Classification and Detection of retinal hemorrhages by Using Moment Invariants and Gray-Level Based Features

Authors(2) :-Godlin Atlas L, Kumar Parasuraman

Diabetes happens when the pancreas fails to release enough insulin, step by step affecting the retina of the human eye. As it propels, the vision of a patient starts separating, inciting diabetic retinopathy. In such way, retinal pictures acquired through fundal camera help in analyzing the outcomes, nature, and status of the effect of diabetes on the eye. The objectives of this examination are to (I) perceive vein, (ii) recognize hemorrhages and (iii) describe various periods of diabetic retinopathy into commonplace, coordinate and no proliferative diabetic retinopathy (NPDR). The commence of the gathering of different periods of diabetic retinopathy is the ID and estimation of veins and hemorrhages present in the retinal picture. Its ask for to this record (despite when the NN was set up on the DRIVE database) outmaneuvers all analyzed division approaches. Its ampleness and power with different picture conditions, together with its ease and speedy execution, influence this vein division to recommendation fitting for retinal picture PC examinations, for instance, robotized screening for early diabetic retinopathy area.

Authors and Affiliations

Godlin Atlas L
Research Scholar, Manonmaniam Sundaranar University, Abishekapatti, Tirunelveli, Tamilnadu, India
Kumar Parasuraman
Assistant Professor, Centre for Information Technology and Engineering, Manonmaniam Sundaranar University, Abishekapatti, Tirunelveli, Tamilnadu, India

Diabetic Retinopathy, Exudates, Image Processing, Classification, Diabetic Retinopathy

