scispace - formally typeset
Search or ask a question

Showing papers by "Amit Singh published in 2020"


Journal ArticleDOI
TL;DR: Experimental results demonstrate that the suggested watermarking technique archives high robustness against attacks in comparison to the other scheme for medical images, and verification its robustness for various attacks while maintaining imperceptibility, security and compression ratio.

160 citations


Journal ArticleDOI
23 Jun 2020
TL;DR: In the past decades, due to inflation of urbanized area and climate change, a large number of landslides have been reported as mentioned in this paper, which is caused by specific compositional slope movement.
Abstract: Landslide, one of the most critical natural hazards, is caused due to specific compositional slope movement In the past decades, due to inflation of urbanized area and climate change, a c

90 citations


Journal ArticleDOI
TL;DR: Experimental evaluation shows that using combination of NSCT, RDWT, SVD and chaotic encryption makes the approach robust, imperceptible, secure and suitable for medical applications.
Abstract: In this paper, a chaotic based secure medical image watermarking approach is proposed. The method is using non sub-sampled contourlet transform (NSCT), redundant discrete wavelet transform (RDWT) and singular value decomposition (SVD) to provide significant improvement in imperceptibility and robustness. Further, security of the approach is ensured by applying 2-D logistic map based chaotic encryption on watermarked medical image. In our approach, the cover image is initially divided into sub-images and NSCT is applied on the sub-image having maximum entropy. Subsequently, RDWT is applied to NSCT image and the singular vector of the RDWT coefficient is calculated. Similar procedure is followed for both watermark images. The singular value of both watermarks is embedded into the singular matrix of the cover. Experimental evaluation shows when the approach is subjected to attacks, using combination of NSCT, RDWT, SVD and chaotic encryption it makes the approach robust, imperceptible, secure and suitable for medical applications.

76 citations


Journal ArticleDOI
TL;DR: This article presents a detailed discussion of different prospects of digital image watermarking and performance comparisons of the discussed techniques are presented in tabular format.
Abstract: This article presents a detailed discussion of different prospects of digital image watermarking. This discussion of watermarking included: brief comparison of similar information security techniques, concept of watermark embedding and extraction process, watermark characteristics and applications, common types of watermarking techniques, major classification of watermarking attacks, brief summary of various secure watermarking techniques. Further, potential issues and some existing solutions are provided. Furthermore, the performance comparisons of the discussed techniques are presented in tabular format. Authors believe that this article contribution will provide as catalyst for potential researchers to implement efficient watermarking systems.

70 citations


Journal ArticleDOI
TL;DR: An automated early diabetic retinopathy detection scheme from color fundus images through improved segmentation strategies for optic disc and blood vessels and Radial basis function neural network is used for classification of the diseases.
Abstract: This paper presents an automated early diabetic retinopathy detection scheme from color fundus images through improved segmentation strategies for optic disc and blood vessels. The red lesions, microaneurysms and hemorrhages are the earliest signs of diabetic retinopathy. This paper essentially proposes improved techniques for microaneurysm as well as hemorrhages detection, which eventually contribute in the overall improvement in the early detection of diabetic retinopathy. The proposed method consists of five stages- pre-processing, detection of blood vessels, segmentation of optic disc, localization of fovea, feature extraction and classification. Mathematical morphology operation is used for pre-processing and blood vessel detection. Watershed transform is used for optic disc segmentation. The main contribution of this model is to propose an improved blood vessel and optic disc segmentation methods. Radial basis function neural network is used for classification of the diseases. The parameters of radial basis function neural network are trained by the features of microaneurysm and hemorrhages. The accuracy of the proposed algorithm is evaluated based on sensitivity and specificity, which are 87% and 93% respectively.

