Machine Learning Techniques
Survey Paper | Journal Paper
Vol.7 , Issue.3 , pp.1126-1129, Mar-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i3.11261129
Abstract
In Agriculture, leaf diseases have grownup to be a dilemma because it will cause vital diminution in each quality and amount of agricultural yields. Thus, automatic recognition of diseases on leaves plays a vital role in agriculture sector. This paper reviews all major techniques used for plant disease identification and also focuses on role of image processing techniques and machine learning in identification and classification of these disease. In this paper we are focusing on major fungal and bacterial disease found on leaves of plants, through this paper we also tried to focus on various studies have been done for the detection of such diseases. Finally, we conclude at the end gaps found in the previous studies and suggest some possible improvements for researchers.
Key-Words / Index Term
plant disease, Machine Learning Techniques, bacterial disease, fungal disease
References
[1] Devi, D.A. and Muthukannan, K., 2014, May. Analysis of segmentation scheme for diseased rice leaves. In Advanced Communication Control and Computing Technologies (ICACCCT), 2014 International Conference on (pp. 1374-1378). IEEE.
[2] Chaudhary, P., Chaudhari, A.K., Cheeran, A.N. and Godara, S., 2012. Color transform based approach for disease spot detection on plant leaf. International Journal of Computer Science and Telecommunications, 3(6), pp.65-70.
[3] Bhattacharyya, S., 2011. A brief survey of color image preprocessing and segmentation techniques.Journal of Pattern Recognition Research, 1(1), pp.120-129.
[4] Vijayakumar, J. and Arumugam, S., 2013, October. Certain investigations on foot rot disease for betelvine plants using digital imaging technique.InEmerging Trends in Communication, Control, Signal Processing & Computing Applications (C2SPCA), 2013 International Conference on (pp. 1-4). IEEE.
[5] Singh, A. and Singh, M.L., 2015, July. Automated color prediction of paddy crop leaf using image processing. In Technological Innovation in ICT for Agriculture and Rural Development (TIAR), 2015 IEEE (pp. 24-32).IEEE.
[6] Asfarian, A., Herdiyeni, Y., Rauf, A.M. and Mutaqin, K.H., 2013, November. Paddy diseases identification with texture analysis using fractal descriptors based on fourier spectrum. In Computer, Control, Informatics and Its Applications (IC3INA), 2013 International Conference on (pp. 77-81).IEEE.
[7] Paproki, A., Fripp, J., Salvado, O., Sirault, X., Berry, S. and Furbank, R., 2011, December. Automated 3D segmentation and analysis of cotton plants.In Digital Image Computing Techniques and Applications (DICTA), 2011 International Conference on (pp. 555-560). IEEE.s
[8] Choong, M.Y., Kow, W.Y., Chin, Y.K., Angeline, L. and Teo, K.T.K., 2012, November. Image segmentation via normalised cuts and clustering algorithm.In Control System, Computing and Engineering (ICCSCE), 2012 IEEE International Conference on (pp. 430-435).IEEE.
[9] A.Meunkaewjinda, P.Kumsawat, K.Attakitmongcol and A.Srikaew, “Grape leaf disease detection from color imagery system using hybrid intelligent system”, proceedings of ECTICON, IEEE, PP-513-516,2008.
[10] Stephen Gang Wu, Forrest Sheng Bao, Eric You Xu, Yu – Xuan Wang and Yi – Fan Chang, “A leaf recognition algorithm for plant classification using probabilistic neural network”, IEEE 7th International Symposium on Signal Processing and Information Technology,2007.
[11] Vijay Satti, AnshulSatya and Shanu Sharma, "An Automatic Leaf Recognition System for Plant Identification Using Machine Vision Technology", International Journal of Engineering Science and Technology (IJEST) ISSN:0975-5462, Vol 5, Issue 4, pp. 874-879, 2013.
[12]. TasneemTazeen Rashid Thuza Md. SazzadHossain – “Mobile Application for Determining Input Level Of Fertilizer And Detecting Diseases In Crops” – Thesis.
[13]. B. Klatt , B. Kleinhenz, C. Kuhn, C. Bauckhage, M. Neumann, K. Kersting, E.-C. Oerke, L. Hallau, A.-K.Mahlein, U. Steiner-Stenzel, M. Röhrig-"SmartDDS-Plant Disease Detection via Smartphone", EFITA-WCCA-CIGR Conference “Sustainable Agriculture through ICT Innovation”, Turin, Italy, 24-27 June 2013.
[14]. ShovonPaulinusRozario- “ Krishokbondhu - An automated system for diagnosis of paddy disease, Thesis, SCHOOL OF ENGINEERING AND COMPUTER SCIENCE, Department of Computer Science and Engineering, BRAC University, Submitted on September 1, 2014.
[15]. Shitala Prasad, Sateesh K. Peddoju and DebashisGhosh – “ AgroMobile: A Cloud-Based Framework for Agriculturists on Mobile Platform”, International Journal of Advanced Science and Technology Vol.59, (2013), pp.41-52 http://dx.doi.org /10.14257/ijast.2013.59.04 ISSN: 2005-4238 IJAST Copyright ⓒ 2013 SERSC.
[16]. S.A. Ramesh Kumar etc., al. –“A Novel and High Speed Technique for Paddy Crops Disease Prediction in Wireless Tele-Agriculture Using Data Mining Techniques”, Middle-East Journal of Scientific Research 22 (9): 1430-1441, ISSN 1990-9233, © IDOSI Publications, 2014.
[17]. Shitala Prasad • Sateesh K. Peddoju • DebashisGhosh – “Multi-resolution mobile vision system for plant leaf disease diagnosis”, Received: 16 December 2013 / Revised: 17 September 2014 / Accepted: 31 January 2015 © Springer-Verlag London 2015.
[18]. RahatYasir and Nova Ahmed- “Beetles: A Mobile Application to Detect Crop Disease for Farmers in Rural Area”, Workshop on Human and Technology, 8 – 10 March 2014, Khulna, Bangladesh.
[19]. Alham F. Aji, QoribMunajat, Ardhi P. Pratama, HafizhKalamullah, Aprinaldi, Jodi Setiyawan, and Aniati M. Arymurthy- “ Detection of Palm Oil Leaf Disease with Image Processing and Neural Network Classification on Mobile Device “, International Journal of Computer Theory and Engineering, Vol. 5, No. 3, June 2013.
[20]. Monika Bhatnagar , Dr. Prashant Kumar Singh - “Choice of Efficient Image Classification Tehcnique using Limited Device”, International Journal of Electronics and Computer Science Engineering.
[21] AakankshaRastogi, RitikaArora, Shanu Sharma,” Leaf Disease Detection and Grading using Computer Vision Technology &Fuzzy Logic”, 2015 2nd International Conference on Signal Processing and Integrated Networks (SPIN),IEEE,2015, PP. 500-506.
[22] Pujari J.D., Yakkundimath R.,ByadgiA.S.,”Image Processing Based Detection of Fungal Diseases in Plant”, Elsevier, Procedia Computer Science 46 ( 2015 ) 1802 – 1808.
[23]. Md. TarekHabib, AnupMajumder b, A.Z.M. Jakaria b, MoriumAkter a, Mohammad ShorifUddin a, Farruk Ahmed, “Machine vision based papaya disease recognition”, Journal of King Saud University – Computer and Information Sciences xxx (2018) xxx–xxx, Science direct, 2018.
Citation
Ramesh Kumar Singh, Jasmine Minj, "Detection of Bacterial and Fungal Leaf Diseases using Image Processing and Machine Learning Techniques," International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.1126-1129, 2019.