Khumanthem Manglem Singh

Khumanthem Manglem Singh
National Institute of Technology, Manipur · Department of Computer Science and Engineering

PhD

About

114
Publications
38,147
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,210
Citations
Citations since 2016
60 Research Items
1923 Citations
20162017201820192020202120220100200300400
20162017201820192020202120220100200300400
20162017201820192020202120220100200300400
20162017201820192020202120220100200300400
Introduction
Areas of Interest 1. Image & video processing 2. Information Security - Cryptography, Watermarking, Steganography, Hashing Functions, Cyber Forensic
Skills and Expertise
Additional affiliations
September 2018 - present
National Institute of Technology, Manipur
Position
  • Professor
Description
  • I am a professor in the department of computer science & engineering.

Publications

Publications (114)
Article
Full-text available
Image Spam is a type of spam that has embedded text in an image. Classification of Image Spam is done using various machine learning approaches based on a broad set of features extracted from the image. For its remarkable results, the convolutional neural networks (CNN) are widely used in image classification as well as feature extraction tasks. In...
Article
Full-text available
Recognition of unseen object class by a human being is always based on the relationship between seen and unseen classes, given that human has some background knowledge of the unseen object class. Zero-shot learning is a learning paradigm that tries to develop a recognition model to recognize mutually exclusive training and testing classes. A zero-s...
Article
Full-text available
Lung cancer is one of the highest deadly disease which can be treated effectively in its early stage. Computer aided detection (CADe) can detect pulmonary nodules of lung cancer accurately and faster than manual detection. This paper presents a new CADe system using neuro-evolutional approach. The proposed method is focused on machine learning algo...
Article
Full-text available
Zero-shot learning (ZSL) is a learning paradigm that tries to develop a recognition model to recognize mutually exclusive training and testing classes. To recognize mutually exclusive classes, some kind of correlation between training and testing classes are required. This paper proposed an inductive solution of the ZSL problem in two stages: (1) a...
Article
Full-text available
Visual object tracking is a core research area in the field of pattern recognition and computer vision. It becomes one of the most significant tasks in computer vision application. But tracking of a visual object is not an easy task as it is always restricted by appearance change, illumination, occlusion and so on. Object tracking based on principa...
Article
Full-text available
Currently, visual object tracking is a core research area as it can be applied in many applications of computer vision. However, tracking of a visual object is a difficult task as it can go through different varying conditions like occlusion of the target object, appearance variation, illumination variation, etc. during the tracking process. An eff...
Article
Full-text available
A peculiar Indian Script Meitei Mayek has experienced a resurgence in the last few years and gets very little attention in handwriting research due to recently insurgence and limited sources. The objective of this paper is two folds; firstly, develop two different datasets: Mayek27 having 4900 isolated Meitei Mayek alphabets and MM (Meitei Mayek) d...
Article
Full-text available
This paper presents the text line and word segmentation from unconstrained handwritten documents based on horizontal projection histogram (HPH) to detect mid-points and gap trailing between lines. The midpoints are estimated from the HPH for the first 100 to 200 columns of the whole document. Then, considering the mid-points, the gap is tracked bet...
Article
The problem of searching a similar pattern is an exciting and challenging research field of pattern recognition. The intelligence of humans for vision to read is a crucial phenomenon for machine simulation and has been carried out for a few decades. Therefore, in this article, a recognition system of handwritten Meitei Mayek (Manipuri script) is in...
Preprint
Full-text available
The proposed method is a switching vector median filter that utilizes suitable noise detection and restoration algorithms for different impulse noise densities. It works in a multistage manner with an enhancing accuracy of noise detection in each successive stage. The processing window is initially categorized into a non-edge-window and an edge-win...
Article
Full-text available
CHARACTERIZATION AND SPECTRAL ANALYSIS OF NICKEL(II), COBALT(II) AND COPPER(II) COMPLEX WITH LEWIS BASES
Chapter
Image annotation plays a vital role in dealing with effective organization and retrieval of a large number of digital images. Multi-instance multi-label (MIML) learning can deal with complicated objects by solving the ambiguity in both input and output space. Image bag generator is a key component of MIML algorithms. A bag generator takes an image...