66 citations


Journal ArticleDOI
TL;DR: A compression-then-encryption-based dual watermarking to protect the EPR data for the healthcare system, which produces several significant features and offers better performance in terms of robustness and security.
Abstract: The smart healthcare system is an electronic patient records (EPR) sharing system, which significantly helps sharing of EPR data and provides appropriate medical assistance for the patients and a more suitable platform for the potential researchers. However, the security of EPR data is still a major issue in such systems. In this paper, we develop a compression-then-encryption-based dual watermarking to protect the EPR data for the healthcare system, which produces several significant features. Experiments conducted on a large set of medical data indicate the capability of our proposed method for smart healthcare. Finally, when compared with the existing technique, the proposed work offers better performance in terms of robustness and security.

57 citations


Journal ArticleDOI
TL;DR: Data hiding approaches have received much attention in a number of application areas, however, those approaches unable to solve many issues that necessary to be measured in future investigations.
Abstract: With the widespread growth of digital information and improved internet technologies, the demand for improved information security techniques has significantly increased due to privacy leakage, identity theft, illegal copying, and data distribution. Because of this, data hiding approaches have received much attention in several application areas. However, those approaches are unable to solve many issues that are necessary to measure in future investigations. This survey provides a comprehensive survey on data hiding techniques and their new trends for solving new challenges in real-world applications. The notable applications are telemedicine, 3D objects, mobile devices, cloud/distributed computing and data mining environments, chip and hardware protection, cyber physical systems, internet traffic, fusion of watermarking and encryption, joint compression and watermarking, biometric watermarking, watermarking at the physical layer, and many other perspectives. Further, the potential issues that existing approaches of data hiding face are identified. I believe that this survey will provide a valuable source of information for finding research directions for fledgling researchers and developers.

39 citations


Journal ArticleDOI
TL;DR: A method is proposed in which Non-local means (NLM) filter and wavelet packet based thresholding are processed and it was observed that performance of the proposed scheme is superior to the existing methods in terms of visual quality, Image Quality Index (IQI), PSNR and Entropy Difference (ED).
Abstract: Computed Tomography (CT) is one of the major tools to identify diagnose in medical science. The quality of CT images is dependent of X-ray amount. If X-ray dose is higher, the quality of CT image is better but it may generate bed impact to the patients. Low dose CT images are noisy due to some major reasons such as statistical uncertainty in all physical measurements. If noise can be reduced or removed from low dose CT images, then quality of low dose CT images can be improved without increasing dose. Hence in this paper, a method is proposed in which Non-local means (NLM) filter and wavelet packet based thresholding are processed. For better edge preservation and noise reduction, method noise concept is used. The results of proposed method is analyzed and also compared with some existing methods. From comparative result analysis, it was observed that performance of the proposed scheme is superior to the existing methods in terms of visual quality, Image Quality Index (IQI), PSNR and Entropy Difference (ED).

38 citations


Journal ArticleDOI
TL;DR: An improved watermarking algorithm using discrete wavelet transform, discrete cosine transforms and singular value decomposition is presented, which is imperceptible and robust against various form of attacks and found superior to other similar technique under consideration.
Abstract: This paper presents an improved watermarking algorithm using discrete wavelet transform (DWT), discrete cosine transforms (DCT) and singular value decomposition (SVD). Further, robustness and security of algorithm is enhanced by set partitioning in hierarchical tree (SPIHT) and Arnold transform, respectively. The experimental results evident that proposed method is imperceptible and robust against various form of attacks and found superior to other similar technique under consideration.

38 citations


Journal ArticleDOI
TL;DR: A multiple watermarking technique using combination of redundant discrete wavelet transforms (RDWT), non‐subsampled contourlet transform (NSCT), set partitioning in hierarchical tree (SPIHT), and singular value decomposition (SVD) is proposed to achieve high capacity, robustness, and imperceptibility.
Abstract: Image watermarking in wavelet domain is a challenging problem as it includes a proper selection of wavelet transforms as well as sub‐bands for accurate embedding and recovery of watermarks. However, selection of a suitable wavelet transform for multiple image watermarking is an area of great interest. Therefore, in this work, a multiple watermarking technique using combination of redundant discrete wavelet transforms (RDWT), non‐subsampled contourlet transform (NSCT), set partitioning in hierarchical tree (SPIHT), and singular value decomposition (SVD) is proposed. The proposed scheme is aimed to achieve high capacity, robustness, and imperceptibility. The security aspect of the proposed method is enhanced by using Arnold transform. Since RDWT and NSCT are both shift invariant in nature, therefore they are suitable for multiple image watermarking. Furthermore, the proposed method provides flexibility in selection of appropriate sub‐bands for watermark embedding and recovery. Experimental results and analysis reveals that the proposed technique gives maximum PSNR, NC, and SSIM value up to 40.97 dB, 1, and 0.9994, respectively. Furthermore, the performance estimation of our technique is found superior to previously reported techniques under consideration.

