Nitin Sambre - Academia.edu (original) (raw)

Papers by Nitin Sambre

Research paper thumbnail of Automatic Segmentation and Positioning of Morphometric Points Intended for Cervical Vertebrae

International Journal for Research in Applied Science and Engineering Technology, Nov 22, 2017

X rays are the most prevalent imaging examination that helps a doctor diagnose,monitor, and treat... more X rays are the most prevalent imaging examination that helps a doctor diagnose,monitor, and treat many medical illnesses.In the detection of degenerative spinal disease, the knowledge of the vertebrae position, curve and alignment is necessary. Active Appearance Model (AAM) as proposed by Cootes et al. is deformable model widely used for segmentation of grey scale images. The model is based on priory information learning of the shape and texture variation of a training set. A compact object class descriptor is formed, which can be used to search images for new object instances. In this paper, a brief description of the implementation of AAM along with positioning of the morphometric points on cervical vertebrae is given.

Research paper thumbnail of TECHNOLOGY Blowfish Encryption Using Key Secured Block Based Transformation

Encryption is a process of converting a one form of information in another form which is hard to ... more Encryption is a process of converting a one form of information in another form which is hard to understand .Now a days, a large amount of information get transfer with wired or wireless network. Information contents may be textual data or image data. Therefore encryption of text or image is most important during secure transmission of information. Images are widely used in several processes like military field, medical imaging, video conferencing where confidentiality about image information is very important. As we know, pixels in plain image are strongly correlated. Image information get perceive due to this high correlation. Most of available image encryption algorithms are used for encryption of pixel information only but key secured block based transformation technique change the position of pixels and provide low correlation among image pixels so that less amount of information get perceived. The block transformation algorithm divides the image in to no. of blocks and shuffles their position of blocks to decrease the Correlation and increase its entropy value. Divide an image in more no. of blocks gives the more security of image. Transformation table will decide new positions of blocks. The aim of Key secured block transformation is to enhance the security of an image. Here, key provide a security for transformation table .Different keys generated for different types of image so ,if input image data changed automatically key will also get change. Here key is used for two purposes, one for to build transformation table and second to encrypt image data. So as key changed, transformation table will also get change and image get transformed with this new transformation table. Block Transformed image is then passed for encryption process. Here we used Blowfish image encryption algorithm because of variable and longest key size. At the receiver side these blocks are retransformed in to their original position and performed a decryption process which gives the original image.

Research paper thumbnail of Detection & Removal of Cracks in Digitized Paintings Based on Image Processing

International journal of engineering research and technology, Jan 18, 2014

This paper presents of crack detection & removal techniques in digitized paintings. It is also us... more This paper presents of crack detection & removal techniques in digitized paintings. It is also used as a nondestructive tool for the actual restoration. The user must select an area on each crack that to be restored. The cracks are identified and detected by Gabor which is an integrated methodology for removal of cracks. First, we filter the selected crack image using 8 differently oriented Gabor filters. We describe an orientationbased feature extraction method to represent a crack network from sets of local orientation features. The resultant features are used for crack filling with median filter and weighted median filter. The methodology has been shown to perform very well on digitized paintings suffering from cracks.

Research paper thumbnail of N.B.Sambre," Blowfish Encryption Using Key Secured Block Based Transformation

Encryption is a process of converting a one form of information in another form which is hard to ... more Encryption is a process of converting a one form of information in another form which is hard to understand.Now a days, a large amount of information get transfer with wired or wireless network. Information contents may be textual data or image data. Therefore encryption of text or image is most important during secure transmission of information. Images are widely used in several processes like military field, medical imaging, video conferencing where confidentiality about image information is very important. As we know, pixels in plain image are strongly correlated. Image information get perceive due to this high correlation. Most of available image encryption algorithms are used for encryption of pixel information only but key secured block based transformation technique change the position of pixels and provide low correlation among image pixels so that less amount of information get perceived. The block transformation algorithm divides the image in to no. of blocks and shuffles...

