scispace - formally typeset
Search or ask a question
Author

Pooja Pathak

Bio: Pooja Pathak is an academic researcher from GLA University. The author has contributed to research in topics: Digital watermarking & Bearing (mechanical). The author has an hindex of 4, co-authored 30 publications receiving 74 citations. Previous affiliations of Pooja Pathak include Grant Medical College and Sir Jamshedjee Jeejeebhoy Group of Hospitals.

Papers
More filters
Journal ArticleDOI
TL;DR: A rare case of unilateral ROCM in a diabetic patient where central retinal artery occlusion was the first manifestation of the disease, and the left eye remained blind following the CRAO.
Abstract: Rhino-orbital-cerebral mucormycosis (ROCM) is a rare but devastating fungal infection caused by filamentous fungi of the family Mucoraceae. We report a rare case of unilateral ROCM in a diabetic patient where central retinal artery occlusion (CRAO) was the first manifestation of the disease. Magnetic resonance imaging scan revealed orbital and intracranial spread of the disease. Definitive diagnosis was established by culture of the biopsy specimen which showed Rhizopus oryzae on Sabouraud's dextrose agar. The patient was successfully treated with extensive debridement of sinuses and intravenous liposomal amphotericin B; however, the left eye remained blind following the CRAO.

23 citations

Proceedings Article
11 Mar 2015
TL;DR: In this work, watermarking has been done using LSB technique, DCT transform and DWT transform, and parameters are compared for various noises like Gaussian noise, Poisson noise, Salt and Pepper noise and Speckle noise.
Abstract: In one's day to day life; internet is growing and became an important part. Digital content can easily be downloaded, copied or edited. Digital content can be secured by various ways. Digital Watermarking is one of the methods for the protection of Digital Content. Digital Watermarking is a method by which data can be secured by hiding data in any image which can work as a carrier image. The carrier image is also known as cover image. Watermarking is an interactive method to protect and identify the digital data. It permits various types of watermarks to be hidden in digital data e.g. image, audio and video. In this work, watermarking has been done using LSB technique, DCT transform and DWT transform. These techniques are compared on the basis of peak signal to noise ratio (PSNR) and normalized correlation (NC). Parameters are compared for various noises like Gaussian noise, Poisson noise, Salt and Pepper noise and Speckle noise.

20 citations

Journal ArticleDOI
TL;DR: In patients with ACS undergoing PCI, CHA2DS2-VASc score can be used as a novel, simple, and a sensitive diagnostic tool for the prediction of contrast-induced nephropathy (CIN).
Abstract: Background CHA2DS2-VASc score, used for atrial fibrillation to assess the risk of embolic complications, have shown to predict adverse clinical outcomes in acute coronary syndrome (ACS), irrespective of atrial fibrillation. This study envisaged to assess the predictive role of CHA2DS2-VASc score for contrast-induced nephropathy (CIN) in patients with ACS undergoing percutaneous coronary intervention (PCI). Methods A total of 300 consecutive patients with ACS undergoing PCI were enrolled in this study. CHA2DS2-VASc score was calculated for each patient. These patients were divided into two groups as Group 1 (with CIN) and Group 2 (without CIN). CIN was defined as increase in serum creatinine level ≥0.5 mg/dL or ≥25% increase from baseline within 48 h after PCI. After receiver operating characteristic curve analysis, the study population was again classified into two groups: CHA2DS2-VASc score ≤3 group (Group A) and score ≥4 group (Group B). Results CIN was reported in 41 patients (13.6%). Patients with CIN had a higher frequency of hypertension, diabetes mellitus, and had a lower left ventricular ejection fraction and baseline estimated glomerular filtration rate. Receiver operating characteristic curve analysis showed good predictive value of CHA2DS2-VASc score for CIN (area under the curve 0.81, 95% CI 0.73–0.90). Patients with a CHA2DS2-VASc score of ≥4 had a higher frequency of CIN as compared with patients with score ≤3 (56.8% vs 4.8%; p = 0.0001) with multivariate analysis demonstrating CHA2DS2-VASc score of ≥4 to be an independent predictor of CIN. Conclusion In patients with ACS undergoing PCI, CHA2DS2-VASc score can be used as a novel, simple, and a sensitive diagnostic tool for the prediction of CIN.

10 citations

Proceedings ArticleDOI
14 Nov 2014
TL;DR: This paper presents and compares the LSBW method using different bit positions and evaluates parameters on the basis of various parameters like Mean Square Error, Peak Signal to Noise Ratio and Normalized Cross Correlation for various attacks.
Abstract: Watermarking is a method to protect the data and to authenticate the digital content. Watermarking is required due to the emergence of usage of internet in one's day to day life. As the usage of digital content is growing rapidly, there are many instances where data is insecure. Watermarking is a process to hide data for authorization purpose. Watermarking is the best way to secure the digital content. Watermarking can be done by various methods. Least Significant Bit Watermarking (LSBW) method is one of them. In this method, the pixel values of the image are converted in to binary and the information is concealed in the bits of the pixel values. This paper presents and compares the LSBW method using different bit positions. Comparison for these bit positions is done on the basis of various parameters like Mean Square Error, Peak Signal to Noise Ratio and Normalized Cross Correlation. These parameters are evaluated for various attacks like Gaussian Noise, Poisson Noise, Salt a Pepper Noise and Speckle Noise.

