An Analysis of Region Growing Image Segmentation Schemes

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-34 Number-1
Year of Publication : 2016
Authors : Dr. Amit Chaturvedi, Rashi Khanna, Vikas Kumar
  10.14445/22312803/IJCTT-V34P108

MLA

Dr. Amit Chaturvedi, Rashi Khanna, Vikas Kumar "An Analysis of Region Growing Image Segmentation Schemes". International Journal of Computer Trends and Technology (IJCTT) V34(1):46-51, April 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Region growing is a simple region-based image segmentation method. It is also classified as a pixel-based image segmentation method since it involves the selection of initial seed points of images. It also groups the pixels in whole image into sub regions (i.e. set to sub sets). This paper describes the various schemes of segmentation based visual cryptography and clear state that no proper method / schemes / techniques are used for proper type of images. In this paper, we have analyzed the region growing based image segmentation and the seeded growing area , but the quality of image is totally depend upon the way of selecting the seed i.e. automatically and manual way. As the seeded region growing techniques is gaining more popularity in practical day by day especially in medical images.

References
[1] Harikrishna Rai G.N, 2 T.R.Gopalakrishnan Nair, Gradient Based Seeded Region Grow method for CT Angiographic Image Segmentation InterJRI Computer Science and Networking, Vol. 1, Issue 1, July 2009
[2] Rajeshwar Dass, Priyanka, Swapna Devi “Image Segmentation Techniques” IJECT Vol. 3, Issue 1, Jan.- march 2012.
[3] Med Ali Hamdi Ecole Nationale Modified Algorithm Marker-Controlled Watershed Transform for Image Segmentation Based on Curvelet Threshold Middle-East Journal of Scientific Research 20 (3): 323-327, 2014, ISSN 1990-9233
[4] O. Ojo and Seleman M. Ngwira Image Segmentation, Available Techniques, Developments and Open Issues Canadian Journal on Image Processing and Computer Vision Vol. 2, No. 3, March 2011
[5] Blakley, G. R.,“Safeguarding cryptographic keys”, Proceedings of the National Computer Conference, pp: 313– 317, 1979.
[6] Naor M., and Shami, A. 1994, Visual cryptography, Eurocrypt’94, Lecture Notes in Computer Science, vol. 950, pp. 1–12.
[7] B.Saichandra.et. al, A New visual cryptography scheme for color images international journal of engineering science and technology vol 2 (6), 2010, 1997-2000.
[8] David Boen, “Segmenting 2d ultrasound images using seeded region growing”, 2006.
[9] T. Monoth and A. P. Babu, “Recursive Visual Cryptography Using Random Basis Column Pixel Expansion”, In Proceedings of IEEEInternational Conference on Information Technology, 2007, pp. 41-43.
[10] Bernd Borchert, Klaus Reinhardt: Abh•or- und manipulationssichere Verschl•usselung f•ur Online Accounts. Patent application DE-10-2007-018802.3, 2007 [Gr07]
[11] Geum-Dal Park, Eun-Jun Yoon , Kee-Young Yoo “A New Copyright Protection Scheme with Visual Cryptography”, 2008 Second International Conference on Future Generation Communication and Networking Symposia, 2008.
[12] Debasish Jena, Sanjay Kumar Jena, “A Novel Visual Cryptography Scheme”, International Conference on Advanced Computer Control, 2008.
[13] Jen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Ya-Fen Chang, Yen-Ping Chu, , 2008 “Visual Secret SharingFor Multiple Secrets”, Pattern Recognition 41 ,pp. 3572 – 3581.
