Theoretic Study of Image Fusion Techniques � A Survey
Review Paper | Journal Paper
Vol.2 , Issue.6 , pp.43-49, Jun-2014
Abstract
Image fusion is the hottest research subtopic of image processing. Fusion is basically extraction of best inputs and conveying to the output. For making an image, which is more suitable for segmentation, extraction of features, object recognition and human visual system, Image fusion is frequently used. It combines complimentary information from different image of the same scene in a single image. Image fusion can be performed at four different process levels which are signal, pixel, feature and decision level according to the stage at which levels fusion takes place. This paper provides survey of some of the various existing techniques applied for image fusion and comparative study of all techniques concludes better approach for its future research. In this paper we also try to find it out what are things that were neglected by the researchers, so our main objective was to find out the gaps in existing literature.
Key-Words / Index Term
BWT, DCT, DWT, DT-CWT, Image fusion , PCA
References
[1].P.J. Burt, ―The pyramid as a structure for efficient computation, in: A. Rosenfeld (Ed.), Multiresolution Image Processing and Analysis‖, Springer-Verlag, Berlin, 1984, pp. 6�35.
[2].E.H. Adelson, ―Depth-of-Focus Imaging Process Method, United States‖ Patent 4,661,986 (1987).
[3].R.D. Lillquist, ―Composite visible/thermal-infrared imaging apparatus. United States‖ Patent 4,751,571 (1988).
[4].N. Nandhakumar, J.K. Aggarwal, ―Integrated analysis of thermal and visual images for scene interpretation‖, IEEE Transactions on Pattern Analysis and Machine Intelligence 10 (4) (1988) 469�481.
[5].A. Toet, ―Image fusion by a ratio of low-pass pyramid, Pattern Recognition Letters‖ (1989) 245�253.
[6].S.K. Rogers, C.W. Tong, M. Kabrisky, J.P. Mills, ―Multisensor fusion of ladar and passive infrared imagery for target segmentation‖, Optical Engineering 28 (8) (1989) 881�886.
[7].L.J. Chipman, Y.M. Orr, L.N. Graham, ―Wavelets and image fusion‖, in: Proceedings of the International Conference on Image Processing, Washington, USA, 1995, pp. 248�251
[8] .Koren, I., Laine, A., Taylor, F.,‖ Image fusion using steerable dyadic wavelet‖. In: Proceedings of the Internatinonal Conference. on Image Processing, Washington, USA, 1995. pp. 232�235.
[9].Neural processing of targets - Waxman, Seibert, et al. � 1995
[10].Li, Hui, B. S. Manjunath, and Sanjit K. Mitra. "Multisensor image fusion using the wavelet transforms." Graphical
models and image processing , vol. 3,pp. 235-245. IEEE, 1997.
[11].O.Rockinger. �Image sequence fusions using a shift-invariant wavelet transform.� In image processing , 1997 International Conference on, vol. 3, pp. 288-291. IEEE, 1997.
[12].Y-T. Kim. �Contrast enhancement using brightness preserving bihistogram equalisation.� In Consumer Electronics, 1997 International Conference on, vol. 43, pp. 1-8., IEEE, 1997
[13].Wang, Qiang, and Yi Shen. "The effects of fusion structures on image fusion performances." In Instrumentation and Measurement Technology Conference, 2004. IMTC 04. Proceedings of the 21st IEEE, vol. 1, pp. 468-471. IEEE, 2004.
[14].He, D-C., Li Wang, and Massalabi Amani. "A new technique for multi-resolution image fusion." In Geoscience and Remote Sensing Symposium, 2004. IGARSS`04. Proceedings. 2004 IEEE International, vol. 7, pp. 4901-4904.IEEE, 2004.
[15].T.Zaveri, M.Zaveri, V.Shah and N.Patel. �A Novel Region Based Multifocus Image Fusion Method.� In Digital Image Processing, 2009 International Conference on, pp. 50-54. IEEE, 2009
[16].Anjali Malviya, S. G. Bhirud .‖Image Fusion of Digital Images‖ International Journal of Recent Trends in Engineering, Vol 2, No. 3, November 2009
[17].Susmitha Vekkot and Pancham Shukla, A Novel Architecture for Wavelet based Image Fusion, Journal of World Academy of Science, Engineering and Technology, 2009. pp. 32-33.
