Papers by Anupama shetter
In this paper, a collective median filtering and histogram equalization based de-noising techniqu... more In this paper, a collective median filtering and histogram equalization based de-noising technique is proposed for images. Initial noise detection is performed by considering neighboring pixel values then median filtering is performed to remove high density noise. The filtered image is then subjected for histogram equalization to regain correlation between adjacent pixels. The final image enhancement is done by contrast adjustment method. The experimental results show that the proposed algorithm provides high quality restored images compared to existing ones.
In this paper, digital image watermarking using tenth root of exponential transformation has been... more In this paper, digital image watermarking using tenth root of exponential transformation has been introduced in the frequency domain. In the proposed technique, the secrete image is first encrypted and compressed using exponential function and then embedded into the host image. The resultant images obtained from the proposed algorithm is subjected for various security attacks and the results are compared with the other existing algorithms. The results obtained are better compared to the existing techniques.

In this paper, digital image watermarking technique using sine transformation with a constant co-... more In this paper, digital image watermarking technique using sine transformation with a constant co-efficient has been introduced in the frequency domain. During transmission, any noise or unwanted data accumulates with the least significant bit (LSB) of the original information. In the existing techniques, the secrete image will be compressed and added with the host, which forms invisible watermark. But the compressed data of the secrete image will be added to the LSB, which then altered by the unwanted information. In the proposed algorithm, the secrete image is first compressed using sine transformation with a constant co-efficient and then embedded into the host image with last but one bit from LSB. The resultant images obtained from the proposed algorithm are subjected for various security tests and the results are compared with the other existing algorithms. The results obtained are better compared to the existing techniques.
2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on
In this paper, a collective median filtering and histogram equalization based de-noising techniqu... more In this paper, a collective median filtering and histogram equalization based de-noising technique is proposed for images. Initial noise detection is performed by considering neighboring pixel values then median filtering is performed to remove high density noise. The filtered image is then subjected for histogram equalization to regain correlation between adjacent pixels. The final image enhancement is done by contrast adjustment method. The experimental results show that the proposed algorithm provides high quality restored images compared to existing ones.
In order to enhance the contrast between ridges and valleys of contactless fingerprint, image enh... more In order to enhance the contrast between ridges and valleys of contactless fingerprint, image enhancement algorithm based on Thresholding and Binarization is proposed. First, initial resizing of the input image takes along with filter on the basis of the feature that the ridges of contactless fingerprint are linear structure and relatively brighter. Then the obtained output after filtering is subjected to Thresholding and Binarization. Experimental results shows that the proposed algorithm enhances the image at faster rate compared to the existing algorithm.
In this paper, digital image watermarking using tenth root of exponential transformation has been... more In this paper, digital image watermarking using tenth root of exponential transformation has been introduced in the frequency domain. In the proposed technique, the secrete image is first encrypted and compressed using exponential function and then embedded into the host image. The resultant images obtained from the proposed algorithm is subjected for various security attacks and the results are compared with the other existing algorithms. The results obtained are better compared to the existing techniques.
2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC)I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), 2018 2nd International Conference on, 2018
In this paper, a collective median filtering and histogram equalization based de-noising techniqu... more In this paper, a collective median filtering and histogram equalization based de-noising technique is proposed for images. Initial noise detection is performed by considering neighboring pixel values then median filtering is performed to remove high density noise. The filtered image is then subjected for histogram equalization to regain correlation between adjacent pixels. The final image enhancement is done by contrast adjustment method. The experimental results show that the proposed algorithm provides high quality restored images compared to existing ones.

2018 International Conference on Inventive Research in Computing Applications (ICIRCA)
In this paper, digital image watermarking technique using sine transformation with a constant co-... more In this paper, digital image watermarking technique using sine transformation with a constant co-efficient has been introduced in the frequency domain. During transmission, any noise or unwanted data accumulates with the least significant bit (LSB) of the original information. In the existing techniques, the secrete image will be compressed and added with the host, which forms invisible watermark. But the compressed data of the secrete image will be added to the LSB, which then altered by the unwanted information. In the proposed algorithm, the secrete image is first compressed using sine transformation with a constant co-efficient and then embedded into the host image with last but one bit from LSB. The resultant images obtained from the proposed algorithm are subjected for various security tests and the results are compared with the other existing algorithms. The results obtained are better compared to the existing techniques.

Syed Fazil Ahmed3, Ranjini DR4, Nithish Athreyas S R5 Dept. of Electronics and Communication Engi... more Syed Fazil Ahmed3, Ranjini DR4, Nithish Athreyas S R5 Dept. of Electronics and Communication Engineering, ATME College of Engineering, Mysore, India ------------------------------------------------------------------------------***--------------------------------------------------------------------------Abstract—With the advancement of science and up to date technologies, the eye of scientist is getting directed towards two fields – Farming and Robotics System. But the mix of those two technologies can serve efficiently for several problems by overcoming the limitation of previous technologies. This paper is to develop a robot capable of performing operations like automatic ploughing, seed sowing, fertilization and water sprinkling. Additionally, to the present, obstacle detection and clearance also are done. of these operations are controlled via Bluetooth module. The qualitative development of this paper is request for a system which minimizes the working cost and reduces the time ...
2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT)
In order to enhance the contrast between ridges and valleys of contactless fingerprint, image enh... more In order to enhance the contrast between ridges and valleys of contactless fingerprint, image enhancement algorithm based on Thresholding and Binarization is proposed. First, initial resizing of the input image takes along with filter on the basis of the feature that the ridges of contactless fingerprint are linear structure and relatively brighter. Then the obtained output after filtering is subjected to Thresholding and Binarization. Experimental results shows that the proposed algorithm enhances the image at faster rate compared to the existing algorithm.
Conference Presentations by Anupama shetter
The primary aim of the paper is to design, develop and implement the autonomous. It is used to el... more The primary aim of the paper is to design, develop and implement the autonomous. It is used to eliminate the human exposure in dangerous environments and very effective on time management. Also it completes a painting job without an error. At last, it is expected that the conceptual model of the wall painting robot would be efficiently used in various home and industry applications in wall finishing and maintenance of other giant architectural and civil structures. This project aims to design and develop an Automated Wall Painting Robot which helps to reduce manual efforts on painting and accomplish cost effective painting accessories. Here we have proposed a robot controlled via Raspberry Pi board.
Uploads
Papers by Anupama shetter
Conference Presentations by Anupama shetter