[14] Daoshun Wang, FengYi, XiaoboLi, 2009“On General Construction For Extended Visual Cryptography Schemes”,Pattern Recognition 42 (2009),pp 3071 – 3082,
[15] J. Padhye, V. Firoiu, and D. Towsley, “A stochastic model of TCP Reno congestion avoidance and control,” Univ. of Massachusetts, Amherst, MA, CMPSCI Tech. Rep. 99-02, 1999.
[16] J. Weir and W. Yan. Resolution variant visual cryptography for street view of google maps. In Proceedings of the ISCAS, pages 1695{1698, 2010.
[17] T.R.Gopalakrishnan Nair Harikrishna Rai G.N. Gradient based seeded region grow method for ct angiographic image segmentation. 2011.
[18] R.K.Krishna2 Shilpa Kamdi1. Image segmentation and region growing algorithm. pages 103-107.
[19] Sunday O.Ojo Tranos Zuva, Oludayo O. Olugbara and Seleman M. Ngwira. Image segmentation, available techniques, developments and open issues. pages 20-29, 3, March 2011.
[20] S. Cimato and C.N. Yang. Visual cryptography and secret image sharing. CRC Press,Taylor & Francis, 2011.
[21] Vaibhav Choudhary, Kishore Kumar, Pravin Kumar, D.S. Singh “ An Improved Pixel Sieve Method for Visual Cryptography”, International Journal of Computer Applications Volume 12– No.9, January 2011
[22] Masakazu Higuchi, Aya Emori, Shuji Kawasaki, Jonah Gamba, Atsushi Koike and Hitomi Murakami “Image Encryption Methods Using Intensity Transformations in Visual Cryptography”, INTERNATIONAL JOURNAL OF MATHEMATICS AND COMPUTERS IN SIMULATION Issue 1, Volume 5, 2011
[23] Sesha Pallavi Indrakanti,Venkata Vinay Pragada, P.S.Avadhani,“Multiple Image Secret Sharing Scheme”, 20th International Conference on Software Engineering and Data Engineering (SEDE-2011), Las Vegas, USA, on June 20-22. pp. 155-159, 2011,
[24] Sesha Pallavi Indrakanti, Avadhani P.S.,“A Novel Multiple Visual Secret Data Hiding Scheme”, International Journal of Computer Science and Information Technologies (IJCSIT), Vol. 2 (4) , july-August’2011, pp. 1423-1426.
[25] A. Ross and A. A. Othman, “Visual Cryptography for Biometric privacy”, IEEE Transaction on Information Forensics and Security, vol. 6, no. 1, Mar.2011.
[26] Sesha Pallavi Indrakanti, P.S.Avadhani,“Segment Based Visual Cryptography For Key Distribution”, International Journal of Computer Science and Engineering Survey (IJCSES), Vol. 3, No. 1, February 2012, pp.105-111.
[27] Sesha Pallavi Indrakanti, Avadhani P S.,“Privacy preserving through segment based visual cryptography”, Advanced Computing: An International Journal (ACIJ ), Vol. 3, No. 4, July 2012, pp. 95-103.
[28] M.Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT, 1994, pp. 1–12. International Journal of Distributed and Parallel Systems (IJDPS) Vol.3, No.1, January 2012 218.
[29] V. Vaithiyanathan a 1 nd 2U. Rajappa “A Comparitive Analysis among Basic Image Segmentation Methods” World Applied Sciences Journal 29 (Data Mining and Soft Computing Techniques): 155-158, 2014 ISSN 1818-4952
[30] I.D JUDITH Dr.G. J. Joyce Mary “ANTI PHISHING METHOD USING VISUAL SECRET IMAGES” International Journal of Innovative Research in Advanced Engineering (IJIRAE) ISSN: 2349-2163Issue 1, Volume 2 (January 2015).
[31] R.V.Prasad CH1, S.Suresh Nimra Nagar,Ibrahimpatnam,Vijayawad A COMPREHENSIVE IMAGE SEGMENTATION APPROACH FOR IMAGE REGISTRATION, International Journal of Computer Trends and Technology- volume3Issue4- 2012

Keywords
Image segmentation, region growing, security, seeded growing region, thresholding, fuzzy clustering.