Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Aman Chadha is active.

Publication


Featured researches published by Aman Chadha.


International Journal of Computer Applications | 2012

Comparative Study and Optimization of Feature- Extraction Techniques for Content based Image Retrieval

Aman Chadha; Sushmit Mallik; Ravdeep Johar

The aim of a Content-Based Image Retrieval (CBIR) system, also known as Query by Image Content (QBIC), is to help users to retrieve relevant images based on their contents. CBIR technologies provide a method to find images in large databases by using unique descriptors from a trained image. The image descriptors include texture, color, intensity and shape of the object inside an image. Several feature-extraction techniques viz., Average RGB, Color Moments, Co-occurrence, Local Color Histogram, Global Color Histogram and Geometric Moment have been critically compared in this paper. However, individually these techniques result in poor performance. So, combinations of these techniques have also been evaluated and results for the most efficient combination of techniques have been presented and optimized for each class of image query. We also propose an improvement in image retrieval performance by introducing the idea of Query modification through image cropping. It enables the user to identify a region of interest and modify the initial query to refine and personalize the image retrieval results.


arXiv: Computer Vision and Pattern Recognition | 2011

Face recognition using discrete cosine transform for global and local features

Aman Chadha; Pallavi P. Vaidya; M. Mani Roja

Face Recognition using Discrete Cosine Transform (DCT) for Local and Global Features involves recognizing the corresponding face image from the database. The face image obtained from the user is cropped such that only the frontal face image is extracted, eliminating the background. The image is restricted to a size of 128 × 128 pixels. All images in the database are gray level images. DCT is applied to the entire image. This gives DCT coefficients, which are global features. Local features such as eyes, nose and mouth are also extracted and DCT is applied to these features. Depending upon the recognition rate obtained for each feature, they are given weightage and then combined. Both local and global features are used for comparison. By comparing the ranks for global and local features, the false acceptance rate for DCT can be minimized.


International Journal of Computer Applications | 2011

Text-Independent Speaker Recognition for Low SNR Environments with Encryption

Aman Chadha; Divya Jyoti; M. Mani Roja

Recognition systems are commonly designed to authenticate users at the access control levels of a system. A number of voice recognition methods have been developed using a pitch estimation process which are very vulnerable in low Signal to Noise Ratio (SNR) environments thus, these programs fail to provide the desired level of accuracy and robustness. Also, most text independent speaker recognition programs are incapable of coping with unauthorized attempts to gain access by tampering with the samples or reference database. The proposed text-independent voice recognition system makes use of multilevel cryptography to preserve data integrity while in transit or storage. Encryption and decryption follow a transform based approach layered with pseudorandom noise addition whereas for pitch detection, a modified version of the autocorrelation pitch extraction algorithm is used. The experimental results show that the proposed algorithm can decrypt the signal under test with exponentially reducing Mean Square Error over an increasing range of SNR. Further, it outperforms the conventional algorithms in actual identification tasks even in noisy environments. The recognition rate thus obtained using the proposed method is compared with other conventional methods used for speaker identification.


International Journal of Computer Applications | 2012

Analysis of a Modern Voice Morphing Approach using Gaussian Mixture Models for Laryngectomees

Aman Chadha; Bharatraaj Savardekar; Jay Padhya

This paper proposes a voice morphing system for people suffering from Laryngectomy, which is the surgical removal of all or part of the larynx or the voice box, particularly performed in cases of laryngeal cancer. A primitive method of achieving voice morphing is by extracting the sources vocal coefficients and then converting them into the target speakers vocal parameters. In this paper, we deploy Gaussian Mixture Models (GMM) for mapping the coefficients from source to destination. However, the use of the traditional/conventional GMM-based mapping approach results in the problem of over-smoothening of the converted voice. Thus, we hereby propose a unique method to perform efficient voice morphing and conversion based on GMM,which overcomes the traditional-method effects of over-smoothening. It uses a technique of glottal waveform separation and prediction of excitations and hence the result shows that not only over-smoothening is eliminated but also the transformed vocal tract parameters match with the target. Moreover, the synthesized speech thus obtained is found to be of a sufficiently high quality. Thus, voice morphing based on a unique GMM approach has been proposed and also critically evaluated based on various subjective and objective evaluation parameters. Further, an application of voice morphing for Laryngectomees which deploys this unique approach has been recommended by this paper.