34 citations


Journal ArticleDOI
TL;DR: The pathophysiological interplay between ACE and ACE2 in the cardiopulmonary system, the modulation of these two proteins by SARS-CoV-2, and potential therapeutic avenues targeting ACE-Ang II andACE2-Ang (1–7) axes, that can be utilized against COVID-19 disease progression are analysed.

Journal ArticleDOI
22 Jul 2020-eLife
TL;DR: It is shown that Mtb upregulates one of the key epigenetic modulators, NAD+ dependent histone deacetylase Sirtuin 2 (SIRT2), which upon infection translocate to the nucleus and de acetylates histone H3K18, thus modulating the host transcriptome leading to enhanced macrophage activation.
Abstract: Mycobacterium tuberculosis (Mtb) employs plethora of mechanisms to hijack the host defence machinery for its successful survival, proliferation and persistence. Here, we show that Mtb upregulates one of the key epigenetic modulators, NAD+ dependent histone deacetylase Sirtuin 2 (SIRT2), which upon infection translocate to the nucleus and deacetylates histone H3K18, thus modulating the host transcriptome leading to enhanced macrophage activation. Furthermore, in Mtb specific T cells, SIRT2 deacetylates NFκB-p65 at K310 to modulate T helper cell differentiation. Pharmacological inhibition of SIRT2 restricts the intracellular growth of both drug-sensitive and resistant strains of Mtb and enhances the efficacy of front line anti-TB drug Isoniazid in the murine model of infection. SIRT2 inhibitor-treated mice display reduced bacillary load, decreased disease pathology and increased Mtb-specific protective immune responses. Overall, this study provides a link between Mtb infection, epigenetics and host immune response, which can be exploited to achieve therapeutic benefits.

Journal ArticleDOI
TL;DR: Experimental results indicate that the proposed technique offers high robustness and fulfills all watermarking needs for telehealth applications in terms of imperceptibility, robustness, capacity, and security.
Abstract: Maintaining electronic patient records is the primary role for the fruitful implementation of the telehealth services in urban areas to enhance the quality of healthcare. These records frequently shared in-between professionals and healthcare centers so as to develop efficient tool(s) for accurate diagnosis purpose. However, protection of these records is a challenging task in the current era. In this article, we develop a joint watermarking-encryption- error correcting code (ECC) technique for the purpose of securing patient records. The suggested method involves three major steps as follows: 1) watermarks generation and scrambling, 2) encryption of cover and generated watermark via Paillier cryptosystem, and 3) imperceptibly embedding and robustly recovery/extraction of the watermarks. Experimental results indicate that the proposed technique offers high robustness and fulfills all watermarking needs for telehealth applications in terms of imperceptibility, robustness, capacity, and security. Furthermore, the proposed method achieves better robustness against varying attacks, and outperforms former techniques.