Chapter
Handwritten character recognition is an essential field in pattern recognition. Its popularity is increasing with the potential to thrive in various applications such as banking, postal automation, form filling, etc. However, developing such a system is a challenging task with the diverse writing style of the same character, and present of visually...
Article
Clustering technique is used in image segmentation because of its simple and easy approach. However, the existing clustering techniques required prior information as input and the performance are entirely dependent on this prior information, which is the main drawback of the clustering approaches. Therefore, many researchers are trying to introduce...
Article
Full-text available
Visual object tracking based on the principal component analysis (PCA) has been widely used in the last few decades as it deals with appearance changes caused by in-plane rotation, out-of-plane rotation, illumination variation and motion blur. But this method fails to handle partial occlusion problem. Also, it has computational complexity and speed...
Article
This paper proposes a unique Red-Cyan Anaglyph image watermarking using DWT, Fast Walsh Hadamard transform and SVD. Watermarking of this particular image is not done extensively so far. Thus, this study focuses on the watermarking of red-cyan anaglyph image for copyright protection. With the help of DWT, Hadamard transform and SVD, the system tries...
Article
Full-text available
In this paper, we use the local texture descriptor and projection histogram feature for handwritten Meitei Mayek (Manipuri script) recognition. The different variations of the local binary pattern (LBP) namely, uniform LBP (ULBP), improved LBP (ILBP), center-symmetric LBP (CS-LBP) account for local texture descriptors. These features along with the...
Article
Full-text available
With the advancement in technology, digital data such as image, video, etc. can be easily manipulated. Image hashing is a method that can be used for authentica-tion and identification of digital images. In this communication , a robust image hashing technique is proposed using scale invariant feature transform (SIFT), singular value decomposition...
Chapter
MRI images are a very rich source of texture. Analysis of texture is crucial for the automation of tumor detection from MRI images. By analyzing what information a specific texture analysis method exploits to construct a feature vector, this chapter presents various texture analysis methods, understanding the ingredients of these methods and recogn...
Article
Full-text available
This paper presents a novel two-stage filtering algorithm for removing impulse noise in color images. Quaternion theory is used to represent the intensity and chromaticity differences of two color pixels. Use of quaternion treats color pixels as vectors and processes color images as single unit rather than as separated color components. This preser...
Research
The dawn of Internet of Things (IoT) has started its journey for new era of smart and portable devices. IoT is regarded as hard-core for integrating various sensors, microcontrollers and all sorts of communication protocols .IoT has laid the foundation for futuristic communication standard i.e. Human-Things Interaction. One of the aim of this resea...
Article
Full-text available
Speckle, a multiplicative noise, is an inherent property of ultrasound imaging. It reduces the contrast and resolution of the ultrasound images. Thus, it creates a negative effect on image interpretation and diagnostic tasks. In this paper, a modified non-local means filter using Bhattacharyya distance is proposed. In the non-local mean, noise free...
Article
Full-text available
Pulmonary nodule detection is an image processing approach to detect lung cancer from thoracic computed tomography (CT) images. Lung segmentation is the first step to segment lung regions from CT images. Nodule candidates are detected from the segmented lung regions. Further, nodule classification is performed to identify the true nodules from the...
Article
Full-text available
The proposed method is a switching vector median filter that utilizes suitable noise detection and restoration algorithms for different impulse noise densities. It works in a multistage manner with an enhancing accuracy of noise detection in each successive stage. The processing window is initially categorized into a non-edge-window and an edge-win...
Article
Full-text available
Image processing techniques are widely used in several medical areas for early detection and treatment especially in the detection of various cancer tumors such as Squamous, Adenocarcinoma, Large Cell Carcinomas and Small Cell Lung Cancer. Segmentation of lung tissues from Computed Tomography (CT), image is considered as a pre-processing step in Lu...
Article
Full-text available
This paper presents a two-stage impulse noise removal filter from medical images. Quaternion is used to represent differences of two pixels. The pixels are sorted and assigned a rank based on the aggregated sum of pixel differences with other pixels inside the filtering window. The central pixel is considered as corrupted by an impulse if its rank...