[18]. Pei, Yijian, Huayu Zhou, Jiang Yu, and Guanghui Cai. "The improved wavelet transforms based image fusion algorithm and the quality assessment." In Image and Signal Processing (CISP), 2010 3rd International Congress on,
vol. 1, pp. 219-223. IEEE, 2010.
[19].Haghighat, Mohammad Bagher Akbari, Ali Aghagolzadeh, and Hadi Seyedarabi. "Real-time fusion of multi-focus images for visual sensor networks." In Machine Vision and Image Processing (MVIP), 2010 6th Iranian, pp. 1-6. IEEE, 2010.
[20].Lavanya, A., K. Vani, S. Sanjeevi, and R. S. Kumar, "Image fusion of the multi-sensor lunar image data using wavelet combined transformation." In Recent Trends in Information Technology (ICRTIT), 2011 International
Conference on, pp. 920-925. IEEE, 3-5 June, 2011
[21].Ghimire Deepak and Joonwhoan Lee. �Nonlinear Transfer Function-Based Local Approach for Color Image Enhancement.� In Consumer Electronics, 2011 International Conference on, pp. 858-865 . IEEE,2011
[22].Ren, Haozheng, Yihua Lan, and Yong Zhang. "Research of multi-focus image fusion based on M-band multi-wavelet transformation." In Advanced Computational Intelligence (IWACI), 2011 Fourth International Workshop on, pp. 395-398. IEEE, 2011
[23].Xing Su-xiaLian Xiao-fengChen Tian-hua, Xiao Hongbing.�Image Fusion Method Based on NSCT and Robustness Analysis.� In International Conference on Computer Distributed Control and Intelligent Environmental Monitoring, 2011,pp. 346-349. IEEE, 2011.
[24].Mohamed, M. A., and B. M. El-Den. "Implementation of image fusion techniques for multi-focus images using FPGA." In Radio Science Conference (NRSC), 2011 28th National, pp. 1-11. IEEE, 2011.
[25].Patil, Ujwala, and Uma Mudengudi. "Image fusion using hierarchical PCA." In image Information Processing (ICIIP), 2011 International Conference on, pp. 1-6. IEEE, 2011.
[26].A. Soma Sekhar, Dr.M.N.Giri Prasad. �A Novel Approach Of Image Fusion On MR And CT Images Using Wavelet Transforms.� IEEE Trans. on Image Proc., pp. 172-176. IEEE, 2011.
[27].M .Chandana,S. Amutha, and Naveen Kumar, ― A Hybrid Multi-focus Medical Image Fusion Based on Wavelet Transform‖. International Journal of Research and Reviews in Computer Science (IJRRCS) Vol. 2, No. 4, August 2011, ISSN: 2079-2557
[28].Chetan K. Solanki Narendra M. Patel, ―Pixel based and Wavelet based Image fusion Methods with their Comparative Study‖. National ConferenceonRecentTrendsinEngineeringandTechnology.13-14May2011
[29].KiranParmar, Rahul Kher. �A Comparative Analysis of Multimodality Medical Image Fusion Methods.� In Sixth Asia Modelling Symposium, 2012International Conference on, pp. 93-97. IEEE,2012.
[30].Aribi, Walid, Ali Khalfallah, Med Salim Bouhlel, and Noomene Elkadri. "Evaluation of image fusion techniques in nuclear medicine." In Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), 2012 6th International Conference on, pp. 875-880. IEEE, 2012.
[31].Sruthy, S., Latha Parameswaran, and Ajeesh P. Sasi. "Image Fusion Technique using DT-CWT." In Automation, Computing, Communication, Control and Compressed Sensing (iMac4s), 2013 International Conference on, pp. 160-164. IEEE, 2013.
[32].Desale, Rajenda Pandit, and Sarita V. Verma. �Study and analysis of PCA, DCT & DWT based image fusion techniques." In Signal Processing Image Processing & Pattern Recognition (ICSIPR), 2013 International Conference on, pp. 66-69. IEEE, 2013.