Computer Engineering & Information Technology | 2017

Optimization Techniques for 160 GBPS WDM Optical Links to Minimize Nonlinear Effects

Ankit R. Chadha; Aman Chadha; Neha S. Satam; Sunkist Mehta; Santosh Jagtap

Increased channel capacity of optical transmission system is obtained by either increasing the bit rate of transmission or by using the technique of Wavelength Division Multiplexing (WDM). In long distance communication, higher launched power is required to achieve the required signal-to-noise ratio (SNR) but with increased launched optical powers, rates and the number of wavelength channels, nonlinear optical effects have been increased. DWDM (Dense Wavelength Division Multiplexing) Systems facilitate the maximum channelization of the huge bandwidth offered by Optical Systems. The paper recognizes Cross Phase Modulation (XPM) and Four Wave Mixing (FWM) as major performance limitations for DWDM Systems. We have optimized the 160 GBPS, 16 channel optical link and have observed the optimization by variation of parameters like Dispersion, Channel Spacing and Pulse Width alongside NZDSF (Non-Zero Dispersion Shifted Fiber) and DCF (Dispersion Compensated Fiber) have been employed to further optimize the system performance. System parameters have been proposed for optimum performance yielding a Q –factor value of 34.89 dB and BER (Bit Error Rate) value of the order of 10-268.


International Journal of Computer Applications | 2015

Dual-Layer Video Encryption using RSA Algorithm

Aman Chadha; Sushmit Mallik; Ankit R. Chadha; Ravdeep Johar; M. Mani Roja

This paper proposes a video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at applications requiring sensitive video information transfers. The system is primarily designed to work with files encoded using the Audio Video Interleaved (AVI) codec, although it can be easily ported for use with Moving Picture Experts Group (MPEG) encoded files. The audio and video components of the source separately undergo two layers of encryption to ensure a reasonable level of security. Encryption of the video component involves applying the RSA algorithm followed by the PN-based encryption. Similarly, the audio component is first encrypted using PN and further subjected to encryption using the Discrete Cosine Transform. Combining these techniques, an efficient system, invulnerable to security breaches and attacks with favorable values of parameters such as encryption/decryption speed, encryption/decryption ratio and visual degradation; has been put forth. For applications requiring encryption of sensitive data wherein stringent security requirements are of prime concern, the system is found to yield negligible similarities in visual perception between the original and the encrypted video sequence. For applications wherein visual similarity is not of major concern, we limit the encryption task to a single level of encryption which is accomplished by using RSA, thereby quickening the encryption process. Although some similarity between the original and encrypted video is observed in this case, it is not enough to comprehend the happenings in the video.


Digital Image Processing | 2011

A Robust, Low-Cost Approach to Face Detection and Face Recognition

Divya Jyoti; Aman Chadha; Pallavi P. Vaidya; M. Mani Roja


arXiv: Hardware Architecture | 2011

Design and Simulation of an 8-bit Dedicated Processor for calculating the Sine and Cosine of an Angle using the CORDIC Algorithm

Aman Chadha; Divya Jyoti; M. G. Bhatia


arXiv: Computer Vision and Pattern Recognition | 2011

Rotation, Scaling and Translation Analysis of Biometric Signature Templates

Aman Chadha; Divya Jyoti; M. Mani Roja


Archive | 2012

Comparative Study and Optimization of Feature- Extraction Techniques for Content based Image Retriev

Aman Chadha; Sushmit Mallik; N. Terziyska; Ravdeep Johar

Collaboration


Dive into the Aman Chadha's collaboration.

Top Co-Authors

Avatar

M. Mani Roja

Thadomal Shahani Engineering College

View shared research outputs
Top Co-Authors

Avatar

Pallavi P. Vaidya

Thadomal Shahani Engineering College

View shared research outputs
Researchain Logo
Decentralizing Knowledge