Article
Synthetic aperture radar (SAR) images are contaminated by multiplicative speckle noise, which reduces the contrast and resolution of the images. To improve the quality and the performance of quantitative image analysis, speckle reduction is a prerequisite for SAR images. In this paper, a new method is proposed by calculating the expected value of a...
Article
Full-text available
This paper proposes a blind and robust video watermarking algorithm for copyright protection of the video in the wavelet transform. The watermark bit is embedded by modifying two random high frequency coefficients in the first level discrete wavelet transform of the frames of the video. The watermark is encrypted before embedding by using the cat m...
Article
Full-text available
Equations 9 and 10 in the original publication of this article contained an error. The correct equations are presented in this correction article.
Article
Full-text available
This research aims to work on the specific medical domain. In this work, retrieval of the head–neck medical images from a database is discussed. Content-based medical image retrieval system (CBMIR) is used for retrieving the head–neck images. CBMIR is automatic and more efficient compared with the text-based approach. Shape and texture features are...
Chapter
This paper presents retrieval of hepatobiliary images based on content-based medical image retrieval techniques. Hepatobiliary images are related to hepatobiliary diseases. Hepatobiliary diseases include a group of diseases related to liver and biliary system. Different types of databases are constructed for storing hepatobiliary images. For featur...
Article
Cipher images that are generated using encryption algorithms are noise-like image, which shows a clear indication for the presence of encrypted data. The noise-like image lures an adversary to carry out attacks. An approach for the generation of visually meaningful multiple-image encryption scheme is presented in this paper. Multiple cipher image d...
Article
A blind and robust video watermarking algorithm for copyright protection of the videos in the discrete wavelet transform is proposed in this paper. Each frame of the video is decomposed and binary watermark bit is embedded in high frequency coefficients. For better security, the watermark is encrypted prior to embedding using the cat map. Scale inv...
Article
Full-text available
This article propose a Neuro-fuzzy multi-criteria decision-making framework which uses the merits of both Neural Network and Fuzzy approach. The objective of this work is to enable policy maker to select the best hydro power plant installation site by considering important criteria like Ecological and Environmental Impact, Hostility, Socioeconomic...
Article
Elliptic curve analogue ElGamal encryption scheme requires encoding of the plain message onto elliptic curve coordinate using Koblitz encoding technique before encryption operation. The paper proposes a medical image encryption scheme using improved ElGamal encryption technique. A new finding has been made in the proposed method where separate calc...
Article
Full-text available
The paper proposes a shot boundary detection system using Gist and local descriptor. Gist provides the perceptual and conceptual information of a scene. The proposed system can be roughly divided into three steps. The first step consists of forming of groups of frames by calculating the correlation of the Gist features between consecutive frames of...
Article
Full-text available
The paper proposes a robust and blind watermarking scheme based on visual cryptography for copyright protection of digital images. It shuffles the pixel locations of the binary watermark using Arnold cat map transform to realize the effect of encryption for better security and it divides the image into blocks of equal size. Two secret shares are ge...
Article
Full-text available
This paper proposes a novel, robust and efficient blind three-dimensional anaglyph image-watermarking scheme for copyright protection which utilizes the nonsubsampled contourlet transform and principal component analysis for embedding and extracting a binary watermark. The binary watermark is encrypted or scrambled using Arnold transform so as to g...
Article
Full-text available
Objective: To detect copy-move forgery from a given digital image by reducing false detection thus increasing precision rate and F1 score. It is also invariant to scaling, rotation, noise attack. Methods/Analysis: The paper describes an effective and novel method to detect the copy-move forgery detection using Singular Value Decomposition (SVD) and...
Article
Full-text available
Every energy system which we consider is an entity by itself, defined by parameters which are interrelated according to some physical laws. In recent year tremendous importance is given in research on site selection in an imprecise environment. In this context, decision making for the suitable location of power plant installation site is an issue o...
Article
The paper cryptanalyses the symmetric key image encryption scheme proposed by Mrinal et al. [1]. The encryption scheme proposed by Mrinal et al. uses Rossler chaotic system for generating three chaotic sequences which are used for creating the cipher image. A secret key of 128 bits is used to generate the initial conditions for the Rossler chaotic...