[33].Shih-Gu Huang, �Wavelet for Image Fusion�.
[34].Om Prakash, RichaSrivastava, AshishKhare. �Biorthogonal Wavelet Transform Based Image Fusion Using Absolute Maximum Fusion Rule.� In Image processing, 2013 International Conference on Information and Communication Technologies, pp. 577-582.IEEE, 2013.
[35].Y.AsnathVictyPhamila, R.Amutha. �Discrete Cosine Transform based fusion of multi-focus images for visual sensor networks.� In Signal Processing, 2013 International Conference on, pp.161-170.IEEE, 2013.
[36] V.K Mishra, Shobhit kumar, �Design and implementation of image fusion system� In International journal of computer science and engineering . Vol.2, Issue-3, pp (182-186) March 2014, E-ISSN: 2347-269
Citation
A. Maurya, R. Tiwari, "Theoretic Study of Image Fusion Techniques � A Survey," International Journal of Computer Sciences and Engineering, Vol.2, Issue.6, pp.43-49, 2014.
Enhanced Steganography using K-MATRIX
Research Paper | Journal Paper
Vol.2 , Issue.6 , pp.50-53, Jun-2014
Abstract
Information hiding for security in data transmission is in the air as long as the conversion of data before sending it. Steganography is the art and the science of hiding information or data by embedding within other. Steganography works by replacing bits of useless or unused data in various files (graphics, sound, text or even floppy disks) through LSB technique and this hidden data can be plain text, cipher text or images. But this technique usually takes more time if encryption is done first for improving its security. The aim of this paper is to hide the data after encrypting it through new approach called K-Matrix, which will provide less time complexity than the existing technique for cryptography.
Key-Words / Index Term
Image Steganography, K-Matrix, Cryptography, LSB, Enhanced Least Significant Bit, Information hiding
References
[1] Rupinder Kaur and Deepak Aggarwal�Analysis of Secure Text Embedding using Steganography� International Journal of Latest Trends in Engineering and Technology (IJLTET) Vol. 2, January 2013.
[2] N.F. Johnson, S. Jajodia, Exploring steganography: seeing the unseen, IEEE Computer 31 (2) (1998) 26�34.
[3] Bhavana. S and K. L. Sudha �Text Steganography using LSB Insertion Method along with chaos thoery�
[4] Samir Kumar Bandyopadhyay, and Tai-hoon Kim �Text Steganography: A Novel Approach�, International Journal of Advanced Science and Technology, Vol. 3, February, 2009.
[5] Mrs. Kavitha, Kavita Kadam, Ashwini Koshti, Priya Steganography Using Least Signicant Bit Algorithm �International Journal of Engineering Research and Applications (IJERA)� ISSN: 2248-9622, Vol. 2, Issue 3, May-Jun 2012.
[6] M. Pavani1, S. Naganjaneyulu2, C. Nagaraju �A Survey on LSB Based Steganography Methods�International Journal Of Engineering And Computer Science, Volume 2 Issue 8 August, 2013.
[7] Shailender Gupta , Ankur Goyal, Bharat Bhushan �Information Hiding Using Least Significant Bit Steganography and Cryptography� I.J.Modern Education and Computer Science, Published Online June 2012 in MECS.
Citation
K.K. ARORA, G. GANDHI, "Enhanced Steganography using K-MATRIX," International Journal of Computer Sciences and Engineering, Vol.2, Issue.6, pp.50-53, 2014.
m-Privacy Preserving Data Analysis And Data Publising
Research Paper | Journal Paper
Vol.2 , Issue.6 , pp.54-58, Jun-2014
Abstract
Combining and analyzing data collected at multiple administrative locations is critical for a wide variety of applications, such as detecting malicious attacks or computing an accurate estimate of the popularity of Web sites. However, legitimate concerns about privacy often inhibit participation in collaborative data analysis. In this paper, we design, implement, and evaluate a practical solution for privacy-preserving data analysis and data publishing among a large number of participants. There is an increasing need for sharing data that contain personal information from distributed databases. For example, in the healthcare domain, a national agenda is to develop the Nationwide Health Information Network (NHIN) to share information among hospitals and other providers, and support appropriate use of health information beyond direct patient care with privacy protection. Privacy preserving data analysis and data publishing has received considerable attention in recent years as promising approaches for sharing data while preserving individual privacy. When the data are distributed among multiple data providers or data owners, two main settings are used for anonymization. One approach is for each provider to anonymize the data independently (anonymize-and-aggregate), which results in potential loss of integrated data utility.