Research paper thumbnail of Estimating Leaf Area By Using Imaging Technique

One feature of most horticultural crop plants that is biologically relevant to their yield and pr... more One feature of most horticultural crop plants that is biologically relevant to their yield and productivity is total leaf area. The aim of this study was to estimate the leaf area using digital photographs processed in Matlab. A standard method was also used for comparing these results with actual measured areas Matlab and photograph processings were also evaluated with a group of 20 leaves, ten for sugarcane and ten betel leaf. The results showed coefficients of correlation of above 99% for the standard method and methods.

Research paper thumbnail of Study and Analysis of Ieee 802.15.4 Media Access Control (mac)

The Low rate wireless Personal Area Networks (LR-WPAN) allows the optional use of a superframe st... more The Low rate wireless Personal Area Networks (LR-WPAN) allows the optional use of a superframe structure. The superframe is bounded by network beacons and is divided into 16 equally sized slots. The superframe can have an active and an inactive portion. During the inactive portion, the coordinator shall not interact with its PAN and may enter a low-power mode. The format of the superframe is defined by the coordinator. The active portion consists of Contention Access Period (CAP) and contention free period (CFP)

Research paper thumbnail of TECHNOLOGY Blowfish Encryption Using Key Secured Block Based Transformation

Encryption is a process of converting a one form of information in another form which is hard to ... more Encryption is a process of converting a one form of information in another form which is hard to understand .Now a days, a large amount of informati on get transfer with wired or wireless network. Inf ormation contents may be textual data or image data. Therefo re encryption of text or image is most important du ring secure transmission of information. Images are widely used in several processes like military field, medical imaging, video conferencing where confidentiality about image info rmation is very important. As we know, pixels in pl ain image are strongly correlated. Image information get perc eive due to this high correlation. Most of availabl e image encryption algorithms are used for encryption of pi xel information only but key secured block based tr ansformation technique change the position of pixels and provide low correlation among image pixels so that less am ount of information get perceived . The block transformati on algorithm divides the image in to no. of block...

Research paper thumbnail of Detection & Removal of Cracks in Digitized Paintings Based on Image Processing

This paper presents of crack detection & removal techniques in digitized paintings. It is also us... more This paper presents of crack detection & removal techniques in digitized paintings. It is also used as a nondestructive tool for the actual restoration. The user must select an area on each crack that to be restored. The cracks are identified and detected by Gabor which is an integrated methodology for removal of cracks. First, we filter the selected crack image using 8 differently oriented Gabor filters. We describe an orientationbased feature extraction method to represent a crack network from sets of local orientation features. The resultant features are used for crack filling with median filter and weighted median filter. The methodology has been shown to perform very well on digitized paintings suffering from cracks.

Research paper thumbnail of Performance Analysis of Threshold based Image Encryption

International Journal of Computer Applications, 2014

Security of wireless transmission becomes considerable issue in present scenario. To overcome the... more Security of wireless transmission becomes considerable issue in present scenario. To overcome the issue, several algorithms were used. Among them cryptography remains as the efficient technique that converts the user provided information into unintelligible format. The cryptographic algorithms plays important role in providing security and confidentiality to the data. In this proposed work, the image encryption is done using the threshold technique. The performance factors such as the normalized cross correlation, structural content of the image, the mean square error in the image after encryption were calculated. To justify the efficiency of the proposed scheme the factors are analyzed and provided. The data format considered here is the image. By the threshold setting the entropy of the image gets increased It also reduces the execution time. Based on the results obtained the proposed algorithm yields better results.