9 citations

Proceedings ArticleDOI
01 Feb 2020
TL;DR: The aim of this work is to reduce the ill effects of energy consumption of the current lighting system, and find a method to save power using microcontroller and sensors which turn on/off street lights automatically.
Abstract: Public lighting in streets, city centers, squares and other public places etc. can account about 30% of the urban energy consumption. We intend to design an efficient energy saving mechanism using microcontroller and sensors which turn on/off street lights automatically. The aim of this work is to reduce the ill effects of energy consumption of the current lighting system, and find a method to save power. We use distance sensors to switch on the light when the object is sensed in a nearby area otherwise it is kept off. Implementation reveals the prototype works with accuracy and if implemented on a large scale, it will prove to be very useful. Additionally, a person can switch on/off light using his Bluetooth on mobile phone. Also, an IOT enabled DHT-11 sensor kept over light pole will raise an alarm in case of fire or accidents.

8 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: In this article, a case of post COVID-19 Sino-orbital Mucormycosis infection caused by Rhizopus oryzae and its management was reported.

107 citations

Journal ArticleDOI
Chong Yu1
03 Apr 2020
TL;DR: This paper proposes the novel end-to-end framework to extend the generative adversarial network application to data hiding area and shows compelling performance and advantages over the current state-of-the-art methods in data hiding applications.
Abstract: Recently, the generative adversarial network is the hotspot in research and industrial areas. Its application on data generation is the most common usage. In this paper, we propose the novel end-to-end framework to extend its application to data hiding area. The discriminative model simulates the detection process, which can help us understand the sensitivity of the cover image to semantic changes. The generative model is to generate the target image which is aligned with the original cover image. An attention model is introduced to generate the attention mask. This mask can help to generate a better target image without perturbation of the spotlight. The introduction of cycle discriminative model and inconsistent loss can help to enhance the quality of the generated target image in the iterative training process. The training dataset is mixed with intact images and attacked images. The mix training process can further improve robustness. Through the qualitative, quantitative experiments and analysis, this novel framework shows compelling performance and advantages over the current state-of-the-art methods in data hiding applications.

50 citations

Journal ArticleDOI
TL;DR: From the experimental results, it is shown that this invisible hybrid watermarking approach is robust against—rotation, JPEG compression, salt and pepper noise, Gaussian noise, speckle noise and Poisson noise.
Abstract: Digital image watermarking is a technique to protect copyright of the image owner in the world of digital communication, and robustness is the major property to be addressed effectively. We propose an invisible hybrid watermarking scheme which is composed of blind and non-blind watermarking techniques. First, blind scheme is used as inner watermarking scheme and then non-blind watermarking scheme as outer watermarking scheme. A secret binary image is taken as a watermark and is embedded in an inner cover image using discrete wavelet transformation (DWT) with the help of the blind watermarking scheme in association with predefined binary digit sequence block and gain factor $${\varvec{\upalpha }}$$ to get inner watermarked image. Then, this inner watermarked image is embedded into an outer cover image using DWT and singular value decomposition by non-blind watermarking technique to get hybrid watermarked image. On the contrary, to extract the secret binary image, first non-blind watermark extraction and then blind watermark extraction techniques are used. From the experimental results, it is shown that this hybrid watermarking approach is robust against—rotation, JPEG compression, salt and pepper noise, Gaussian noise, speckle noise and Poisson noise.

47 citations

Journal ArticleDOI
TL;DR: This paper proposes an efficient steganography scheme based on sample comparison in Discrete Wavelet Transform (DWT) domain where the cover audio is decomposed into several multi sub-bands, and then selected coefficients of details are changed by a threshold value depending on the embedding cipher image bit.
Abstract: Steganography is the technique of hiding any secret information like text, image or video behind a cover file. Audio steganography is one of the widespread data hiding techniques that embeds secret data in audio signals. The secret data is hidden in a way that unauthorized people are not aware of the existence of the embedded data and without changing the quality of the audio signal (cover audio). Data hiding in audio signals has various applications such as protection of copyrighted audio signals, secret communication, hiding data that may influence the security and safety of governments and personnel. This paper proposes an efficient steganography scheme based on sample comparison in Discrete Wavelet Transform (DWT) domainwhere the cover audio is decomposed into several multi sub-bands, and then selected coefficients of details are changed by a threshold value depending on the embedding cipher image bit. This approach employs an original image component to perform RSA encryption on it, then cipher bits are embedded in the details components of the audio signal according to a predetermined threshold value. The performance of the algorithm has been estimated extensively against attacks, and simulation results are presented to prove the robustness of the proposed algorithm.

35 citations

Journal ArticleDOI
TL;DR: In this paper, a methodology based on exactness and robustness criteria was proposed to compare different pollutant forecasting models and their characteristics with different window sizes, and the best models offered a 24-hours ahead, very reliable prediction of the concentration of pollutants in the air in the considered area, which can be used to plan and implement, different kinds of interventions and measures to mitigate the effects on the population.

29 citations