Key-Words / Index Term
m-Privacy, k-anonymity, l-diversity, Database Management, Heuristic algorithms, Distributed Data Publising, Pruning Strategies
References
[1]. C. Dwork, �Differential privacy: a survey of results,� in Proc. of the 5th Intl. Conf. on Theory and Applications of Models of Computation, 2008.
[2]. B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu, �Privacy-preserving data publishing: A survey of recent developments,� ACM Comput. Surv., vol. 42, June 2010.
[3]. C. Dwork, �A firm foundation for private data analysis,� Commun. ACM,vol. 54, January 2011.
[4]. N. Mohammed, B. C. M. Fung, P. C. K. Hung, and C. Lee, �Centralized and distributed anonymization for high-dimensional healthcare data,� ACM Transactions on Knowledge Discovery from Data (TKDD), vol. 4,October 2010.
[5]. W. Jiang and C. Clifton, �Privacy-preserving distributed k-anonymity,� in Data and Applications Security XIX, ser. Lecture Notes in Computer Science, 2005.
[6]. W. Jiang and C. Clifton, �A secure distributed framework for achieving k-anonymity,� VLDB J., vol. 15, 2006.
[7]. O. Goldreich, Foundations of Cryptography: Volume 2, Basic Applications. Cambridge University Press, 2004.
[8]. Y. Lindell and B. Pinkas, �Secure multiparty computation for privacypreserving data mining,� The Journal of Privacy and Confidentiality,vol. 1, 2009.
[9]. A. Machanavajjhala, J. Gehrke, D. Kifer, and M. Venkitasubramaniam, �l-diversity: Privacy beyond k-anonymity,� in ICDE, 2006.
[10]. P. Samarati, �Protecting respondents� identities in microdata release,� IEEE T. Knowl. Data En., vol. 13, 2001.
[11]. L. Sweeney, �k-anonymity: a model for protecting privacy,� Int. J.Uncertain. Fuzz., vol. 10, 2002.
[12]. N. Li and T. Li, �t-closeness: Privacy beyond k-anonymity and ldiversity,� in In Proc. of IEEE 23rd Intl. Conf. on Data Engineering (ICDE), 2007.
[13]. R. Burke, B. Mobasher, R. Zabicki, and R. Bhaumik, �Identifying attack models for secure recommendation,� in In Beyond Personalization: A Workshop on the Next Generation of Recommender Systems, 2005.
[14]. D. Kifer, �Attacks on privacy and definetti�s theorem,� in Proc. of the 35th SIGMOD Intl. Conf. on Management of Data, 2009.
[15]. D. Kifer and A. Machanavajjhala, �No free lunch in data privacy,� in Proc. of the 2011 Intl. Conf. on Management of Data.
[16]. K. Lefevre, D. J. Dewitt, and R. Ramakrishnan, �Mondrian multidimensional k-anonymity,� in ICDE, 2006.
[17]. G. Cormode, D. Srivastava, N. Li, and T. Li, �Minimizing minimality and maximizing utility: analyzing method-based attacks on anonymized data,� Proc. VLDB Endow., vol. 3, Sept. 2010.
[18]. Y. Tao, X. Xiao, J. Li, and D. Zhang, �On anti-corruption privacy preserving publication,� in Proc. of the 2008 IEEE 24th Intl. Conf. on Data Engineering, 2008.
[19]. L. Sweeney, �Datafly: A system for providing anonymity in medical data,� in Proc. of the IFIP TC11 WG11.3 Eleventh Intl. Conf. on Database Security XI: Status and Prospects, 1998.
Citation
S. Rathod, B.J. Doddegowda , "m-Privacy Preserving Data Analysis And Data Publising," International Journal of Computer Sciences and Engineering, Vol.2, Issue.6, pp.54-58, 2014.