Research paper thumbnail of VANET: Routing Protocols, Security Issues and Simulation Tools

IOSR Journal of Computer Engineering, 2012

Since the last few years VANET have received increased attention as the potential technology to e... more Since the last few years VANET have received increased attention as the potential technology to enhance active and preventive safety on the road, as well as travel comfort. Several unexpected disastrous situations are encountered on road networks daily, many of which may lead to congestion and safety hazards. If vehicles can be provided with information about such incidents or traffic conditions in advance, the quality of driving can be improved significantly in terms of time, distance, and safety. One of the main challenges in Vehicular ad hoc network is of searching and maintaining an effective route for transporting data information. Security and privacy are indispensable in vehicular communications for successful acceptance and deployment of such a technology. The vehicular safety application should be thoroughly tested before it is deployed in a real world to use. Simulator tool has been preferred over outdoor experiment because it simple, easy and cheap. VANET requires that a traffic and network simulator should be used together to perform this test. In this paper, the author will make an attempt for identifying major issues and challenges associated with different vanet protocols, security and simulation tools.

Research paper thumbnail of Embedding an Image Into Image by Region Segmentation Method Based on a Complexity With Effect of Standard Deviation

International Journal

In this paper, an image steganography system implemented is described, in which the data hiding (... more In this paper, an image steganography system implemented is described, in which the data hiding (embedding) is achieved using image segmentation based on a local complexity measure. A complexity measure is defined in Steganography for discriminating noisy regions in an image. This paper presents a revised method for embedding data into an image by variation in complexity threshold measure and effect of standard deviation of various bit planes. The principle of the method is based on that of bit plane complexity based steganography. High embedding rates are achieved with low distortion based on the theory that noise-like regions in an image's bit-planes can be replaced with noise-like secret data without significant loss in image quality Percentage embeddable area of complex images is around 50% without visual distortion showing PSNR above 30dB. While computing complexity threshold minimum standard deviation of the plane should be selected Categories and Subject Descriptors I.4.m Miscellaneous Image processing and computer vision

Research paper thumbnail of Automatic Segmentation and Positioning of Morphometric Points Intended for Cervical Vertebrae

International Journal for Research in Applied Science and Engineering Technology, Nov 22, 2017

X rays are the most prevalent imaging examination that helps a doctor diagnose,monitor, and treat... more X rays are the most prevalent imaging examination that helps a doctor diagnose,monitor, and treat many medical illnesses.In the detection of degenerative spinal disease, the knowledge of the vertebrae position, curve and alignment is necessary. Active Appearance Model (AAM) as proposed by Cootes et al. is deformable model widely used for segmentation of grey scale images. The model is based on priory information learning of the shape and texture variation of a training set. A compact object class descriptor is formed, which can be used to search images for new object instances. In this paper, a brief description of the implementation of AAM along with positioning of the morphometric points on cervical vertebrae is given.

Research paper thumbnail of Throughput Enhancement By Multi Channelling IEEE 802.15.4 For Multimedia Applications

In this paper, we propose a new multichannel allocation protocol for ZigBee/IEEE 802.15.4 network... more In this paper, we propose a new multichannel allocation protocol for ZigBee/IEEE 802.15.4 networks. The main goal is to improve the global throughput which is basically insufficient to satisfy high bandwidth requirements for applications like monitoring or traffic control. The solution is based on the availability of multiple channels on current low-cost, low-energy radio transceivers, which can be easily tuned dynamically to different frequencies. This possibility can be exploited to increase the number of simultaneous transmissions on adjacent links. The allocation of the different channels is centralized and distributed by the coordinator thanks to a function designed to compute the channel offset between two successive children routers. In the nodes, the switching process between the transmission and the reception channels is triggered starting from the PHY primitive available on the transceiver. We have implemented the multichannel capability foe 802.15.4 MAC with multichannel interface to aodv protocol. The channel allocation conditions are observed by considering different scenarios. The performance is compared with single channel 802.15.4. The simulation results shows that the proposed protocol improves the global throughput by a factor between 2 and 5, depending on the scenario, compared to the single-channel solution or a random channel allocation.