Article
Full-text available
This paper aims to develop visual-content based medical image retrieval technique to search and retrieve ear images from the medical image database. Content based medical image retrieval system search and retrieve images which are perceptually similar to query images from the image database. In this paper, features are extracted using discrete wave...
Article
Full-text available
This paper proposes a new watermarking algorithm based on the shuffled singular value decomposition and the visual cryptography for copyright protection of digital images. It generates the ownership and identification shares of the image based on visual cryptography. It decomposes the image into low and high frequency sub-bands. The low frequency s...
Article
Full-text available
A new adaptive switching algorithm is presented where two adaptive filters are switched correspondingly for lower and higher noise ratio of the image. An adaptive center weighted vector median filter is used for the lower noise ratio whereas for higher noise ratio the noisy pixels are detected based on the comparison of the difference between the m...
Article
Full-text available
In computer vision application, detecting moving object in a video sequence is considered as a critical task as a moving object detection is very necessary for many video applications like video surveillance, traffic monitoring, object tracking etc. Many different methods have been proposed in recent years to differentiate the moving object and the...
Article
Objectives: The objective of this paper is to find out the abrupt transitions between consecutive shots in a video with less false detection and high F1 score. Method/Analysis: This paper presents a video shot boundary detection approach using Gray Level Cooccurrence Matrix (GLCM). The proposed system can roughly be divided into feature extraction...
Article
Full-text available
This paper proposed a shot boundary detection approach using Genetic Algorithm and Fuzzy Logic. In this, the membership functions of the fuzzy system are calculated using Genetic Algorithm by taking preobserved actual values for shot boundaries. The classification of the types of shot transitions is done by the fuzzy system. Experimental results sh...
Article
Robust anaglyph image watermarking provides a way for copyright protection of 3D red-cyan anaglyph image by hiding a secret message or a logo into an anaglyph image. In this work, a novel robust optimized blind encrypted three dimensional red-cyan anaglyph image watermarking system is developed in which the original red-cyan anaglyph cover image is...
Article
Full-text available
Image segmentation is the classification of an image into different groups. Many researches have been done in the area of image segmentation using clustering. There are different methods and one of the most popular methods is k-means clustering algorithm. K -means clustering algorithm is an unsupervised algorithm and it is used to segment the inter...
Article
Full-text available
Million of images are transferred everyday across the network. Some of these images are confidential and we want these images to be transferred securely. Cryptography plays a significant role in transferring images securely. The exponentially hard problem to solve an Elliptic Curve Discrete Logarithm Problem with respect to key size of Elliptic Cur...
Article
Full-text available
Elliptic Curve Cryptography has been a recent research area in the field of Cryptography. It provides higher level of security with lesser key size compared to other Cryptographic techniques. A new technique has been proposed in this paper where the classic technique of mapping the characters to affine points in the elliptic curve has been removed....
Article
A robust and blind watermarking scheme based on visual cryptography for copyright protection of digital images is proposed in this paper. It generates two shares of the secret image based on visual cryptography by comparing the pixel value of the image with the mean of the pixel values in each image block. The experimental results show that the pro...
Conference Paper
A new adaptive switching approach is presented in which the detection of noise is based on entropy of the pixels. Then the detected noisy pixels are replaced with the output of a fuzzy weighted filter. With a little increase in computational complexity over the basic Vector median filter and its varieties, this technique works well both in lower an...
Article
It is almost impossible to distinguish between the original and manipulated images subjectively due to the growth in technologies. The main aim of this paper is to develop a robust hash function, which can withstand legitimate modifications. A robust hash algorithm based on scale-invariant feature transform (SIFT) and singular value decomposition (...
Conference Paper
There has been an extensive growth in the area of digital image processing. One of the main issues in the real world is to judge the authenticity of a given image. Nowadays it is very easy to tamper and forge digital image with the advancement of the powerful digital image processing software and easy availability of the tools. The most common form...
Conference Paper
Full-text available
This paper presents a short survey on video segmentation. Due to the growth in multimedia information, an effective video indexing and video retrieval is necessary. This can be achieved when an effective video segmentation tools and algorithms are available. MPEG-compressed videos are mostly used by researchers for video segmentation. Shot boundary...