Suneeta Agarwal | Mnnit Allahabad (original) (raw)

Uploads

Papers by Suneeta Agarwal

Research paper thumbnail of Progressive Visual Cryptography With Unexpanded Shares

IEEE Transactions on Circuits and Systems for Video Technology, 2011

Research paper thumbnail of Edge Preserved De-noising Method for Medical X-Ray Images Using Wavelet Packet Transformation

Emerging Research in Computing, Information, Communication and Applications, 2015

X-ray image is one of the prominent modality of medical imaging used in medical diagnosis. This m... more X-ray image is one of the prominent modality of medical imaging used in medical diagnosis. This may be corrupted with Gaussian noise due to thermal fluctuations during its acquisition. For reducing these noises a method is applied which combines the Anisotropic Diffusion filter with an edge preserved Wavelet Packet Transformation. Here the edges are detected in each sub-band using Sobel edge detection operator and preserved by excluding these edge coefficients during hard thresholding. This method has proposed a new technique to calculate a threshold value for each sub-band of Wavelet Packet. The quality metrics SNR, RMSE, SSIM, Precision, Accuracy and etc. are used to measure the performance of this method and shows that this approach is better as compared to other noise reduction methods like Adaptive Median Filter, simple Anisotropic Diffusion and simple Wavelet Packet Transformation.

Research paper thumbnail of Notice of Retraction: Greedy genetic algorithm to Bounded Knapsack Problem

Research paper thumbnail of Texture and Wavelet-Based Spoof Fingerprint Detection for Fingerprint Biometric Systems

2008 First International Conference on Emerging Trends in Engineering and Technology, 2008

This paper describes an image-based system to detect spoof fingerprint attacks in fingerprint bio... more This paper describes an image-based system to detect spoof fingerprint attacks in fingerprint biometric systems. It is based on the observation that, real and spoof fingerprints exhibit different textural characteristics. These are based on structural, orientation, roughness, smoothness and regularity differences of diverse regions in a fingerprint image. Local binary pattern (LBP) histograms are used to capture these textural details.

Research paper thumbnail of Co-Occurrence Probabilities and Wavelet-Based Spoof Fingerprint Detection

International Journal of Image and Graphics, 2009

Perspiration phenomenon is very significant to detect the liveness of a finger. However, it requi... more Perspiration phenomenon is very significant to detect the liveness of a finger. However, it requires two consecutive fingerprints to notice perspiration, and therefore may not be suitable for real time authentications. Some other methods in the literature need extra hardware to detect liveness. To alleviate these problems, in this paper, to detect liveness a new texture-based method using only the first fingerprint is proposed. It is based on the observation that real and spoof fingerprints exhibit different texture characteristics. Textural measures based on gray level co-occurrence matrix (GLCM) are used to characterize fingerprint texture. This is based on structural, orientation, roughness, smoothness and regularity differences of diverse regions in a fingerprint image. Wavelet energy signature is also used to obtain texture details. Dimensionalities of feature sets are reduced by Sequential Forward Floating Selection (SFFS) method. GLCM texture features and wavelet energy signa...

Research paper thumbnail of Real Dual Tree Based Feature Variance for Face Recognition

Springer eBooks, 2012

In this paper, face recognition technique using real Dual Tree Discrete Wavelet Transform (DT-DWT... more In this paper, face recognition technique using real Dual Tree Discrete Wavelet Transform (DT-DWT) is proposed. This approach is based on local appearance feature extraction using directional multiresolution decomposition offered by real DT-DWT. It provides a local multiscale description of images with good directional selectivity, effective edge representation and invariance to shifts and in-plane rotations. The real DT-DWT is less redundant and computationally efficient. The fusion of local coefficients of detail subbands are used to extract the facial features using feature variance. The features are used for classification process using Mahalanobis distance. The technique is validated using 9 pose and 2 pose per person of ORL face dataset and 2 pose per person of YALE face dataset. The experimental results outperform traditional methods like PCA, LDA and DCT normalization.