Research paper thumbnail of Anterior Osteophyte Identification in Cervical Vertebrae

Signal & Image Processing : An International Journal, 2011

Radiologist always examines X-ray to determine abnormal changes in cervical, lumbar & thoracic ve... more Radiologist always examines X-ray to determine abnormal changes in cervical, lumbar & thoracic vertebrae. Osteophyte (bony growth) may appear at the corners of vertebrae so that vertebral shape becomes abnormal. This paper presents the idea from Image processing techniques such as customised Hough transform which will be used for segmentation which should be independent of rotation, scale, noise & shape. This segmented image will be then used for computing size invariant, convex hull based features to differentiate normal cervical vertebrae from cervical vertebrae containing anterior osteophyte. This approach effectively finds anterior osteophytes in cervical vertebrae.

Research paper thumbnail of Automation Through Google Assistant

International Journal of Engineering Research and, 2020

This project presents the overall design of Home Automation System with help of Google Assistant ... more This project presents the overall design of Home Automation System with help of Google Assistant providing low cost and wireless system. This system is designed to assist and providesupport in order to fulfill the needs of elderly and disabled in home. Also, thesmart home concept in the system improves the standard living at home.The voice mode is used to control the home appliances. Thefeedback is received in the android application. The main control system implements wireless technology to provideremote access from smart phone. The design remains the existing electricalswitches and provides more safety control on the switches with low voltage method. The switches status is synchronized in all the control systemwhereby every user interface indicates the real time existing switches status. Thesystem intended to control electrical appliances and devices in house withrelatively low cost design, user-friendly interface and ease of installation.

Research paper thumbnail of Key Secured Block Based Transformation for Image Encryption

Now a day, images are widely used in several processes. Therefore, secure transmission of image d... more Now a day, images are widely used in several processes. Therefore, secure transmission of image data is more important in many applications like military, medical imaging, video conferencing etc. Image encryption is mainly used for secure transmission of image data. Encryption is the process of transforming the information to another one which is hard to understand. Different security techniques have been used to provide the image encryption process. As we know, pixels in plain image are strongly correlated. In order to decrease this correlation, Block based transformation technique is specially used. The block transformation algorithm divides the image in to no. of blocks and shuffles their position of blocks to decrease the Correlation and increase its entropy value. Divide an image in more no. of blocks gives the more security of image. Transformation table will decide new positions of blocks. The aim of Key secured block transformation is to enhance the security of an image. Her...

Research paper thumbnail of Automatic Segmentation and Positioning of Morphometric Points Intended for Cervical Vertebrae

International Journal for Research in Applied Science and Engineering Technology, Nov 22, 2017

X rays are the most prevalent imaging examination that helps a doctor diagnose,monitor, and treat... more X rays are the most prevalent imaging examination that helps a doctor diagnose,monitor, and treat many medical illnesses.In the detection of degenerative spinal disease, the knowledge of the vertebrae position, curve and alignment is necessary. Active Appearance Model (AAM) as proposed by Cootes et al. is deformable model widely used for segmentation of grey scale images. The model is based on priory information learning of the shape and texture variation of a training set. A compact object class descriptor is formed, which can be used to search images for new object instances. In this paper, a brief description of the implementation of AAM along with positioning of the morphometric points on cervical vertebrae is given.

Research paper thumbnail of TECHNOLOGY Blowfish Encryption Using Key Secured Block Based Transformation

Encryption is a process of converting a one form of information in another form which is hard to ... more Encryption is a process of converting a one form of information in another form which is hard to understand .Now a days, a large amount of information get transfer with wired or wireless network. Information contents may be textual data or image data. Therefore encryption of text or image is most important during secure transmission of information. Images are widely used in several processes like military field, medical imaging, video conferencing where confidentiality about image information is very important. As we know, pixels in plain image are strongly correlated. Image information get perceive due to this high correlation. Most of available image encryption algorithms are used for encryption of pixel information only but key secured block based transformation technique change the position of pixels and provide low correlation among image pixels so that less amount of information get perceived. The block transformation algorithm divides the image in to no. of blocks and shuffles their position of blocks to decrease the Correlation and increase its entropy value. Divide an image in more no. of blocks gives the more security of image. Transformation table will decide new positions of blocks. The aim of Key secured block transformation is to enhance the security of an image. Here, key provide a security for transformation table .Different keys generated for different types of image so ,if input image data changed automatically key will also get change. Here key is used for two purposes, one for to build transformation table and second to encrypt image data. So as key changed, transformation table will also get change and image get transformed with this new transformation table. Block Transformed image is then passed for encryption process. Here we used Blowfish image encryption algorithm because of variable and longest key size. At the receiver side these blocks are retransformed in to their original position and performed a decryption process which gives the original image.

Research paper thumbnail of Detection & Removal of Cracks in Digitized Paintings Based on Image Processing

International journal of engineering research and technology, Jan 18, 2014

This paper presents of crack detection & removal techniques in digitized paintings. It is also us... more This paper presents of crack detection & removal techniques in digitized paintings. It is also used as a nondestructive tool for the actual restoration. The user must select an area on each crack that to be restored. The cracks are identified and detected by Gabor which is an integrated methodology for removal of cracks. First, we filter the selected crack image using 8 differently oriented Gabor filters. We describe an orientationbased feature extraction method to represent a crack network from sets of local orientation features. The resultant features are used for crack filling with median filter and weighted median filter. The methodology has been shown to perform very well on digitized paintings suffering from cracks.

Research paper thumbnail of N.B.Sambre," Blowfish Encryption Using Key Secured Block Based Transformation

Encryption is a process of converting a one form of information in another form which is hard to ... more Encryption is a process of converting a one form of information in another form which is hard to understand.Now a days, a large amount of information get transfer with wired or wireless network. Information contents may be textual data or image data. Therefore encryption of text or image is most important during secure transmission of information. Images are widely used in several processes like military field, medical imaging, video conferencing where confidentiality about image information is very important. As we know, pixels in plain image are strongly correlated. Image information get perceive due to this high correlation. Most of available image encryption algorithms are used for encryption of pixel information only but key secured block based transformation technique change the position of pixels and provide low correlation among image pixels so that less amount of information get perceived. The block transformation algorithm divides the image in to no. of blocks and shuffles...

Research paper thumbnail of Estimating Leaf Area By Using Imaging Technique

One feature of most horticultural crop plants that is biologically relevant to their yield and pr... more One feature of most horticultural crop plants that is biologically relevant to their yield and productivity is total leaf area. The aim of this study was to estimate the leaf area using digital photographs processed in Matlab. A standard method was also used for comparing these results with actual measured areas Matlab and photograph processings were also evaluated with a group of 20 leaves, ten for sugarcane and ten betel leaf. The results showed coefficients of correlation of above 99% for the standard method and methods.

Research paper thumbnail of Study and Analysis of Ieee 802.15.4 Media Access Control (mac)

The Low rate wireless Personal Area Networks (LR-WPAN) allows the optional use of a superframe st... more The Low rate wireless Personal Area Networks (LR-WPAN) allows the optional use of a superframe structure. The superframe is bounded by network beacons and is divided into 16 equally sized slots. The superframe can have an active and an inactive portion. During the inactive portion, the coordinator shall not interact with its PAN and may enter a low-power mode. The format of the superframe is defined by the coordinator. The active portion consists of Contention Access Period (CAP) and contention free period (CFP)

Research paper thumbnail of TECHNOLOGY Blowfish Encryption Using Key Secured Block Based Transformation

Encryption is a process of converting a one form of information in another form which is hard to ... more Encryption is a process of converting a one form of information in another form which is hard to understand .Now a days, a large amount of informati on get transfer with wired or wireless network. Inf ormation contents may be textual data or image data. Therefo re encryption of text or image is most important du ring secure transmission of information. Images are widely used in several processes like military field, medical imaging, video conferencing where confidentiality about image info rmation is very important. As we know, pixels in pl ain image are strongly correlated. Image information get perc eive due to this high correlation. Most of availabl e image encryption algorithms are used for encryption of pi xel information only but key secured block based tr ansformation technique change the position of pixels and provide low correlation among image pixels so that less am ount of information get perceived . The block transformati on algorithm divides the image in to no. of block...