Book ChapterDOI
01 Jan 2020
TL;DR: An efficient watermarking technique to enhance the performance of DWT-SVD-based approach that uses well-known error-correcting code (ECC) and chaotic encryption to reduce the channel noise distortion and improve the security of the technique.
Abstract: This paper presents an efficient watermarking technique to enhance the performance of DWT-SVD-based approach. The method uses well-known error-correcting code (ECC) and chaotic encryption to reduce the channel noise distortion and improve the security of the technique, respectively. In the proposed method, the cover image is transformed by DWT and the sub-bands are selected for embedding the watermarks. Subsequently, the selected sub-bands are further transformed by SVD. The more robust watermark “patient report” and less robust watermark “patient medical image” is embedded into singular values of the selected DWT sub-bands. The use of transform domain techniques along with hamming code ensures that the approach offers more robustness and reliability. Inclusion of chaos-based encryption carries twofold benefits such as obscuring the watermarked content and strengthening the overall security of the projected scheme. The proposed technique offers a significant value of peak signal-to-noise ratio (PSNR), normalized correlation (NC), bit error rate (BER), number of pixel change rate (NPCR), and unified average changing intensity (UCAI) in presence of major attacks. The performance comparisons of our technique with a similar approach show that the proposed technique is superior for nine considered attacks.

Journal ArticleDOI
03 Mar 2020-Mbio
TL;DR: Exosomes secreted by macrophages infected with M. tuberculosis, including drug-resistant clinical strains, reactivated HIV-1 by inducing oxidative stress, revealing new paradigms for understanding the redox and bioenergetics bases of HIV-M.
Abstract: The synergy between Mycobacterium tuberculosis and human immunodeficiency virus-1 (HIV-1) interferes with therapy and facilitates the pathogenesis of both human pathogens. Fundamental mechanisms by which M. tuberculosis exacerbates HIV-1 infection are not clear. Here, we show that exosomes secreted by macrophages infected with M. tuberculosis, including drug-resistant clinical strains, reactivated HIV-1 by inducing oxidative stress. Mechanistically, M. tuberculosis-specific exosomes realigned mitochondrial and nonmitochondrial oxygen consumption rates (OCR) and modulated the expression of host genes mediating oxidative stress response, inflammation, and HIV-1 transactivation. Proteomics analyses revealed the enrichment of several host factors (e.g., HIF-1α, galectins, and Hsp90) known to promote HIV-1 reactivation in M. tuberculosis-specific exosomes. Treatment with a known antioxidant—N-acetyl cysteine (NAC)—or with inhibitors of host factors—galectins and Hsp90—attenuated HIV-1 reactivation by M. tuberculosis-specific exosomes. Our findings uncover new paradigms for understanding the redox and bioenergetics bases of HIV-M. tuberculosis coinfection, which will enable the design of effective therapeutic strategies. IMPORTANCE Globally, individuals coinfected with the AIDS virus (HIV-1) and with M. tuberculosis (causative agent of tuberculosis [TB]) pose major obstacles in the clinical management of both diseases. At the heart of this issue is the apparent synergy between the two human pathogens. On the one hand, mechanisms induced by HIV-1 for reactivation of TB in AIDS patients are well characterized. On the other hand, while clinical findings clearly identified TB as a risk factor for HIV-1 reactivation and associated mortality, basic mechanisms by which M. tuberculosis exacerbates HIV-1 replication and infection remain poorly characterized. The significance of our research is in identifying the role of fundamental mechanisms such as redox and energy metabolism in catalyzing HIV-M. tuberculosis synergy. The quantification of redox and respiratory parameters affected by M. tuberculosis in stimulating HIV-1 will greatly enhance our understanding of HIV-M. tuberculosis coinfection, leading to a wider impact on the biomedical research community and creating new translational opportunities.

Journal ArticleDOI
TL;DR: This review discusses the critical formulation- and biological-related quality features that significantly influence the performance of nanoparticulate systems in vivo and the quality-by-design approach in the pharmaceutical manufacturing and its implementation in the nanomedicine.
Abstract: Nanomedicine is a rapidly emerging field with several breakthroughs in the therapeutic drug delivery application. The unique properties of the nanoscale delivery systems offer huge advantages to their payload such as solubilization, increased bioavailability, and improved pharmacokinetics with an overall goal of enhanced therapeutic index. Nanomedicine has the potential for integrating and enabling new therapeutic modalities. Several nanoparticle-based drug delivery systems have been granted approval for clinical use based on their outstanding clinical outcomes. Nanomedicine faces several challenges that hinder the realization of its full potential. In this review, we discuss the critical formulation- and biological-related quality features that significantly influence the performance of nanoparticulate systems in vivo. We also discuss the quality-by-design approach in the pharmaceutical manufacturing and its implementation in the nanomedicine. A deep understanding of these nanomedicine quality checkpoints and a systematic design that takes them into consideration will hopefully expedite the clinical translation process. Graphical abstract.

