<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>DSpace Collection:</title>
  <link rel="alternate" href="http://10.9.150.37:8080/dspace//handle/atmiyauni/1282" />
  <subtitle />
  <id>http://10.9.150.37:8080/dspace//handle/atmiyauni/1282</id>
  <updated>2026-04-27T19:00:15Z</updated>
  <dc:date>2026-04-27T19:00:15Z</dc:date>
  <entry>
    <title>Image And Video Watermarking: Machine Learning And Frequency Domain Approach For Achieving Dual Security Of Important Information</title>
    <link rel="alternate" href="http://10.9.150.37:8080/dspace//handle/atmiyauni/2293" />
    <author>
      <name>Pithiya, Kiran Ashok</name>
    </author>
    <author>
      <name>Kothari, Ashish M.</name>
    </author>
    <id>http://10.9.150.37:8080/dspace//handle/atmiyauni/2293</id>
    <updated>2025-01-28T10:10:19Z</updated>
    <published>2024-12-01T00:00:00Z</published>
    <summary type="text">Title: Image And Video Watermarking: Machine Learning And Frequency Domain Approach For Achieving Dual Security Of Important Information
Authors: Pithiya, Kiran Ashok; Kothari, Ashish M.
Abstract: Digital watermarking is a technique used to embed a hidden message, such as a company logo,&#xD;
creator’s name, or other identifying information, into a cover medium like images, audio, or&#xD;
video. Effective digital watermarking algorithms must satisfy three key requirements:&#xD;
robustness, perceptibility, and payload capacity. These algorithms are categorized into two&#xD;
primary domains: spatial and transform. In the spatial domain, watermarking modifies pixel&#xD;
values directly based on the watermark. In the transform domain, the frequency components&#xD;
of the cover medium are manipulated to embed the watermark. Lastly, a hybrid approach&#xD;
combines DCT, DWT, and SVD techniques to leverage the strengths of all three methods,&#xD;
achieving improved performance.&#xD;
To evaluate watermarking effectiveness, two metrics are calculated: (1) Perceptibility: This is&#xD;
assessed using Peak Signal-to-Noise Ratio (PSNR) and Mean Square Error (MSE) at the&#xD;
transmitter end. (2) The quality of the recovered watermark at the receiver side is determined&#xD;
by calculating the correlation between the recovered and original watermarks.&#xD;
For assessing robustness, which measures the quality of the watermark retrieved at the receiver&#xD;
side, the correlation between the recovered watermark and the original message is calculated.&#xD;
A higher correlation indicates stronger robustness, ensuring the watermark remains intact even&#xD;
under various attacks or distortions.&#xD;
This thesis introduces a novel method for embedding watermark messages into the crucial part&#xD;
of an image, specifically the region of interest (ROI). The focus is on identifying the human&#xD;
face within an image and embedding the watermark within this detected face. Once the&#xD;
watermark is embedded, the altered face image is reinserted back into the original image. To&#xD;
achieve this, the method employs a face identification algorithm alongside two frequency&#xD;
domain transforms viz. Discrete Cosine and Wavelet as well as the powerful linear algebra&#xD;
technique known as Singular Value Decomposition (SVD). Additionally, the thesis utilizes&#xD;
three widely recognized visual quality metrics to evaluate the method’s effectiveness. At the&#xD;
transmitter side, Peak Signal to Noise Ratio (PSNR) and Mean Square Error (MSE) are used&#xD;
to assess the perceptual quality of the image after watermark embedding. At the receiver side,&#xD;
Correlation is measured to test the robustness of the algorithm.&#xD;
Finally A hybrid algorithm is introduced, which integrates Discrete Cosine Transform (DCT),&#xD;
Discrete Wavelet Transform (DWT), and Singular Value Decomposition (SVD). This&#xD;
combination harnesses the advantages of all three methods, enhancing the overall performance&#xD;
of the watermarking process.&#xD;
Experimental results demonstrate that the hybrid algorithm outperforms individual methods&#xD;
(DCT, DWT, or SVD alone) in both perceptibility and robustness. This makes the proposed&#xD;
approach a superior choice for applications requiring reliable and imperceptible digital&#xD;
watermarking.</summary>