Research paper thumbnail of Detection & Removal of Cracks in Digitized Paintings Based on Image Processing

This paper presents of crack detection & removal techniques in digitized paintings. It is also us... more This paper presents of crack detection & removal techniques in digitized paintings. It is also used as a nondestructive tool for the actual restoration. The user must select an area on each crack that to be restored. The cracks are identified and detected by Gabor which is an integrated methodology for removal of cracks. First, we filter the selected crack image using 8 differently oriented Gabor filters. We describe an orientationbased feature extraction method to represent a crack network from sets of local orientation features. The resultant features are used for crack filling with median filter and weighted median filter. The methodology has been shown to perform very well on digitized paintings suffering from cracks.

Research paper thumbnail of Performance Analysis of Threshold based Image Encryption

International Journal of Computer Applications, 2014

Security of wireless transmission becomes considerable issue in present scenario. To overcome the... more Security of wireless transmission becomes considerable issue in present scenario. To overcome the issue, several algorithms were used. Among them cryptography remains as the efficient technique that converts the user provided information into unintelligible format. The cryptographic algorithms plays important role in providing security and confidentiality to the data. In this proposed work, the image encryption is done using the threshold technique. The performance factors such as the normalized cross correlation, structural content of the image, the mean square error in the image after encryption were calculated. To justify the efficiency of the proposed scheme the factors are analyzed and provided. The data format considered here is the image. By the threshold setting the entropy of the image gets increased It also reduces the execution time. Based on the results obtained the proposed algorithm yields better results.

Research paper thumbnail of VANET: Routing Protocols, Security Issues and Simulation Tools

IOSR Journal of Computer Engineering, 2012

Since the last few years VANET have received increased attention as the potential technology to e... more Since the last few years VANET have received increased attention as the potential technology to enhance active and preventive safety on the road, as well as travel comfort. Several unexpected disastrous situations are encountered on road networks daily, many of which may lead to congestion and safety hazards. If vehicles can be provided with information about such incidents or traffic conditions in advance, the quality of driving can be improved significantly in terms of time, distance, and safety. One of the main challenges in Vehicular ad hoc network is of searching and maintaining an effective route for transporting data information. Security and privacy are indispensable in vehicular communications for successful acceptance and deployment of such a technology. The vehicular safety application should be thoroughly tested before it is deployed in a real world to use. Simulator tool has been preferred over outdoor experiment because it simple, easy and cheap. VANET requires that a traffic and network simulator should be used together to perform this test. In this paper, the author will make an attempt for identifying major issues and challenges associated with different vanet protocols, security and simulation tools.

Research paper thumbnail of Embedding an Image Into Image by Region Segmentation Method Based on a Complexity With Effect of Standard Deviation

International Journal

In this paper, an image steganography system implemented is described, in which the data hiding (... more In this paper, an image steganography system implemented is described, in which the data hiding (embedding) is achieved using image segmentation based on a local complexity measure. A complexity measure is defined in Steganography for discriminating noisy regions in an image. This paper presents a revised method for embedding data into an image by variation in complexity threshold measure and effect of standard deviation of various bit planes. The principle of the method is based on that of bit plane complexity based steganography. High embedding rates are achieved with low distortion based on the theory that noise-like regions in an image's bit-planes can be replaced with noise-like secret data without significant loss in image quality Percentage embeddable area of complex images is around 50% without visual distortion showing PSNR above 30dB. While computing complexity threshold minimum standard deviation of the plane should be selected Categories and Subject Descriptors I.4.m Miscellaneous Image processing and computer vision

Research paper thumbnail of Automatic Segmentation and Positioning of Morphometric Points Intended for Cervical Vertebrae

International Journal for Research in Applied Science and Engineering Technology, Nov 22, 2017

X rays are the most prevalent imaging examination that helps a doctor diagnose,monitor, and treat... more X rays are the most prevalent imaging examination that helps a doctor diagnose,monitor, and treat many medical illnesses.In the detection of degenerative spinal disease, the knowledge of the vertebrae position, curve and alignment is necessary. Active Appearance Model (AAM) as proposed by Cootes et al. is deformable model widely used for segmentation of grey scale images. The model is based on priory information learning of the shape and texture variation of a training set. A compact object class descriptor is formed, which can be used to search images for new object instances. In this paper, a brief description of the implementation of AAM along with positioning of the morphometric points on cervical vertebrae is given.