Journal ArticleDOI
TL;DR: A dual watermarking technique using discrete wavelet transform (DWT), singular value decomposition (SVD) and set partitioning in hierarchical tree (SPIHT) and an embedding approach that is superior to competing methods.
Abstract: This paper presents a dual watermarking technique using discrete wavelet transform (DWT), singular value decomposition (SVD) and set partitioning in hierarchical tree (SPIHT). The method uses second level DWT to transform the host image in to different frequency components. Next, we further transform the selected wavelet component via SVD. Before embedding, the logo watermark is secured via Arnold transform and signature watermark are encoded by hamming code. Finally, we embed both encoded watermarks into the transformed host image via an embedding approach. The watermarked image is further compress by SPIHT scheme along with the location key. With our scheme, maximum PSNR, NC and SSIM are obtained as 36.97 dB, 0.9965 and 0.9974, respectively. However best obtained BER is zero. Experimental results on various images demonstrate the importance of our scheme and superior to competing methods.

Journal ArticleDOI
12 Dec 2020-Sensors
TL;DR: A method for matching pre- and post-exercise ECG cycles based on time and frequency fusion normalization in consideration of morphological features and classifying users with high performance by an optimized system is proposed.
Abstract: Although biometrics systems using an electrocardiogram (ECG) have been actively researched, there is a characteristic that the morphological features of the ECG signal are measured differently depending on the measurement environment. In general, post-exercise ECG is not matched with the morphological features of the pre-exercise ECG because of the temporary tachycardia. This can degrade the user recognition performance. Although normalization studies have been conducted to match the post- and pre-exercise ECG, limitations related to the distortion of the P wave, QRS complexes, and T wave, which are morphological features, often arise. In this paper, we propose a method for matching pre- and post-exercise ECG cycles based on time and frequency fusion normalization in consideration of morphological features and classifying users with high performance by an optimized system. One cycle of post-exercise ECG is expanded by linear interpolation and filtered with an optimized frequency through the fusion normalization method. The fusion normalization method aims to match one post-exercise ECG cycle to one pre-exercise ECG cycle. The experimental results show that the average similarity between the pre- and post-exercise states improves by 25.6% after normalization, for 30 ECG cycles. Additionally, the normalization algorithm improves the maximum user recognition performance from 96.4 to 98%.

Journal ArticleDOI
TL;DR: The chemo-profiling of ethanolic extract of faba beans seeds was performed and explored as an α-glucosidase inhibitor to give an insight into the further development of the novel antidiabetic drug from the seeds of Faba beans.
Abstract: The chemo-profiling of ethanolic extract of faba beans seeds was performed and explored as an α-glucosidase inhibitor. The inhibition of α-glucosidase is one of the alternatives approach to control...

Journal ArticleDOI
TL;DR: A joint encryption-then-compression-based watermarking scheme for copyright protection and content verification in variety of applications and performance outcomes confirm better robustness and security of the method while preserving the image quality.
Abstract: This article discusses a joint encryption-then-compression-based watermarking scheme for copyright protection and content verification in variety of applications. In this scheme, redundant discrete wavelet transform is first performed to decompose the nonsubsampled contourlet transform host image, and then, the singular value decomposition is applied on transformed coefficients of the host image. Furthermore, same procedure is applied for both watermarks (image and PAN No.). The PAN number is encoded by the quick response (QR) code before hiding into the host image. Finally, 2D hyperchaotic encryption is used to encrypt the watermarked image to make our method more secure against attacks. After this, the encrypted image is then compressed via Huffman compression to reduce the size of the image at an acceptable quality of the reconstructed image. Furthermore, performance outcomes confirm better robustness and security of the method while preserving the image quality.