Research paper thumbnail of Various Dimensions of Visual Cryptography

Handbook of Image-Based Security Techniques, 2018

Research paper thumbnail of Steganography

Handbook of Image-Based Security Techniques, 2018

Research paper thumbnail of Dual Watermarking

Research paper thumbnail of Robust Watermarking

Research paper thumbnail of Fragile Watermarking

Handbook of Image-Based Security Techniques, 2018

Research paper thumbnail of Fragile Watermark with Recovery Capabilities in Frequency Domain

Handbook of Image-Based Security Techniques, 2018

Research paper thumbnail of Hybrid Approaches for ImageBased Security Using VC, Watermarking Steganography

Handbook of Image-Based Security Techniques, 2018

Research paper thumbnail of Development of Visual Cryptography Approaches with Computationless Recovery of Secrets

Handbook of Image-Based Security Techniques, 2018

Research paper thumbnail of An Efficient Blind Fragile Watermarking Scheme for Tamper Localization

Proceedings of International Conference on Data Science and Applications, 2021

Research paper thumbnail of Visual Cryptography: Introduction

Research paper thumbnail of A Dual Watermarking Scheme for Ownership Verification and Pixel Level Authentication

Breaches of multimedia security are increasing day by day as advancement in technologies have tig... more Breaches of multimedia security are increasing day by day as advancement in technologies have tightly coupled the globe and promoted easy sharing of multimedia content in no loss of time. A dual watermarking scheme ascertaining the rightful ownership and integrity of images is proposed here. A gray scale logo used as copyright information of the owner is embedded imperceptibly into the singular values of the cover image in multiple locations. The multiplicity of embedding ensures extraction of embedded information even in worst tampered scenarios and hence, prove the rightful ownership. The proposed scheme also performed pixel wise authentication which fetched the advantage of accurate tamper localization in case of alterations. The visual quality of the watermarked image is maintained high as indicated by the high Peak-Signal-to-Noise-Ratio(PSNR) values. The robustness of the scheme is tested against comprehensive set of attacks and evaluated by various objective evaluation paramet...

Research paper thumbnail of XOR based continuous-tone multi secret sharing for store-and-forward telemedicine

Multimedia Tools and Applications, 2016

Traditional k out of n visual cryptography scheme has been proposed to encrypt single secret imag... more Traditional k out of n visual cryptography scheme has been proposed to encrypt single secret image into n shares where only k or more shares can decode the secret image. Many existing schemes on visual cryptography are restricted to consider only binary images as secret which are not appropriate for many important applications. Store-and-Forward telemedicine is one such application where medical images are transmitted from one site to another via electronic medium to analyze the patient's clinical health status. The main objective of Store-and-Forward telemedicine is to provide remote clinical services via two-way communication between the patient and the healthcare provider using electronic medical image, audio and video means. In this paper, a new XOR based Continuous-tone Multi Secret Sharing scheme suitable for store-and-forward telemedicine is proposed to securely transmit the medical images. It also eliminates basic security constraints of VC like pixel expansion in shares/recovered secret images, random pattern of shares, explicit codebook requirement, lossy recovery of secret and limitation on number of secret and shares. Proposed approach is n out of n multi secret sharing scheme which is able to transmit n secret images simultaneously. All secrets could be revealed only after some computations with all n shares and one master share. Master share has been created with the secret key at encoding phase and it can be regenerated at the time of decoding using same secret key. Here all shares are meaningful in continuous-tone which may provide confidentiality to medical images during transmission. Proposed approach not only preserves all basic characteristics Shivendra Shivani

Research paper thumbnail of VPVC: verifiable progressive visual cryptography

Pattern Analysis and Applications, 2016

In traditional k-out-of-n visual cryptography (VC), a secret image is visually decoded only if a ... more In traditional k-out-of-n visual cryptography (VC), a secret image is visually decoded only if a subset of k or more shares are stacked together else nothing will be revealed. Progressive visual cryptography (PVC) scheme differs from the traditional VC where clarity and contrast of the decoded secret image are increased progressively with the number of stacked shares. Shares are most sensible objects since they carry secret; hence, verifying the reliability and authenticity of all shares before decoding the secret image prevents a participant from intentionally or unintentionally providing invalid data. This paper proposes a novel verifiable progressive visual cryptography approach with additional embedding capacity in each share which is used for self-embedding authentication data, copyright information along with confidential payload. These embedded informations in a share can be retrieved and verified at the time of any conflict. Proposed approach also eliminates many unnecessary encryption constraints of VC like pixel expansion, noise-like shares, explicit requirement of codebook and restriction on number of participants. Experiments show that in spite of having various credentials of participants, embedded in shares, the contrast of the decoded secret image remains 50 % without reducing the level of secrecy. By experiments, it is also confirmed that proposed approach can effectively localize the tampered region of the share.

