Surekha Borra - Academia.edu (original) (raw)
Papers by Surekha Borra
To mitigate the noise effects without information loss at the edges of the radiological images, a... more To mitigate the noise effects without information loss at the edges of the radiological images, a well-designed preprocessing algorithm is required to assist the Radiologists. This paper proposes a hybrid adaptive preprocessing algorithm that utilizes a Rudin_Osher_Fatemi (R_O_F) model for edge detection, Richardson_Lucy (R_L) Algorithm for Image Enhancement, and Block Matching 3D Collaborative filtering for denoising of image. The performance of the proposed method is assessed and estimated on two realistic datasets, one on chest X-ray images and the another on MRI/CT images. The proposed hybrid system verifies the data reliability of Gaussian noise affected medical images. The simulation results shows that the proposed adaptive method attains a high value of Peak Signal-to-Noise ratio of 47.4433 dB for chest X-Ray and 46.8674 dB for MRI/CT datasets respectively at a standard deviation value of 2. Performance analysis of the proposed scheme is further carried out using various stat...
Satellite Image Analysis: Clustering and Classification, 2019
Remote Sensing technology senses and measures the radiation or reflectance of samples of distant ... more Remote Sensing technology senses and measures the radiation or reflectance of samples of distant objects, and allows extraction of information which includes detection and recognition of objects and its coverage. Image classification methods identify the objects represented by each pixel in the satellite image based on its spectral wavelength and time series. In this chapter, the basics of satellite image classification and its types are presented. The unsupervised classification methods such as K-means, Gaussian mixture model, self-organizing maps, and Hidden Markov models are described for clustering of satellite images.
Medical Imaging and its Security in Telemedicine Applications, 2018
SN Computer Science, 2021
Recent Patents on Engineering, 2021
Movies, advertisements, and promotional videos are Intellectual Property (IP) and are often share... more Movies, advertisements, and promotional videos are Intellectual Property (IP) and are often shared on open access medium as part of the business. Fueled by the advancements in technology, piracy has become more rampant and a widely spread crime in many countries. Movie piracy is more dangerous to mega-budget producers who struggle to receive the maximum profit of their films, making them compete with smaller films, results in the cheapest alternatives, jeopardizing the production of more films, artistic pool, shooting sites, camera equipment, special effects, quality and much more. Apart from the big shrinking of the job market for film jobs, sponsorship, unions, and merchandising get affected greatly. Many advanced technologies, apart from watermarking, such as Infrared based techniques, are used to estimate the position of the pirate and reduce piracy. This paper reviews the enabling technologies in the fight against video piracy, focusing mainly on methods for stopping these emer...
Cryptographic and Information Security, 2018
Research Anthology on Telemedicine Efficacy, Adoption, and Impact on Healthcare Delivery, 2021
Today, an individual's health is being monitored for diagnosis and treatment of diseases upon... more Today, an individual's health is being monitored for diagnosis and treatment of diseases upon analyzing various medical data such as images and signals. Modifications of this medical data when it is transferred over an open communication channel or network leads to deviations in diagnosis and creates a serious health issue for any individual. Digital watermarking techniques are one of the solutions for providing protection to multimedia contents. This chapter gives requirements and various techniques for the security of medical data using watermarking. This chapter also demonstrates a novel hybrid watermarking technique based on fast discrete curvelet transform (FDCuT), redundant discrete wavelet transform (RDWT), and discrete cosine transform (DCT). This watermarking technique can be used for securing medical various types of medical images and ECG signals over an open communication channel.
International Journal of Speech Technology, 2021
In the last two decades, there is a widespread and quick growth in the online connectivity global... more In the last two decades, there is a widespread and quick growth in the online connectivity globally, which has led to a steady increase in the sharing of multimedia content online. Illegal copying of data and its misuse has become common, and hence there is a rapid rise in research interests of developing a variety of authentication and data protection techniques. Digital watermarking has been used for years to copyright protect the Intellectual Property and is still a domain with lot of scope for research to suit its applicability to sensitive fields such as medical, military, aviation, satellite imagery, advertising, navigation, and designs, which are of very high resolution and demands undegraded transmission and storage. Many Reversible Watermarking (RW) techniques were developed for protection of such sensitive signals, of which Difference Expansion (DE) based methods became popular. This paper presents an extensive survey of reversible watermarking techniques based on DE algorithms for their characteristics, considerations, performance with respect to complexity, embedding capacity, perceptual impact, and fragility, to find the applicability of those algorithms. The paper also outlines the open research problems and provides some future directions for the researchers working in the related domain.