Journal ArticleDOI
31 May 2020
TL;DR: This inquiry proposes to fine‐tune the state of the art convolutional neural network (C.N.N.) architectures for multilabel scene classification to overcome the research gap in multi-object scene classification of satellite remote sensed images.
Abstract: Multilabel scene classification has emerged as a critical research area in the domain of remote sensing. Contemporary classification models primarily emphasis on a single object or multiob...

Journal ArticleDOI
TL;DR: The results reveal that global alteration of the host lysosomal system is a defining feature of Mtb-infected macrophages and suggest that this altered lysOSomal state protects host cell integrity and contributes to the containment of the pathogen.

Posted ContentDOI
02 Nov 2020-bioRxiv
TL;DR: Regulation of latent NF-κB dimers links noncanonical signaling to RelA-driven inflammatory pathologies and may provide for therapeutic targets.
Abstract: Aberrant inflammation associated with human ailments, including inflammatory bowel disease (IBD), is typically fuelled by the inordinate activity of RelA/NF-κB transcription factors. As such, the canonical NF-κB module mediates controlled nuclear activation of RelA dimers from the latent cytoplasmic complexes. What provokes pathological RelA activity in the colitogenic gut remains unclear. The noncanonical NF-κB pathway promotes immune organogenesis involving Nfkb2 gene products. Because NF-κB pathways are intertwined, we asked if noncanonical signaling aggravated inflammatory RelA activity. Our investigation revealed frequent engagement of the noncanonical pathway in human IBD. In a mouse model, an Nfkb2 function exacerbated gut inflammation by amplifying the epithelial RelA activity induced upon intestinal injury. Our mechanistic studies clarified that cell-autonomous Nfkb2 signaling supplemented latent NF-κB dimers leading to hyperactive canonical RelA response in the inflamed colon. In sum, regulation of latent NF-κB dimers links noncanonical signaling to RelA-driven inflammatory pathologies and may provide for therapeutic targets. In brief Noncanonical NF-κB signals in intestinal epithelial cells supplement latent RelA dimers that, in turn, aggravated canonical NF-κB response in the colitogenic gut exacerbating intestinal inflammation. Highlights Human IBD involves the frequent engagement of the noncanonical NF-κB pathway. Mice deficient in the noncanonical signal transducer Nfkb2 are resistant to experimental colitis. Noncanonical NF-κB signaling supplements latent RelA NF-κB dimers. Noncanonical NF-κB signaling amplifies canonical NF-κB response to TLR ligands.

Journal ArticleDOI
TL;DR: In this paper, the authors investigate the interrelationships among the Lean manufacturing (LM) adoption barriers in Indian SMEs and propose a Grey-DEMATEL-based LM barrier evaluation framework.
Abstract: This study aims to investigate the interrelationships among the Lean manufacturing (LM) adoption barriers in Indian SMEs. This issue has its own importance as LM has become the inescapable requirement for small- and medium-scale enterprises (SMEs) because of the increased concerns about quality, cost, delivery time and rapidly growing competition in the manufacturing sector and in India it is opposed by many factors/barriers. To act for the eradication of these barriers, we need to systematically analyze them.,Based on the available literature and consultation with the experts, the authors identified 16 LM barriers for Indian SMEs. The authors analyzed the interdependencies among the barriers and prioritized them using integrated Grey-decision-making trial and evaluation laboratory (grey-DEMATEL) approach.,The findings show that limited financial resources, fear in adopting new technology, lack of top management commitment and poor leadership quality are the most critical barriers for LM diffusion in Indian SMEs.,The present research is based on the experts’ inputs, which may be subject to individual biases. In developing countries, such as India, geographical influences are also possible, which are neglected in this study.,This study provides significant insights that can help SMEs to focus on critical cause group barriers to accelerate the LM penetration.,The authors have proposed a Grey-DEMATEL-based LM barrier evaluation framework. Here, the authors analyze the interrelationships among the barriers for LM and segregate them in cause and effect groups.