Research paper thumbnail of A Visual Cryptography based Watermarking Scheme Incorporating the Concepts of Homogeneity Analysis and Singular Value Decomposition

International Journal of Computer Applications, 2013

Research paper thumbnail of Progressive Visual Cryptography With Unexpanded Shares

IEEE Transactions on Circuits and Systems for Video Technology, 2011

Research paper thumbnail of Edge Preserved De-noising Method for Medical X-Ray Images Using Wavelet Packet Transformation

Emerging Research in Computing, Information, Communication and Applications, 2015

X-ray image is one of the prominent modality of medical imaging used in medical diagnosis. This m... more X-ray image is one of the prominent modality of medical imaging used in medical diagnosis. This may be corrupted with Gaussian noise due to thermal fluctuations during its acquisition. For reducing these noises a method is applied which combines the Anisotropic Diffusion filter with an edge preserved Wavelet Packet Transformation. Here the edges are detected in each sub-band using Sobel edge detection operator and preserved by excluding these edge coefficients during hard thresholding. This method has proposed a new technique to calculate a threshold value for each sub-band of Wavelet Packet. The quality metrics SNR, RMSE, SSIM, Precision, Accuracy and etc. are used to measure the performance of this method and shows that this approach is better as compared to other noise reduction methods like Adaptive Median Filter, simple Anisotropic Diffusion and simple Wavelet Packet Transformation.

Research paper thumbnail of Notice of Retraction: Greedy genetic algorithm to Bounded Knapsack Problem

Research paper thumbnail of Texture and Wavelet-Based Spoof Fingerprint Detection for Fingerprint Biometric Systems

2008 First International Conference on Emerging Trends in Engineering and Technology, 2008

This paper describes an image-based system to detect spoof fingerprint attacks in fingerprint bio... more This paper describes an image-based system to detect spoof fingerprint attacks in fingerprint biometric systems. It is based on the observation that, real and spoof fingerprints exhibit different textural characteristics. These are based on structural, orientation, roughness, smoothness and regularity differences of diverse regions in a fingerprint image. Local binary pattern (LBP) histograms are used to capture these textural details.

Research paper thumbnail of Co-Occurrence Probabilities and Wavelet-Based Spoof Fingerprint Detection

International Journal of Image and Graphics, 2009

Perspiration phenomenon is very significant to detect the liveness of a finger. However, it requi... more Perspiration phenomenon is very significant to detect the liveness of a finger. However, it requires two consecutive fingerprints to notice perspiration, and therefore may not be suitable for real time authentications. Some other methods in the literature need extra hardware to detect liveness. To alleviate these problems, in this paper, to detect liveness a new texture-based method using only the first fingerprint is proposed. It is based on the observation that real and spoof fingerprints exhibit different texture characteristics. Textural measures based on gray level co-occurrence matrix (GLCM) are used to characterize fingerprint texture. This is based on structural, orientation, roughness, smoothness and regularity differences of diverse regions in a fingerprint image. Wavelet energy signature is also used to obtain texture details. Dimensionalities of feature sets are reduced by Sequential Forward Floating Selection (SFFS) method. GLCM texture features and wavelet energy signa...

Research paper thumbnail of Real Dual Tree Based Feature Variance for Face Recognition

Springer eBooks, 2012

In this paper, face recognition technique using real Dual Tree Discrete Wavelet Transform (DT-DWT... more In this paper, face recognition technique using real Dual Tree Discrete Wavelet Transform (DT-DWT) is proposed. This approach is based on local appearance feature extraction using directional multiresolution decomposition offered by real DT-DWT. It provides a local multiscale description of images with good directional selectivity, effective edge representation and invariance to shifts and in-plane rotations. The real DT-DWT is less redundant and computationally efficient. The fusion of local coefficients of detail subbands are used to extract the facial features using feature variance. The features are used for classification process using Mahalanobis distance. The technique is validated using 9 pose and 2 pose per person of ORL face dataset and 2 pose per person of YALE face dataset. The experimental results outperform traditional methods like PCA, LDA and DCT normalization.