    <dc:date>2024-12-01T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>An Intelligent Approach to Detect and Classify Facial Image Forgery</title>
    <link rel="alternate" href="http://10.9.150.37:8080/dspace//handle/atmiyauni/1406" />
    <author>
      <name>Sheth, Kinjal Ravi</name>
    </author>
    <author>
      <name>Dr. Vishal, S. Vora</name>
    </author>
    <id>http://10.9.150.37:8080/dspace//handle/atmiyauni/1406</id>
    <updated>2024-03-26T06:57:04Z</updated>
    <published>2023-12-20T00:00:00Z</published>
    <summary type="text">Title: An Intelligent Approach to Detect and Classify Facial Image Forgery
Authors: Sheth, Kinjal Ravi; Dr. Vishal, S. Vora
Abstract: In the era of digital image manipulation and the pervasive presence of social media, the verification of facial image authenticity has become an essential concern. Facial retouching in supporting documents can have adverse effects, undermining the credibility and authenticity of the information presented. In official identification documents, such as passports or driver's licenses, retouching can hinder accurate identification and security measures, potentially leading to identity fraud and security risks.&#xD;
This study presents a comprehensive investigation into the classification of retouched face images using a fine-tuned pre-trained VGG16 &amp; ResNet50 model with ImageNet weight. We explore the impact of different train-test split strategies on the performance of the model and also evaluate the effectiveness of two distinct optimizers namely Adam and RMSprop. The model generalizability has been checked over two standard datasets ND-IIITD retouched faces and MDRF (Multi Demography Retouched Faces- Caucasian samples).&#xD;
The experiment results indicate that the ResNet50 model, fine-tuned with the RMSprop optimizer, attains a maximum accuracy of 98.52% for ND-IIITD and an impressive 99.17% for MDRF (Caucasian). In addition, an examination of various train-test split ratios over these datasets reveals the 80%-20% split ratio as the optimal choice for the approach. Moreover, the experiments show that this method effectively performs on both balanced and imbalanced datasets, emphasizing its robustness and adaptability.&#xD;
In conclusion, the intelligent approach leverages transfer learning and model selection offers a robust solution for the automated detection and classification of facial retouching. This contribution not only enhances image authenticity and trustworthiness in the digital age but also emphasizes the importance of considering various factors, such as model selection and dataset characteristics and hyperparameters in achieving optimal results in this field.</summary>
    <dc:date>2023-12-20T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Develop an Automatic Road Network Extraction System from Remote Sensing Images</title>
    <link rel="alternate" href="http://10.9.150.37:8080/dspace//handle/atmiyauni/1405" />
    <author>
      <name>Patel, Miralben J.</name>
    </author>
    <author>
      <name>Dr. Ashish, Kothari</name>
    </author>
    <id>http://10.9.150.37:8080/dspace//handle/atmiyauni/1405</id>
    <updated>2024-03-26T06:13:08Z</updated>
    <published>2023-12-20T00:00:00Z</published>
    <summary type="text">Title: Develop an Automatic Road Network Extraction System from Remote Sensing Images
Authors: Patel, Miralben J.; Dr. Ashish, Kothari
Abstract: In recent years, both the development of high resolution satellite images and the amount of newlineavailable aerial images have expanded and accessible easily. Unfortunately, the technologies newlineused to analyze all of these images have not kept pace, so a large portion of the job is still newlinedone manually by humans, which is costly, time-consuming, and error-prone. Due to these newlinefactors, there is a strong need for efficient and dependable techniques that can automatically newlineanalyze remote sensing images. However, even in high-resolution remote sensing images, newlinebackground and roadways might be difficult to distinguish from complex background images newlinebecause of the occlusion of trees and buildings. Now a day, Deep Learning, which has the newlinecomputing power for massive data, has emerged as the most popular and effective