Archana A. Athawale

Learn More
— Always the thrust for better and faster image retrieval techniques has nourished the research in content based image retrieval. The paper presents 32 novel image retrieval techniques using the feature vectors obtained by applying Walsh transform on row mean and column mean of full image, four fragments, sixteen fragments and 64 fragments of image. All the(More)
Steganography, derived from Greek, literally means "covered writing". It includes a vast array of secret communications methods that conceal the message's very existence. These methods include invisible inks, microdots, character arrangement, digital signatures, covert channels, and spread spectrum communications. Pixel Value Differencing (PVD)[8] was(More)
This paper proposes a novel Kekre's Wavelet (KW) transform which is generated from Kekre's transform. Kekre's Wavelet transform can be used for various applications in image processing. Steganography using Kekre's Wavelet transform is implemented to show one of its applications in this area. The full cover image is transformed using Kekre's Wavelet(More)
This paper proposes algorithm to generate discrete wavelet transform from any orthogonal transform. The wavelet analysis procedure is to adopt a wavelet prototype function, called an analyzing wave or mother wave. Other wavelets are produced by translation and contraction of the mother wave. By contraction and translation infinite set of functions can be(More)
The paper discusses novel image retrieval methods based on shape features extracted using gradient operators and slope magnitude technique with Block Truncation Coding (BTC). Four variations of proposed 'Mask-Shape-BTC' image retrieval techniques are proposed using gradient masks like Robert, Sobel, Prewitt and Canny. The proposed image retrieval techniques(More)
Steganography is the practice of encoding secret information in indiscernible way. Audio Steganography is a technique used to transmit hidden information by modifying an audio signal in an imperceptible manner. It is mainly required for increasing security in transferring and archiving of audio files. Steganography complements rather than replaces(More)
This paper proposes a steganalysis technique for both grayscale and color images. It uses the feature vectors derived from gray level co-occurrence matrix (GLCM) in spatial domain, which is sensitive to data embedding process. This GLCM matrix is derived from an image. Several combinations of diagonal elements of GLCM are considered as features. There is(More)
The paper discusses novel image retrieval methods based on edge texture of images extracted using morphological operators. The existing CBIR techniques are based on the feature vectors extracted from morphological edge extraction techniques such as simple morphological edge extraction technique, Top-Hat transform and Bottom-Hat transform. The proposed CBIR(More)
There is no exact solution for colorization of grayscale images. In the initial work done [23], color traits transfer techniques to color grayscale images are proposed. The main focus of the techniques [23] is to minimise the human efforts needed in manually coloring the grayscale images. The human interaction is needed only to find a reference color image,(More)