Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mamta Juneja is active.

Publication


Featured researches published by Mamta Juneja.


international conference on recent advances in engineering computational sciences | 2014

An analysis of edge based image steganography techniques in spatial domain

Deepali Singla; Mamta Juneja

Steganography is a branch of information security. Steganography aims at hiding the existence of the actual communication. This aim is achieved by hiding the actual information into other information in such a way that intruder cannot detect it. A variety of carrier file formats can be used to carry out steganography e.g. images, text, videos, audio, radio waves etc. But mainly images are used for this purpose because of their high frequency on internet. Number of image steganography techniques has been introduced having some drawbacks and advantages. These techniques are evaluated on the basis of three parameters imperceptibility, robustness and capacity. In this paper we will review various edge based image steganography techniques. Main idea behind these techniques is that edges can bear more variation than smooth areas without being detected.


international conference on recent advances in engineering computational sciences | 2014

A review on Iris Recognition

Navjot Kaur; Mamta Juneja

Iris Recognition has gained a great attention in various fields like industrial areas, security prone areas, border areas and medical institutes etc. Due to its high accuracy and uniqueness, it is used in various fields of access control and security at border areas. The demand for iris recognition is increasing day by day due to its reliability, accuracy and uniqueness. It is the most powerful identification feature among all other biometric features as human iris remains unchanged during whole of the life. For efficient functioning of iris recognition system, researchers have to work on various challenges like images taken in unconstrained environment, noisy images, blurred images and many more. The goal of this review paper is to discuss steps involved in iris recognition system and various techniques used by different researchers for each recognition step.


Archive | 2015

Hybrid Edge Detection-Based Image Steganography Technique for Color Images

Deepali Singla; Mamta Juneja

Steganography, Greek meaning covered writing, is a branch of information security which hides the existence of important information in order to prevent any unauthorized access. The number of image steganography techniques has been proposed so far to achieve the goals of steganography, i.e., high payload, less imperceptibility, and more robustness. In this paper, we are proposing a new steganography technique for colored image (i.e., RGB images). The proposed scheme has taken into consideration the property that more information can be hidden into the contrast areas rather than in the bright areas. This scheme makes the use of hybrid edge detector, i.e., combination of fuzzy and canny edge detector. After detecting edges, embedding is done accordingly. The proposed scheme achieves all the three goals of steganography appropriately.


Multimedia Tools and Applications | 2018

A comprehensive review of denoising techniques for abdominal CT images

Ravinder Kaur; Mamta Juneja; A. K. Mandal

Computed Tomography (CT) is one of the effective imaging modality in medical sciences that assist in diagnosing various pathologies inside the human body. Despite considerable advancement in acquisition speed, signal to noise ratio and image resolution of computed tomography imaging technology, CT images are still affected by noise and artifacts. A tradeoff between the amount of noise reduced and conservation of genuine image details has to be made in such a way that it enhances the clinically relevant image content. Therefore, noise reduction in medical images is an important and challenging task, as it helps to improve the performance of other image processing procedures such as segmentation or classification to perform better diagnosis by clinicians. Different techniques have been suggested in the literature on denoising of CT images, and each technique has its own presumptions, benefits, and drawbacks. To the best of our knowledge, no survey paper was found in the literature that compares the performance of various denoising techniques for CT images. This study aims to compare the capabilities of several notable and contemporary denoising techniques in the presence of different types of noise present in abdominal CT images. This comparative analysis helps to determine the most suitable denoising technique for practitioners and researchers that can be used in real life scenarios. Furthermore, the advantages and disadvantages of considered denoising methods have also been discussed along with some recommendations for further research in this area.


Biomedical Signal Processing and Control | 2018

Survey on segmentation and classification approaches of optic cup and optic disc for diagnosis of glaucoma

Niharika Thakur; Mamta Juneja

Abstract Over the past years, use of the retinal fundus images has increased for diagnosis of retinal diseases. Glaucoma is a disease which causes damage to the optic nerve of the eye resulting in deteriorated vision. Once diagnosed, the disease cannot be treated completely, but timely detection can further control the effect of glaucoma. Detection is usually performed by analyzing the optic disc followed by optic cup present on an exit of ganglion cells in the eye. Using retinal fundus images and image processing approaches, various research studies have been published till date, but the problem of accurate segmentation of disc and cup is still a major concern. This paper aims to analyze various segmentation approaches used by different researchers for optic disc followed by the optic cup and its classification for diagnosis of glaucoma. Also, the paper addresses various research gaps and challenges which need to be dealt with for improving the accuracy of segmentation and classification.