newlineclassification approach. newlineTwo different novel methods are developed for automatic road surface detection from high- newlineresolution remote sensing images based on deep learning that detect effectively, efficiently newlineand fast in manner. First, a modified U-Net is used to construct a semantic segmentation newlinealgorithm for road surface extraction. The modified U-Net has fewer convolution layers than newlinethe normal U-Net. The intersection over union (IOU) yielded a model performance of newline93.71%, while the average segmentation time for a single image was 0.28 seconds. newlineThe second proposed approach, Gradient Descent Sea Lion Optimization (GDSLO) fusion of newlineSea Lion Optimization (SLnO) and Stochastic Gradient Descent (SGD) algorithms. The newlinemodel performance for road surface is measured by evaluation metrics, such as precision, newlinerecall, and F1-measure with the highest values of 0.888, 0.930, and 0.810, respectively. The newlineroad edge performance detected with precision, recall and F1-score are 0.801, 0.76, and 0.786 newlinerespectively. In the same way precision, recall, and F1-score for centerline detection is 0.800, newline0.762, and 0.7999 respectively.</summary>
    <dc:date>2023-12-20T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>Performance Analysis of Adaptive Data Dissemination in Vehicular Networks</title>
    <link rel="alternate" href="http://10.9.150.37:8080/dspace//handle/atmiyauni/1290" />
    <author>
      <name>Vala, Mehulbhai Kuvarbhai</name>
    </author>
    <author>
      <name>Dr. Vishal S, Vora</name>
    </author>
    <id>http://10.9.150.37:8080/dspace//handle/atmiyauni/1290</id>
    <updated>2024-01-25T10:57:23Z</updated>
    <published>2023-01-31T00:00:00Z</published>
    <summary type="text">Title: Performance Analysis of Adaptive Data Dissemination in Vehicular Networks
Authors: Vala, Mehulbhai Kuvarbhai; Dr. Vishal S, Vora
Abstract: Recent advancements in mobile communications, embedded systems, and sen-&#xD;
sors lead to the design of intelligent vehicles. Such vehicles are able to establish&#xD;
wireless communication among themselves, and this is called vehicular ad hoc net-&#xD;
works. A plethora of applications covering safety, e ciency, and infotainment are&#xD;
possible through the use of vehicular networks. Enhancing safety and e ciency&#xD;
is the main goal of an intelligent transportation system (ITS). That is why it is&#xD;
gaining much interest among the research community and automobile industries.&#xD;
Safety-related messages need to propagate e ciently and reliably among mov-&#xD;
ing vehicles to realize safety applications. Variable vehicle density and road topolo-&#xD;
gies in vehicular networks raise many challenges for e cient message dissemina-&#xD;
tion. Furthermore, vehicles must extend message awareness beyond the transmis-&#xD;
sion range of the sending vehicles. The characteristics of vehicular networks, as&#xD;
well as the need to disseminate safety messages over a greater distance, necessitate&#xD;
e cient and reliable multi-hop communications.&#xD;
The current thesis  ts into this background and aims to investigate and pro-&#xD;
pose novel and e cient data dissemination protocols, primarily addressing safety&#xD;
applications via vehicle-to-vehicle communication. First, it provides a detailed&#xD;
analysis of message dissemination protocols and their classi cations. The thesis&#xD;
focuses on location-assisted message broadcasting for message dissemination tasks.&#xD;
Native broadcasting methods result in high redundancy and channel contention.&#xD;
Delay-based broadcasting techniques are e cient solutions to reduce excessive re-&#xD;
dundancy and channel congestion. This work provides a comparative analysis of&#xD;
di erent delay-based broadcast techniques.&#xD;
Subsequently, an enhanced adaptive protocol design is presented that is ro-&#xD;
bust against varying vehicle densities and road topologies. The proposed protocol&#xD;
is scalable to accommodate diverse application requirements. Additionally, the&#xD;
behaviour and e ectiveness of the proposed protocol are carefully examined in a&#xD;
realistic environment.</summary>
    <dc:date>2023-01-31T00:00:00Z</dc:date>
  </entry>
</feed>