  1. Heer, T., Garcia-Morchon, O., Hummen, R., Keoh, S.L., Kumar, S.S. and Wehrle, K., 2011. Security Challenges in the IP-based Internet of Things. Wireless Personal Communications, 61(3), pp.527-542.
  2. Liu, Jing, Yang Xiao, and CL Philip Chen. "Authentication and access control in the internet of things." In Distributed Computing Systems Workshops (ICDCSW), 2012 32nd International Conference on, pp. 588-592. IEEE, 2012.
  3. Zhao, Kai, and Lina Ge. "A survey on the internet of things security." In Computational Intelligence and Security (CIS), 2013 9th International Conference on, pp. 663-667. IEEE, 2013.
  4. Zolanvari, Maede, and R. Jain. "IoT Security: A Survey." (2015).
  5. Zhang, Z.K., Cho, M.C.Y., Wang, C.W., Hsu, C.W., Chen, C.K. and Shieh, S., 2014, November. IoT security: ongoing challenges and research opportunities. In Service-Oriented Computing and Applications (SOCA), 2014 IEEE 7th International Conference on (pp. 230-234). IEEE.
  6. I. Blake, G. Seroussi, and N. Smart. Elliptic Curves in Cryptography. Cambridge University Press, 1999.
  7. A. K. Ranjan, V. Kumar, and M. Hussain. Security analysis of TLS authentication. In Proc. of Int. Conf. on Contemporary Computing and Informatics (IC3I), pages 1356–1360, Nov. 2014.
  8. Matharu, Gurpreet Singh, Priyanka Upadhyay, and Lalita Chaudhary. "The Internet of Things: challenges & security issues." In Emerging Technologies (ICET), 2014 International Conference on, pp. 54-59. IEEE, 2014.
  9. Park, Chang-Seop. "A Secure and Efficient ECQV Implicit Certificate Issuance Protocol for the Internet of Things Applications." IEEE Sensors Journal 17, no. 7 (2017): 2215-2223.
  10. Borgohain, Tuhin, AmardeepBorgohain, Uday Kumar, and SugataSanyal. "Authentication systems in Internet of Things." arXiv preprint arXiv:1502.00870 (2015).
  11. Alrawais, Arwa, Abdulrahman Alhothaily, and Xiuzhen Cheng. "X. 509 Check: A Tool to Check the Safety and Security of Digital Certificates." In Identification, Information, and Knowledge in the Internet of Things (IIKI), 2015 International Conference on, pp. 130-133. IEEE, 2015.
  12. Chau, Sze Yiu, Omar Chowdhury, Endadul Hoque, Huangyi Ge, Aniket Kate, Cristina Nita-Rotaru, and Ninghui Li. "SymCerts: Practical Symbolic Execution For Exposing Noncompliance in X. 509 Certificate Validation Implementations." In Security and Privacy (SP), 2017 IEEE Symposium on, pp. 503-520. IEEE, 2017.
  13. S. Acharya, A. Polawar, P. Pawar, “Two factor authentication using smartphone generated one time password”, IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 11(2), (May-Jun. 2013), pp. 85-90.
  14. Schukat, Michael, and Pablo Cortijo. "Public key infrastructures and digital certificates for the Internet of things." In Signals and Systems Conference (ISSC), 2015 26th Irish, pp. 1-5. IEEE, 2015.
  15. R. Roman, P. Najera, J. Lopez, "Securing the Internet of Things," Computer , vol.44, no.9, pp.51,58, Sept. 2011
  16. Hui Suo Jiafu Wan Caifeng Zou Jianqi Liu,”Security in the Internet of Things: A Review”2012 International Conference on Computer Science and Electronics Engineering
  17. X. Xu, "Study on Security Problems and Key Technologies of the Internet of Things," Computational and Information Sciences (ICCIS), 2013 Fifth International Conference on , vol., no., pp.407,410, 21-23 June 2013 doi: 10.1109/ICCIS.2013.114
  18. Kim, E., Kaspar, D., Chevrollier, N., &Vasseur, J. P. (2011). Design and application spaces for 6LoWPANs draft-ietf-6lowpan-usecases-09. Design and application spaces for 6LoWPANs draft-ietf-6lowpan-usecases-09, January 2011
  19. Perrig, A., Szewczyk, R., Wen, V., Culler, D., &Tygar, J. D. (2002). Spins: Security protocols for sensor networks. In Wireless Networks Journal, September 2002.
  20. D Suresh K., Rizwan P. and M. Rajasekhara Babu (2016). EEIoT: Energy Efficient Mechanism to Leverage the Internet of Things (IoT), IEEE Int. Con. on Emerging Technological Trends, Kollam, pp-14-22, India.
  21. D. Granlund, C. Åhlund, and P. Holmlund, “EAP-Swift: An Efficient Authentication and Key Generation Mechanism for Resource Constrained WSNs,” Int. Journal of Distributed Sensor Networks Vol. 2015 (2015), Article ID 460914
  22. https://aws.amazon.com/documentation/
  23. Savio Sciancalepore, Student Member, IEEE, Giuseppe Piro, Member, IEEE,GennaroBoggia, Senior Member, IEEE, and Giuseppe Bianchi, Public Key Authentication and Key agreement in IoT devices with minimal airtime consumption
  24. https://www.ipa.go.jp/security/rfc/RFC3280-04EN.html
  25. SugataSanyal, Ayu Tiwari, Sudip Sanyal, “A Multifactor Secure Authentication System for Wireless Payment”, Emergent Web Intelligence: Advanced Information Retrieval, Ed: Chbeir Richard et al, First Edition, 2010, Chapter 13, pp. 341-369, XVI, Springer Verlag London Limited, 2010, DOI: 10.1007/978-1-84996-074-8_13.

Publication Details

Published in : Volume 3 | Issue 5 | May-June 2018
Date of Publication : 2018-06-30
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 985-995
Manuscript Number : CSEIT1835253
Publisher : Technoscience Academy

ISSN : 2456-3307

Cite This Article :

Godlin Atlas L, Kumar Parasuraman, "Classification and Detection of retinal hemorrhages by Using Moment Invariants and Gray-Level Based Features", International Journal of Scientific Research in Computer Science, Engineering and Information Technology (IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 5, pp.985-995, May-June-2018. |          | BibTeX | RIS | CSV

Article Preview