Journal of Emerging Technologies in Web Intelligence | 2014

A Novel Approach for Iris Recognition in Unconstrained Environment

Navjot Kaur; Mamta Juneja

Area of iris recognition for human identification is very growing in this industrial era. Today, almost in every field iris recognition systems have been installed for various purposes like attendance systems, human verification systems for security reasons and access control at premises. A great research has been done in this area for constrained environment. However those systems do not work efficiently for unconstrained environment. For unconstrained environment many constraints need to be kept in mind for proper and accurate functioning of the system. Unconstrained iris recognition plays a vital role in identification system for real life applications and thus a great amount of research is going on in this area. In this paper a novel approach for human identification in an unconstrained environment is given.


Archive | 2018

Video Steganography Techniques in Spatial Domain—A Survey

Mukesh Dalal; Mamta Juneja

Steganography is considered as a useful approach for hiding data in a carrier file; data could be any multimedia file such as image, text, audio, video. Steganography is referred to as the science of invisible communication. Sometimes steganography is used with encryption schemes of cryptography to provide additional security for the secret data. A good steganographic technique must fulfill three basic requirements of steganography, i.e., capacity, imperceptibility, and robustness. Videos have become a very popular choice for steganography due to its significant growth on Internet and are able to fulfill all these requirements due to its large size and statistical complexity. This paper presents the survey of video steganography schemes based on spatial domain techniques.


Archive | 2016

Comparative Analysis on Optic Cup and Optic Disc Segmentation for Glaucoma Diagnosis

Niharika Thakur; Mamta Juneja

Glaucoma is an eye disease which causes continuous increase in size of optic cup and finally the permanent vision loss due to damage to the optic nerve. It is the second most prevailing disease all over the world which causes irreversible vision loss or blindness. It is caused due to increased pressure in the eyes which enlarges size of optic cup and further blocks flow of fluid to the optic nerve and deteriorates the vision. Cup to disc ratio is the measure indicator used to detect glaucoma. It is the ratio of sizes of optic cup to disc. The aim of this analysis is to study the performance of various segmentation approaches used for optic cup and optic disc so far by different researchers for detection of glaucoma in time.


Archive | 2015

Segmentation Approach for Iris Recognition in Less Constrained Environment

Navjot Kaur; Mamta Juneja

As demand for security is increasing day by day, the methods for security are also improving to meet the challenging needs for security. Iris recognition is one of the emerging technologies to be used for security. The most challenging step in the process of iris recognition is iris localization as accuracy in iris localization significantly affects further processing of feature extraction and template matching stages. Traditional algorithms accurately locate iris as iris images were taken under ideal conditions. But their accuracy is affected when eye images are taken in unconstrained environment. The proposed algorithm starts with the extraction of iris even in the presence of specular highlights, eyelids, eyelashes and pupil. The accuracy for the proposed work has enhanced due to the use of intuitionistic fuzzy-based clustering for iris segmentation on UBIRIS v2 images.


International Journal of Information Security and Privacy | 2014

A Covert Communication Model-Based on Image Steganography

Mamta Juneja

With the more and more advancement in technology, internet has become the most important medium for all kinds of confidential as well as non-confidential communications. Security is the major issue for such communications and steganography is most widely accepted tool for information security. An effort has been made in the present paper to propose a secured model for communication using image steganography. It presents two components based LSB steganography method, adaptive LSB based steganography method for embedding data in high and low transition parts of an image respectively. Hybrid edge detection filter is proposed to divide an image in low and high transition areas. AES (Advanced Encryption Standard) and Randomization is incorporated to provide two-tier security. Comparison analysis of output results with other existing techniques on basis of capacity, imperceptibility is giving the proposed approach an edge over others. The proposed approach has been thoroughly tested for various steganalysis attacks like visual analysis, histogram analysis, chi-square, and RS analysis and could sustain all these attacks very well.

Collaboration


Dive into the Mamta Juneja's collaboration.

Top Co-Authors

Avatar

A. K. Mandal

Post Graduate Institute of Medical Education and Research

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge