Mamta Juneja

ORCID: 0000-0002-2611-9005
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • Retinal Imaging and Analysis
  • AI in cancer detection
  • Glaucoma and retinal disorders
  • Digital Imaging for Blood Diseases
  • Radiomics and Machine Learning in Medical Imaging
  • Medical Image Segmentation Techniques
  • Image and Signal Denoising Methods
  • Dental materials and restorations
  • Additive Manufacturing and 3D Printing Technologies
  • Anatomy and Medical Technology
  • Advanced Neural Network Applications
  • Biometric Identification and Security
  • Brain Tumor Detection and Classification
  • Dental Radiography and Imaging
  • Advanced X-ray and CT Imaging
  • Medical Imaging and Analysis
  • Internet Traffic Analysis and Secure E-voting
  • User Authentication and Security Systems
  • Dental Implant Techniques and Outcomes
  • Bone Tissue Engineering Materials
  • Facial Trauma and Fracture Management
  • Orthodontics and Dentofacial Orthopedics

Panjab University
2016-2025

Institute of Engineering Science
2014-2023

Institute of Engineering
2021

Chandigarh University
2017-2019

University of the Punjab
2014-2019

Rayat Bahra University
2009-2010

Punjab Technical University
2009

Abstract —Edges characterize boundaries and are therefore considered for prime importance in image processing. Edge detection filters out useless data, noise frequencies while preserving the important structural properties an image. Since edge is forefront of processing object detection, it crucial to have a good understanding methods. In this paper comparative analysis various Image Detection methods presented. The evidence best detector type judged by studying maps relative each other...

10.7763/ijcte.2009.v1.100 article EN International Journal of Computer Theory and Engineering 2009-01-01

This paper discusses the design of a robust image steganography technique based on LSB (least significant bit) insertion and RSA encryption technique. Steganography is term used to describe hiding data in images avoid detection by attackers. Steganalysis method attackers determine if have hidden recover that data. The application discussed this ranks users library their suitability as cover objects for some By matching an image, there less chance attacker being able use steganalysis Before...

10.1109/artcom.2009.228 article EN 2009-01-01

10.1007/s11042-020-09929-9 article EN Multimedia Tools and Applications 2020-10-08

Purpose 3D printing techniques have been widely used for manufacturing complex parts various dental applications. For achieving suitable mechanical strength, post-cure processing is necessary, where the relative time duration and temperature specification also needs to be defined. The purpose of this study/paper assess effects post curing conditions properties printed clear aligners Design/methodology/approach Dental long-term resin material has using a Formlabs printer direct usage on...

10.1108/rpj-04-2019-0118 article EN Rapid Prototyping Journal 2020-06-17

This paper proposes an improved LSB(least Significant bit) based Steganography technique for images imparting better information security .It presents embedding algorithm hiding encrypted messages in nonadjacent and random pixel locations edges smooth areas of images. It first encrypts the secret message, detects cover-image using edge detection filter. Message bits are then, embedded least significant byte randomly selected area pixels 1-3-4 LSBs red, green, blue components respectively...

10.7763/ijcce.2013.v2.238 article EN International Journal of Computer and Communication Engineering 2013-01-01

10.1016/j.bspc.2020.102137 article EN Biomedical Signal Processing and Control 2020-08-26

Cranial reconstruction using implants is critical for protecting intracranial structures and restoring cerebral hemodynamics in cases of cranial defects caused by accidents, diseases or cancer. Patient-specific (PSIs) made from materials such as polyether-ether-ketone (PEEK), are required to be lightweight, high strength capable mimicking the natural bone structure. Effective fastening mechanisms number fixture plates essential seamless integration between PSI cavity a defected skull...

10.1177/14644207241312947 article EN Proceedings of the Institution of Mechanical Engineers Part L Journal of Materials Design and Applications 2025-01-12

Cranioplasty enables the restoration of cranial defects caused by traumatic injuries, brain tumour excisions, or decompressive craniectomies. Conventional methods rely on Computer-Aided Design (CAD) for implant design, which requires significant resources and expertise. Recent advancements in Artificial Intelligence (AI) have improved Diagnostic systems accurate faster reconstruction generation procedures. However, these face inherent limitations, including limited availability diverse...

10.3390/bioengineering12020188 article EN cc-by Bioengineering 2025-02-16

This research paper proposes a secured, robust approach of information security using steganography. It presents two component based LSB (Least Significant Bit) steganography methods for embedding secret data in the least significant bits blue components and partial green random pixel locations edges images. An adaptive is proposed on available MSB's (Most Bits) red, green, randomly selected pixels across smooth areas. A hybrid feature detection filter also that performs better to predict...

10.3745/jips.2013.9.3.405 article EN Journal of Information Processing Systems 2013-09-30

This research paper aims to propose a new improved approach for Information Security in RGB Color Images using Hybrid Feature detection technique; Two Component based Least Significant Bit (LSB) Substitution Technique and Adaptive LSB substitution technique data hiding. Advanced Encryption Standard (AES) is used provide Tier Security; Random Pixel Embedding imparts resistant attacks Filtering makes it immune various disturbances like noise. An image combination of edge smooth areas which...

10.6633/ijns.201411.16(6).07 article EN International journal of network security 2014-11-01
Coming Soon ...