Book ChapterDOI
01 Jan 2020
TL;DR: A hybrid combination of the wavelet transforms have been discussed for single and multiple image watermarking, which will take advantage of the characteristics and NSCT, DCT and MSVD to build a robust water marking system in wavelet domain against signal processing and geometrical attacks.
Abstract: Multimedia security has become challenging due to large amount of content generation and its distribution over network. Copyright protection and content authentication are the major key factor that avoids illegal distribution of digital data. However, due to availability of high bandwidth network, copyright violation is very common and many copies of data can be illegally distributed over network. Thus, to ensure multimedia security, image watermarking methods have been introduced which is a kind of information hiding technique. Watermarking provides an effective way to ensure copyright protection and content authentication and can be implemented in spatial and transform domain. The use of wavelet transforms in watermarking increases the embedding capacity and enhances the imperceptibility of the watermarked image. Being motivated from the use of wavelet transforms in image watermarking, in this chapter, a hybrid combination of the wavelet transforms have been discussed for single and multiple image watermarking. The transforms, combined in this chapter, are nonsubsampled contourlet transform (NSCT), discrete cosine transform (DCT) and multiresolution singular value decomposition (MSVD). This hybrid combination will take advantage of the characteristics and NSCT, DCT and MSVD to build a robust watermarking system in wavelet domain against signal processing and geometrical attacks.

Proceedings ArticleDOI
01 Sep 2020
TL;DR: Experimental results indicate the proposed method offers high imperceptibility and robustness, and have superior overall performance.
Abstract: In order to improve the security of medical data, this paper uses a robust and secure dual watermarking technique in RDWT-SVD domain. Dual watermarking is achieved by embedding text watermark in medical watermark image using DWT, generating the final watermark. Before embedding, turbo code is used to encode the text watermark. Further, trade-off between imperceptibility and robustness is controlled in our scheme through firefly optimization. Experimental results indicate the proposed method offers high imperceptibility and robustness, and have superior overall performance.

Journal ArticleDOI
TL;DR: An algorithm for sharing k secret images to n participants in such a way that each participant gets a single share image by encoding all k images using XOR operations, which is computationally lightweight and lossless due to XOR operation only.
Abstract: The purpose of this paper is to develop an algorithm for sharing k secret images to n participants in such a way that each participant gets a single share image by encoding all k images. Any qualified subgroup of t : t ≤ n of those n participants can reconstruct the kith secret image only by combining their share images if they are qualified to reconstruct the kith secret image. Most of the existing literature solves this problem for the cases where t = 2 or t = n making it a very restrictive scheme. In this article, we aim to design a multi-secret image sharing scheme based on XOR operation where t is not restricted to be 2 or n. We have used n random matrices of the same size as the secret image size as private share to generate r (where r is the number of qualified subgroups) share images as public share using XOR operations. The proposed scheme is computationally lightweight and lossless due to XOR operation only. It does not involve any pixel expansion. The experimental results with a very low correlation coefficient between share and secret images confirm that share image does not reveal anything about secret image. The scheme is secure against differential attack as a higher value of Number of Changing Pixel rate (NPCR) confirms that. The current proposal is based on a general access structure, and hence any secret image can be reconstructed by a qualified group of t or more shares where t need not be 2 or n only.