Research paper thumbnail of Throughput Enhancement By Multi Channelling IEEE 802.15.4 For Multimedia Applications

In this paper, we propose a new multichannel allocation protocol for ZigBee/IEEE 802.15.4 network... more In this paper, we propose a new multichannel allocation protocol for ZigBee/IEEE 802.15.4 networks. The main goal is to improve the global throughput which is basically insufficient to satisfy high bandwidth requirements for applications like monitoring or traffic control. The solution is based on the availability of multiple channels on current low-cost, low-energy radio transceivers, which can be easily tuned dynamically to different frequencies. This possibility can be exploited to increase the number of simultaneous transmissions on adjacent links. The allocation of the different channels is centralized and distributed by the coordinator thanks to a function designed to compute the channel offset between two successive children routers. In the nodes, the switching process between the transmission and the reception channels is triggered starting from the PHY primitive available on the transceiver. We have implemented the multichannel capability foe 802.15.4 MAC with multichannel interface to aodv protocol. The channel allocation conditions are observed by considering different scenarios. The performance is compared with single channel 802.15.4. The simulation results shows that the proposed protocol improves the global throughput by a factor between 2 and 5, depending on the scenario, compared to the single-channel solution or a random channel allocation.

Research paper thumbnail of Anterior Osteophyte Identification in Cervical Vertebrae

Signal & Image Processing : An International Journal, 2011

Radiologist always examines X-ray to determine abnormal changes in cervical, lumbar & thoracic ve... more Radiologist always examines X-ray to determine abnormal changes in cervical, lumbar & thoracic vertebrae. Osteophyte (bony growth) may appear at the corners of vertebrae so that vertebral shape becomes abnormal. This paper presents the idea from Image processing techniques such as customised Hough transform which will be used for segmentation which should be independent of rotation, scale, noise & shape. This segmented image will be then used for computing size invariant, convex hull based features to differentiate normal cervical vertebrae from cervical vertebrae containing anterior osteophyte. This approach effectively finds anterior osteophytes in cervical vertebrae.

Research paper thumbnail of Automation Through Google Assistant

International Journal of Engineering Research and, 2020

This project presents the overall design of Home Automation System with help of Google Assistant ... more This project presents the overall design of Home Automation System with help of Google Assistant providing low cost and wireless system. This system is designed to assist and providesupport in order to fulfill the needs of elderly and disabled in home. Also, thesmart home concept in the system improves the standard living at home.The voice mode is used to control the home appliances. Thefeedback is received in the android application. The main control system implements wireless technology to provideremote access from smart phone. The design remains the existing electricalswitches and provides more safety control on the switches with low voltage method. The switches status is synchronized in all the control systemwhereby every user interface indicates the real time existing switches status. Thesystem intended to control electrical appliances and devices in house withrelatively low cost design, user-friendly interface and ease of installation.

Research paper thumbnail of Key Secured Block Based Transformation for Image Encryption

Now a day, images are widely used in several processes. Therefore, secure transmission of image d... more Now a day, images are widely used in several processes. Therefore, secure transmission of image data is more important in many applications like military, medical imaging, video conferencing etc. Image encryption is mainly used for secure transmission of image data. Encryption is the process of transforming the information to another one which is hard to understand. Different security techniques have been used to provide the image encryption process. As we know, pixels in plain image are strongly correlated. In order to decrease this correlation, Block based transformation technique is specially used. The block transformation algorithm divides the image in to no. of blocks and shuffles their position of blocks to decrease the Correlation and increase its entropy value. Divide an image in more no. of blocks gives the more security of image. Transformation table will decide new positions of blocks. The aim of Key secured block transformation is to enhance the security of an image. Her...