Swarm, Evolutionary, and Memetic Computing, 2016
Digital technology has resulted in a cost effective and easy means for storage and communication ... more Digital technology has resulted in a cost effective and easy means for storage and communication of the multimedia data, which can also be easily downloadable and reproducible. Hence, there is a growing need for techniques that identify the right owner of Intellectual Property (IP). Visual Cryptography based Lossless Watermarking (VCLW) techniques are hybrid schemes that are now being developed as a potential replacement for conventional watermarking systems as they are effective in resolving existing tradeoff among the requirements. This paper presents theoretical analysis of spatial domain VCLW techniques and performs practical performance analysis, to identify gaps. These hybrid techniques offer promising quality of target image after watermarking; there are still a number of challenges associated such as security, robustness, pixel expansion, complexity, image formats etc. Among multiple requirements, achieving fewer rates of false positives is identified as fundamental requirement in order to discourage malicious owners and to protect Intellectual Property. The analysis of comparative results shows that with the existing techniques, the false positive rate could not reach 10−6, which is the maximum limit suggested by Cox et al. for watermarking. This is due to the unique security challenge called C3 rule that involves the design of code tables, selection of features, thresholds and combination functions. It is concluded that in the applications where the images to be protected are very sensitive such as military, medical and satellite images, VCLW techniques can be a potential replacement for conventional watermarking systems, given that the algorithms fills the important gaps.
Current Psychiatry Research and Reviews, 2021
Misinformation, in most cases, is the reconfigured content using basic tools. Fake information re... more Misinformation, in most cases, is the reconfigured content using basic tools. Fake information related to casualties, infections, contacts, lockdowns, investments, exam schedules, and immigration, leads to confusion, fears, phobophobia, discrimination, harassment, physical injuries, deaths, financial damages, reputational losses, and many more long-lasting side effects. Objective: The aim of this article is to provide an overview of the many ways in which misinformation and information leakage related to COVID-19 can influence the stakeholders, such that it gives policymakers and citizens a greater understanding of both direct and indirect risks and harms when assessing the challenges their countries are facing. Methods: An extensive literature review was done on the prevalence of the COVID-19 related misinformation and its associated significant psychological, reputational, physical, and societal implications on Indians. The novel and possible approaches to fight against the misinformation are described.
Recent Patents on Engineering, 2022
: The security of information is the major problem faced in today’s digital environment. Biometri... more : The security of information is the major problem faced in today’s digital environment. Biometric Systems helps in achieving high–end security at precise performance requirements for various applications. This paper surveys the present multimodal and unimodal biometric based authentication systems which are in use, and their future possibilities. The authentication techniques that can identify the individual using unique features of the human such as face, fingerprint, DNA, speech and iris are discussed. Different recognition systems for new biometric traits such as voice, gait, and lip moment are also focused. This paper also focuses on information security of biometric systems and their performance requirements.
Digital Image Watermarking, 2018
International Journal of Digital Crime and Forensics, 2019
In this article, a blind and robust medical image watermarking technique based on Finite Ridgelet... more In this article, a blind and robust medical image watermarking technique based on Finite Ridgelet Transform (FRT) and Singular Value Decomposition (SVD) is proposed. A host medical image is first transformed into 16 × 16 non-overlapping blocks and then ridgelet transform is applied on the individual blocks to obtain sets of ridgelet coefficients. SVD is then applied on these sets, to obtain the corresponding U, S and V matrix. The watermark information is embedded into the host medical image by modification of the value of the significant elements of U matrix. This proposed technique is tested on various types of medical images such as X-ray and CT scan. The simulation results revealed that this technique provides better imperceptibility, with an average PSNR being 42.95 dB for all test medical images. This technique also overcomes the limitation of the existing technique which is applicable on only the Region of Interest (ROI) of the medical image.
Journal of Medical Systems, 2017
Nowadays medical data in terms of image files are often exchanged between different hospitals for... more Nowadays medical data in terms of image files are often exchanged between different hospitals for use in telemedicine and diagnosis. Visible watermarking being extensively used for Intellectual Property identification of such medical images, leads to serious issues if failed to identify proper regions for watermark insertion. In this paper, the Region of Non-Interest (RONI) based visible watermarking for medical image authentication is proposed. In this technique, to RONI of the cover medical image is first identified using Human Visual System (HVS) model. Later, watermark logo is visibly inserted into RONI of the cover medical image to get watermarked medical image. Finally, the watermarked medical image is compared with the original medical image for measurement of imperceptibility and authenticity of proposed scheme. The experimental results showed that this proposed scheme reduces the computational complexity and improves the PSNR when compared to many existing schemes.
Medical Imaging and its Security in Telemedicine Applications, 2018
This chapter presents various data hiding techniques in hybrid, transform domain and spatial doma... more This chapter presents various data hiding techniques in hybrid, transform domain and spatial domain for integrity verification of medical image. These techniques are designed using various image transforms such as DCT, SVD, FDCuT, NSCT, and CS-based encryption. Finally, simulation results of these techniques are demonstrated in this chapter.
Satellite Image Analysis: Clustering and Classification, 2019
Geographic Information System (GIS) stores large volumes of spectral data (raw facts) acquired by... more Geographic Information System (GIS) stores large volumes of spectral data (raw facts) acquired by sensors located at the satellite and convert them into features and information in order to provide answers to many questions and for easy retrieval and display based on the user needs. The conversion of data to information involves a lot of processing. The preprocessing, especially, is required for the following reasons: To restore the satellite image quality in the presence of known or unknown degradations and noises. To extract or highlight hidden details in the satellite image. To extract regions or statistical and nonstatistical features of interest for analysis and classification purposes. To geometrically correct the images for mapping and georeferencing. This chapter describes various image enhancement methods, noise removal methods, image stitching and interpolation methods, segmentation, multivariate image processing techniques, and other image transformations.
SpringerBriefs in Applied Sciences and Technology, 2019
To mitigate the noise effects without information loss at the edges of the radiological images, a... more To mitigate the noise effects without information loss at the edges of the radiological images, a well-designed preprocessing algorithm is required to assist the Radiologists. This paper proposes a hybrid adaptive preprocessing algorithm that utilizes a Rudin_Osher_Fatemi (R_O_F) model for edge detection, Richardson_Lucy (R_L) Algorithm for Image Enhancement, and Block Matching 3D Collaborative filtering for denoising of image. The performance of the proposed method is assessed and estimated on two realistic datasets, one on chest X-ray images and the another on MRI/CT images. The proposed hybrid system verifies the data reliability of Gaussian noise affected medical images. The simulation results shows that the proposed adaptive method attains a high value of Peak Signal-to-Noise ratio of 47.4433 dB for chest X-Ray and 46.8674 dB for MRI/CT datasets respectively at a standard deviation value of 2. Performance analysis of the proposed scheme is further carried out using various stat...
Satellite Image Analysis: Clustering and Classification, 2019
Remote Sensing technology senses and measures the radiation or reflectance of samples of distant ... more Remote Sensing technology senses and measures the radiation or reflectance of samples of distant objects, and allows extraction of information which includes detection and recognition of objects and its coverage. Image classification methods identify the objects represented by each pixel in the satellite image based on its spectral wavelength and time series. In this chapter, the basics of satellite image classification and its types are presented. The unsupervised classification methods such as K-means, Gaussian mixture model, self-organizing maps, and Hidden Markov models are described for clustering of satellite images.
Medical Imaging and its Security in Telemedicine Applications, 2018
SN Computer Science, 2021
Recent Patents on Engineering, 2021
Movies, advertisements, and promotional videos are Intellectual Property (IP) and are often share... more Movies, advertisements, and promotional videos are Intellectual Property (IP) and are often shared on open access medium as part of the business. Fueled by the advancements in technology, piracy has become more rampant and a widely spread crime in many countries. Movie piracy is more dangerous to mega-budget producers who struggle to receive the maximum profit of their films, making them compete with smaller films, results in the cheapest alternatives, jeopardizing the production of more films, artistic pool, shooting sites, camera equipment, special effects, quality and much more. Apart from the big shrinking of the job market for film jobs, sponsorship, unions, and merchandising get affected greatly. Many advanced technologies, apart from watermarking, such as Infrared based techniques, are used to estimate the position of the pirate and reduce piracy. This paper reviews the enabling technologies in the fight against video piracy, focusing mainly on methods for stopping these emer...
Cryptographic and Information Security, 2018
Research Anthology on Telemedicine Efficacy, Adoption, and Impact on Healthcare Delivery, 2021
Today, an individual's health is being monitored for diagnosis and treatment of diseases upon... more Today, an individual's health is being monitored for diagnosis and treatment of diseases upon analyzing various medical data such as images and signals. Modifications of this medical data when it is transferred over an open communication channel or network leads to deviations in diagnosis and creates a serious health issue for any individual. Digital watermarking techniques are one of the solutions for providing protection to multimedia contents. This chapter gives requirements and various techniques for the security of medical data using watermarking. This chapter also demonstrates a novel hybrid watermarking technique based on fast discrete curvelet transform (FDCuT), redundant discrete wavelet transform (RDWT), and discrete cosine transform (DCT). This watermarking technique can be used for securing medical various types of medical images and ECG signals over an open communication channel.
International Journal of Speech Technology, 2021
In the last two decades, there is a widespread and quick growth in the online connectivity global... more In the last two decades, there is a widespread and quick growth in the online connectivity globally, which has led to a steady increase in the sharing of multimedia content online. Illegal copying of data and its misuse has become common, and hence there is a rapid rise in research interests of developing a variety of authentication and data protection techniques. Digital watermarking has been used for years to copyright protect the Intellectual Property and is still a domain with lot of scope for research to suit its applicability to sensitive fields such as medical, military, aviation, satellite imagery, advertising, navigation, and designs, which are of very high resolution and demands undegraded transmission and storage. Many Reversible Watermarking (RW) techniques were developed for protection of such sensitive signals, of which Difference Expansion (DE) based methods became popular. This paper presents an extensive survey of reversible watermarking techniques based on DE algorithms for their characteristics, considerations, performance with respect to complexity, embedding capacity, perceptual impact, and fragility, to find the applicability of those algorithms. The paper also outlines the open research problems and provides some future directions for the researchers working in the related domain.
Swarm, Evolutionary, and Memetic Computing, 2016
Digital technology has resulted in a cost effective and easy means for storage and communication ... more Digital technology has resulted in a cost effective and easy means for storage and communication of the multimedia data, which can also be easily downloadable and reproducible. Hence, there is a growing need for techniques that identify the right owner of Intellectual Property (IP). Visual Cryptography based Lossless Watermarking (VCLW) techniques are hybrid schemes that are now being developed as a potential replacement for conventional watermarking systems as they are effective in resolving existing tradeoff among the requirements. This paper presents theoretical analysis of spatial domain VCLW techniques and performs practical performance analysis, to identify gaps. These hybrid techniques offer promising quality of target image after watermarking; there are still a number of challenges associated such as security, robustness, pixel expansion, complexity, image formats etc. Among multiple requirements, achieving fewer rates of false positives is identified as fundamental requirement in order to discourage malicious owners and to protect Intellectual Property. The analysis of comparative results shows that with the existing techniques, the false positive rate could not reach 10−6, which is the maximum limit suggested by Cox et al. for watermarking. This is due to the unique security challenge called C3 rule that involves the design of code tables, selection of features, thresholds and combination functions. It is concluded that in the applications where the images to be protected are very sensitive such as military, medical and satellite images, VCLW techniques can be a potential replacement for conventional watermarking systems, given that the algorithms fills the important gaps.
Current Psychiatry Research and Reviews, 2021
Misinformation, in most cases, is the reconfigured content using basic tools. Fake information re... more Misinformation, in most cases, is the reconfigured content using basic tools. Fake information related to casualties, infections, contacts, lockdowns, investments, exam schedules, and immigration, leads to confusion, fears, phobophobia, discrimination, harassment, physical injuries, deaths, financial damages, reputational losses, and many more long-lasting side effects. Objective: The aim of this article is to provide an overview of the many ways in which misinformation and information leakage related to COVID-19 can influence the stakeholders, such that it gives policymakers and citizens a greater understanding of both direct and indirect risks and harms when assessing the challenges their countries are facing. Methods: An extensive literature review was done on the prevalence of the COVID-19 related misinformation and its associated significant psychological, reputational, physical, and societal implications on Indians. The novel and possible approaches to fight against the misinformation are described.
Recent Patents on Engineering, 2022
: The security of information is the major problem faced in today’s digital environment. Biometri... more : The security of information is the major problem faced in today’s digital environment. Biometric Systems helps in achieving high–end security at precise performance requirements for various applications. This paper surveys the present multimodal and unimodal biometric based authentication systems which are in use, and their future possibilities. The authentication techniques that can identify the individual using unique features of the human such as face, fingerprint, DNA, speech and iris are discussed. Different recognition systems for new biometric traits such as voice, gait, and lip moment are also focused. This paper also focuses on information security of biometric systems and their performance requirements.
Digital Image Watermarking, 2018
International Journal of Digital Crime and Forensics, 2019
In this article, a blind and robust medical image watermarking technique based on Finite Ridgelet... more In this article, a blind and robust medical image watermarking technique based on Finite Ridgelet Transform (FRT) and Singular Value Decomposition (SVD) is proposed. A host medical image is first transformed into 16 × 16 non-overlapping blocks and then ridgelet transform is applied on the individual blocks to obtain sets of ridgelet coefficients. SVD is then applied on these sets, to obtain the corresponding U, S and V matrix. The watermark information is embedded into the host medical image by modification of the value of the significant elements of U matrix. This proposed technique is tested on various types of medical images such as X-ray and CT scan. The simulation results revealed that this technique provides better imperceptibility, with an average PSNR being 42.95 dB for all test medical images. This technique also overcomes the limitation of the existing technique which is applicable on only the Region of Interest (ROI) of the medical image.
Journal of Medical Systems, 2017
Nowadays medical data in terms of image files are often exchanged between different hospitals for... more Nowadays medical data in terms of image files are often exchanged between different hospitals for use in telemedicine and diagnosis. Visible watermarking being extensively used for Intellectual Property identification of such medical images, leads to serious issues if failed to identify proper regions for watermark insertion. In this paper, the Region of Non-Interest (RONI) based visible watermarking for medical image authentication is proposed. In this technique, to RONI of the cover medical image is first identified using Human Visual System (HVS) model. Later, watermark logo is visibly inserted into RONI of the cover medical image to get watermarked medical image. Finally, the watermarked medical image is compared with the original medical image for measurement of imperceptibility and authenticity of proposed scheme. The experimental results showed that this proposed scheme reduces the computational complexity and improves the PSNR when compared to many existing schemes.
Medical Imaging and its Security in Telemedicine Applications, 2018
This chapter presents various data hiding techniques in hybrid, transform domain and spatial doma... more This chapter presents various data hiding techniques in hybrid, transform domain and spatial domain for integrity verification of medical image. These techniques are designed using various image transforms such as DCT, SVD, FDCuT, NSCT, and CS-based encryption. Finally, simulation results of these techniques are demonstrated in this chapter.
Satellite Image Analysis: Clustering and Classification, 2019
Geographic Information System (GIS) stores large volumes of spectral data (raw facts) acquired by... more Geographic Information System (GIS) stores large volumes of spectral data (raw facts) acquired by sensors located at the satellite and convert them into features and information in order to provide answers to many questions and for easy retrieval and display based on the user needs. The conversion of data to information involves a lot of processing. The preprocessing, especially, is required for the following reasons: To restore the satellite image quality in the presence of known or unknown degradations and noises. To extract or highlight hidden details in the satellite image. To extract regions or statistical and nonstatistical features of interest for analysis and classification purposes. To geometrically correct the images for mapping and georeferencing. This chapter describes various image enhancement methods, noise removal methods, image stitching and interpolation methods, segmentation, multivariate image processing techniques, and other image transformations.
SpringerBriefs in Applied Sciences and Technology, 2019