Research paper thumbnail of Various Dimensions of Visual Cryptography

Handbook of Image-Based Security Techniques, 2018

Research paper thumbnail of Steganography

Handbook of Image-Based Security Techniques, 2018

Research paper thumbnail of Dual Watermarking

Research paper thumbnail of Robust Watermarking

Research paper thumbnail of Fragile Watermarking

Handbook of Image-Based Security Techniques, 2018

Research paper thumbnail of Fragile Watermark with Recovery Capabilities in Frequency Domain

Handbook of Image-Based Security Techniques, 2018

Research paper thumbnail of Hybrid Approaches for ImageBased Security Using VC, Watermarking Steganography

Handbook of Image-Based Security Techniques, 2018

Research paper thumbnail of Development of Visual Cryptography Approaches with Computationless Recovery of Secrets

Handbook of Image-Based Security Techniques, 2018

Research paper thumbnail of An Efficient Blind Fragile Watermarking Scheme for Tamper Localization

Proceedings of International Conference on Data Science and Applications, 2021

Research paper thumbnail of Visual Cryptography: Introduction

Research paper thumbnail of A Dual Watermarking Scheme for Ownership Verification and Pixel Level Authentication

Breaches of multimedia security are increasing day by day as advancement in technologies have tig... more Breaches of multimedia security are increasing day by day as advancement in technologies have tightly coupled the globe and promoted easy sharing of multimedia content in no loss of time. A dual watermarking scheme ascertaining the rightful ownership and integrity of images is proposed here. A gray scale logo used as copyright information of the owner is embedded imperceptibly into the singular values of the cover image in multiple locations. The multiplicity of embedding ensures extraction of embedded information even in worst tampered scenarios and hence, prove the rightful ownership. The proposed scheme also performed pixel wise authentication which fetched the advantage of accurate tamper localization in case of alterations. The visual quality of the watermarked image is maintained high as indicated by the high Peak-Signal-to-Noise-Ratio(PSNR) values. The robustness of the scheme is tested against comprehensive set of attacks and evaluated by various objective evaluation paramet...

Research paper thumbnail of XOR based continuous-tone multi secret sharing for store-and-forward telemedicine

Multimedia Tools and Applications, 2016

Traditional k out of n visual cryptography scheme has been proposed to encrypt single secret imag... more Traditional k out of n visual cryptography scheme has been proposed to encrypt single secret image into n shares where only k or more shares can decode the secret image. Many existing schemes on visual cryptography are restricted to consider only binary images as secret which are not appropriate for many important applications. Store-and-Forward telemedicine is one such application where medical images are transmitted from one site to another via electronic medium to analyze the patient's clinical health status. The main objective of Store-and-Forward telemedicine is to provide remote clinical services via two-way communication between the patient and the healthcare provider using electronic medical image, audio and video means. In this paper, a new XOR based Continuous-tone Multi Secret Sharing scheme suitable for store-and-forward telemedicine is proposed to securely transmit the medical images. It also eliminates basic security constraints of VC like pixel expansion in shares/recovered secret images, random pattern of shares, explicit codebook requirement, lossy recovery of secret and limitation on number of secret and shares. Proposed approach is n out of n multi secret sharing scheme which is able to transmit n secret images simultaneously. All secrets could be revealed only after some computations with all n shares and one master share. Master share has been created with the secret key at encoding phase and it can be regenerated at the time of decoding using same secret key. Here all shares are meaningful in continuous-tone which may provide confidentiality to medical images during transmission. Proposed approach not only preserves all basic characteristics Shivendra Shivani

Research paper thumbnail of VPVC: verifiable progressive visual cryptography

Pattern Analysis and Applications, 2016

In traditional k-out-of-n visual cryptography (VC), a secret image is visually decoded only if a ... more In traditional k-out-of-n visual cryptography (VC), a secret image is visually decoded only if a subset of k or more shares are stacked together else nothing will be revealed. Progressive visual cryptography (PVC) scheme differs from the traditional VC where clarity and contrast of the decoded secret image are increased progressively with the number of stacked shares. Shares are most sensible objects since they carry secret; hence, verifying the reliability and authenticity of all shares before decoding the secret image prevents a participant from intentionally or unintentionally providing invalid data. This paper proposes a novel verifiable progressive visual cryptography approach with additional embedding capacity in each share which is used for self-embedding authentication data, copyright information along with confidential payload. These embedded informations in a share can be retrieved and verified at the time of any conflict. Proposed approach also eliminates many unnecessary encryption constraints of VC like pixel expansion, noise-like shares, explicit requirement of codebook and restriction on number of participants. Experiments show that in spite of having various credentials of participants, embedded in shares, the contrast of the decoded secret image remains 50 % without reducing the level of secrecy. By experiments, it is also confirmed that proposed approach can effectively localize the tampered region of the share.

Research paper thumbnail of A Visual Cryptography based Watermarking Scheme Incorporating the Concepts of Homogeneity Analysis and Singular Value Decomposition

International Journal of Computer Applications, 2013