Journal ArticleDOI
TL;DR: An improved optimization algorithm named grouping-based many-objective evolutionary algorithm (GMEA) is proposed, and the experimental results demonstrate that GMEA performs better than the other methods in both visualization results and hypervolume (HV) indicators.
Abstract: Mobile Edge Computing (MEC) and fog computing are the key technologies in fifth generation (5 G) networks. In an MEC system, the data of terminal devices can be processed at the edge nodes also known as fog nodes, which can reduce the data transmission from the terminal devices to the cloud, thus reducing the latency and pressure of network traffic. Due to the huge amount of users’ data, a large number of edge nodes need to be deployed. Therefore, we study how to optimally deploy the edge devices on 5G-based small cells (SC) networks based on many-objective evolutionary algorithm (MaOEA). Our goal is to optimize the deployment of edge devices to maximize service quality and reliability, while minimizing cost and energy consumption. This is an NP-hard problem with many objectives. To solve this problem, we propose an improved optimization algorithm named grouping-based many-objective evolutionary algorithm (GMEA). We also compare the performance of GMEA with the state-of-the-art algorithms, and the experimental results demonstrate that GMEA performs better than the other methods in both visualization results and hypervolume (HV) indicators.

Journal ArticleDOI
TL;DR: A novel method for automated detection of retinal detachment from ocular ultrasound image using digital image processing and computational techniques and mathematical analysis of detached area contour detected within the ocular globe is presented.
Abstract: This paper presents a novel method for automated detection of retinal detachment from ocular ultrasound image using digital image processing and computational techniques. Retinal detachment (RD) is an ocular emergency in which retina gets detached from the tissues lying underneath it and often requires immediate intervention to prevent rapid, irreversible vision loss. Direct fundoscopy and visual field testing are most common methods for the detection of RD. These methods are difficult to perform and they do not completely rule out retinal detachment. Generally, Ophthalmologists use ocular ultrasound to enhance their clinical acumen in detecting RD. Sometimes it is difficult to extract diagnostic features from ultrasound (USG) images due to its poor quality. Also, noise present in the image would cause misinterpretation during visual inspection;this demands development of intelligent and automated techniques for detection of retinal detachment. Further, the paper proposes a novel frame work for accurate and automatic retinal detachment using image processing techniques and mathematical analysis of detached area contour detected within the ocular globe. Furthermore, the estimation of diagnostic parameters, indicative of retinal detachment is also computed. Based on the mathematical analysis, three such parameters, percentage area of detached retina (PADR) compared to the ocular globe, angular width of detachment (α) and maximum radial distance of detachment to choroid layer beneath it (β), are calculated. These estimated parameters are very useful in determining the exact location and extent of retinal detachment. Results obtained through the proposed retinal detachment detection scheme are validated by the radiologist.

Journal ArticleDOI
TL;DR: Molecular docking and molecular dynamics simulation studies gave an insight into the predicted residues that hold favorable polyphenolic-specific interactions and offered the way to design the analogs of acetone seed extract with reduced toxicity.
Abstract: Hypoglycemic potential and xanthine-oxidase (XO) activity of polyphenols from faba bean were evaluated in the 3T3-L1 cell line, and an interaction study in silico with XO was performed with considerable bioactive components of acetone extract of faba beans. The protonated and fragmented behavior of acetone seed extract revealed the presence of gallic acid (MS/MS, m/z 169) and catechin (MSn, m/z 288.3). Flow cytometry study explained the effect of hydrogen peroxide (H2O2) on cell line as cell death was increased from 9.72 to 41.66% as compared to the control (without H2O2). The atomic force microscopy (AFM), scanning electron microscopy and reactive oxygen species measurement also confirmed the protective effect of polyphenols in the 3T3-L1 cell lines. Oxidative stress through propidium iodide and 4',6-diamidino-2-phenylindole staining demonstrated that the apoptotic ratio was 0.35 ± 2.62 (P < 0.05) and 30 ± 2.54% in H2O2-treated cells, respectively, as compared to control. The observations of flow cytometry and confocal microscopy marked the effect of seed extract (0.86 ± 0.031, 3.52 ± 0.52, P < 0.05), on glucose uptake in cells through the better relative fluorescence intensity than that of the control. Moreover, molecular docking and molecular dynamics simulation studies gave an insight into the predicted residues that hold favorable polyphenolic-specific interactions. The probable binding modes of the gallic acid and catechin from this study may extend the knowledge of the XO-polyphenol interactions and offered the way to design the analogs of acetone seed extract with reduced toxicity.