29 research outputs found

    RetSeg: Retention-based Colorectal Polyps Segmentation Network

    Full text link
    Vision Transformers (ViTs) have revolutionized medical imaging analysis, showcasing superior efficacy compared to conventional Convolutional Neural Networks (CNNs) in vital tasks such as polyp classification, detection, and segmentation. Leveraging attention mechanisms to focus on specific image regions, ViTs exhibit contextual awareness in processing visual data, culminating in robust and precise predictions, even for intricate medical images. Moreover, the inherent self-attention mechanism in Transformers accommodates varying input sizes and resolutions, granting an unprecedented flexibility absent in traditional CNNs. However, Transformers grapple with challenges like excessive memory usage and limited training parallelism due to self-attention, rendering them impractical for real-time disease detection on resource-constrained devices. In this study, we address these hurdles by investigating the integration of the recently introduced retention mechanism into polyp segmentation, introducing RetSeg, an encoder-decoder network featuring multi-head retention blocks. Drawing inspiration from Retentive Networks (RetNet), RetSeg is designed to bridge the gap between precise polyp segmentation and resource utilization, particularly tailored for colonoscopy images. We train and validate RetSeg for polyp segmentation employing two publicly available datasets: Kvasir-SEG and CVC-ClinicDB. Additionally, we showcase RetSeg's promising performance across diverse public datasets, including CVC-ColonDB, ETIS-LaribPolypDB, CVC-300, and BKAI-IGH NeoPolyp. While our work represents an early-stage exploration, further in-depth studies are imperative to advance these promising findings.Comment: Updated PD

    Cancelable iris Biometrics based on data hiding schemes

    Get PDF
    The Cancelable Biometrics is a template protection scheme that can replace a stolen or lost biometric template. Instead of the original biometric template, Cancelable biometrics stores a modified version of the biometric template. In this paper, we have proposed a Cancelable biometrics scheme for Iris based on the Steganographic technique. This paper presents a non-invertible transformation function by combining Huffman Encoding and Discrete Cosine Transformation (DCT). The combination of Huffman Encoding and DCT is basically used in steganography to conceal a secret image in a cover image. This combination is considered as one of the powerful non-invertible transformation where it is not possible to extract the exact secret image from the Stego-image. Therefore, retrieving the exact original image from the Stego-image is nearly impossible. The proposed non-invertible transformation function embeds the Huffman encoded bit-stream of a secret image in the DCT coefficients of the iris texture to generate the transformed template. This novel method provides very high security as it is not possible to regenerate the original iris template from the transformed (stego) iris template. In this paper, we have also improved the segmentation and normalization process

    Comprehensive literature review on delay tolerant network (DTN) framework for improving the efficiency of internet connection in rural regions of Malaysia

    Get PDF
    This paper brief in detail the technology reviews of current available technologies and literature reviews that starts with the history of the Internet and the understanding of the working of the Internet through a conceptual model of TCP/IP and OSI models, the numerous technologies developed to cater for different connectivity environments and recent popular topics in the field of communication technologies. Detailed review is done on the subject of Delay-Tolerant Networking (DTN), the chosen technology from which the intended framework can be proposed for improving the efficiency of internet connections. From these literatures, comparisons are made to find the best possible combinations of technologies to design a mini- mum viable product, followed by a generic DTN framework

    A Survey on Biometrics and Cancelable Biometrics Systems

    Get PDF
    Now-a-days, biometric systems have replaced the password or token based authentication system in many fields to improve the security level. However, biometric system is also vulnerable to security threats. Unlike password based system, biometric templates cannot be replaced if lost or compromised. To deal with the issue of the compromised biometric template, template protection schemes evolved to make it possible to replace the biometric template. Cancelable biometric is such a template protection scheme that replaces a biometric template when the stored template is stolen or lost. It is a feature domain transformation where a distorted version of a biometric template is generated and matched in the transformed domain. This paper presents a review on the state-of-the-art and analysis of different existing methods of biometric based authentication system and cancelable biometric systems along with an elaborate focus on cancelable biometrics in order to show its advantages over the standard biometric systems through some generalized standards and guidelines acquired from the literature. We also proposed a highly secure method for cancelable biometrics using a non-invertible function based on Discrete Cosine Transformation (DCT) and Huffman encoding. We tested and evaluated the proposed novel method for 50 users and achieved good results

    Spam Detection Proposal in Regular and Text-based Image Emails

    No full text
    Spam emails are invading users without their consent and filling their mail boxes with email trash. Priceless effort and time of the users and organizations are wasted in handling them. To circumvent anti-spam solutions, many spammers are sending spam email with image-only content. In this paper we propose a spam detection approach in emails with text and image contents. In the first part, a novel framework for extracting intelligent information from emails with image content is presented and a prototype implementation is shown. In the second part, a proposal for multi-layered spam detection algorithm is presented, which enhances existing approaches

    Leveraging case based reasoning techniques for diagnosing mammography

    No full text
    Abstract not available

    Digital mammogram tumor preprocessing segmentation feature extraction and classification

    No full text
    Mammography has been one of the most reliable methods for early detection of breast carcinomas. The main objective of this paper is to detect and segment the tumor from mammogram images that helps to provide support for the clinical decision to perform biopsy of the breast. In this paper, there are two aspects to segmentation in mammography. First is to separate out the mammogram from the background and the identification of putative masses and the pectoral muscle. The extraction approach is done using basic region growing method to identify the tumor. Second is to extract the features from segmented masses and classifies the masses by case base reasoning method. The experimental results are shown in this paper till the first phase of mass segmentation

    Intelligent mammography retrieval engine

    No full text
    The objective of this paper is to develop a prototype called Intelligent Mammography Retrieval Engine. It can be implemented as a computer software that able to examine/analyst digital mammogram image and automatically yield its finding and recommendation. The computerized examination is done through comparison of a new digital mammogram image with the existing collection of digital mammogram image in the database. The digital mammogram images in the database that exactly identical to the new digital mammogram image will be sources of yielding finding and recommendation of new digital mammogram image

    Facial Age Estimation Using Machine Learning Techniques: An Overview

    No full text
    Automatic age estimation from facial images is an exciting machine learning topic that has attracted researchers’ attention over the past several years. Numerous human–computer interaction applications, such as targeted marketing, content access control, or soft-biometrics systems, employ age estimation models to carry out secondary tasks such as user filtering or identification. Despite the vast array of applications that could benefit from automatic age estimation, building an automatic age estimation system comes with issues such as data disparity, the unique ageing pattern of each individual, and facial photo quality. This paper provides a survey on the standard methods of building automatic age estimation models, the benchmark datasets for building these models, and some of the latest proposed pieces of literature that introduce new age estimation methods. Finally, we present and discuss the standard evaluation metrics used to assess age estimation models. In addition to the survey, we discuss the identified gaps in the reviewed literature and present recommendations for future research
    corecore