i-manager's Journal on Image Processing (JIP)


Volume 10 Issue 3 July - September 2023

Research Paper

Ensuring Integrity in Online Exams with AI Anti-Cheat System

Chikondi Phiri* , G. Glorindal**
*-** DMI St. John the Baptist University, Lilongwe, Malawi.
Phiri, C., and Glorindal, G. (2023). Ensuring Integrity in Online Exams with AI Anti-Cheat System. i-manager’s Journal on Image Processing, 10(3), 1-9. https://doi.org/10.26634/jip.10.3.20109

Abstract

The COVID-19 pandemic has compelled radical and innovative reforms and Education and academia have been identified as sectors most adversely affected by the pandemic. Disrupting the age-old classroom setup, the pandemic has forced educational institutions such as schools and universities to implement 'online classes.' However, the evaluation aspect of education remains to be desired. Many automatic online exam proctoring systems have been proposed for online examinations during this COVID-19 pandemic, but they have certain limitations, including fewer and inaccurate functionalities. In this paper, a smart exam monitoring system is presented that addresses many of the problems with past systems, aiming to help institutions prevent malpractices during exams. This smart exam monitoring system leverages advanced AI algorithms to monitor online exams in a more precise and comprehensive manner. It can detect various forms of cheating, such as screen sharing and unauthorized resource access, while also ensuring a fair evaluation process. By integrating cutting-edge technology into the education sector, the aim is to uphold the integrity of online examinations and adapt to the challenges posed by the ongoing COVID-19 pandemic.

Research Paper

Hyper Chaos Followed by DCT and Gyrator Transform for Image Encryption

Thamizhmaran K.*
Department of Electronics and Communication Engineering, Government College of Engineering, Bodinayakkanur, Theni, India.
Thamizhmaran, K. (2023). Hyper Chaos Followed by DCT and Gyrator Transform for Image Encryption. i-manager’s Journal on Image Processing, 10(3), 10-16. https://doi.org/10.26634/jip.10.3.20126

Abstract

Color images can be encrypted using a hyperchaotic system in the Discrete Cosine Transform (DCT) and gyrator transform domains. These encryption techniques provide an added layer of security to protect sensitive image data from unauthorized access or tampering. The Red, Green, And Blue (RGB) components of the original color image are encoded into two-dimensional streams, respectively. These two-dimensional streams, representing the RGB components, are then processed by the display or printing device to recreate the full-color image. This paper proposes a new image encryption scheme that integrates DCT and the gyrator transform simultaneously. This innovative approach enhances the security and robustness of image encryption, making it suitable for a wide range of applications in data protection and transmission. Specifically, four chaotic sequences generated by a hyperchaotic system are blended into streams to synthesize complex sequences. Subsequently, the two-dimensional complex streams are scrambled using the discrete cosine transform and encoded back into an image format. Finally, the parameters in the hyperchaotic system using DCT and the gyrator transform improve the security of the proposed scheme. Theoretical and experimental analyses both confirm the security and validity of the proposed work.

Review Paper

A Review on the Effectiveness of Driver Drowsiness Detection System using Computerised Devices

Louis Twali Mugisha* , G. Glorindal**
*-** DMI - St. John the Baptist University, Mangochi, Malawi.
Mugisha, L. T., and Glorindal, G. (2023). A Review on the Effectiveness of Driver Drowsiness Detection System using Computerised Devices. i-manager’s Journal on Image Processing, 10(3), 17-26. https://doi.org/10.26634/jip.10.3.20055

Abstract

Driver drowsiness is a critical factor contributing to road accidents worldwide, with potentially devastating consequences. To mitigate this problem, numerous driver drowsiness detection systems have been developed, employing various computerized devices and technologies. The development of technologies for detecting drowsiness is a major challenge in the field of accident-avoidance systems. Since the dangers of drowsiness exist on the road, techniques need to be advanced to prevent its consequences. The most crucial aspect of this work is to develop a drowsiness detection system by tracking the driver's eyes. It is believed that signs of driver exhaustion can be detected early enough to prevent a car accident. This technology aims to enhance road safety by alerting drivers or triggering safety measures when drowsiness is detected, ultimately saving lives and preventing accidents. Detecting fatigue involves observing eye movements and blink patterns. This review aims to provide an in-depth analysis of the effectiveness of these systems in identifying and alerting drowsy drivers, ultimately enhancing road safety. The analysis of facial images is a popular research area with applications such as face recognition and human identification security systems. Furthermore, this review delves into the various methodologies and algorithms used in driver drowsiness detection, including machine learning, image analysis, and signal processing techniques. It also highlights the need for further research to address the challenges and limitations faced by these systems and suggests potential avenues for improvement.

Review Paper

A Review on Face Mask Detection using Image Processing

Anirban Chatterjee* , Shikha Singh**
*-** Dr. C.V. Raman University, Kota, Bilaspur, Chhattisgarh, India.
Chatterjee, A., and Singh, S. (2023). A Review on Face Mask Detection using Image Processing. i-manager’s Journal on Image Processing, 10(3), 27-34. https://doi.org/10.26634/jip.10.3.20041

Abstract

Face identification becomes an extremely challenging task, while wearing masks since some aspects of the face are obscured, making it crucial to develop advanced facial recognition technologies that can handle these complex scenarios effectively. The purpose of this paper is to offer an overview of several different approaches and algorithms that are utilized for human recognition when a face mask is applied. In this study, a number of distinct methodologies, including the Haar cascade, Adaboost, VGG-16 CNN Model, and others, are discussed. These approaches are compared side by side in order to determine which one has the best chance of success. It is possible that in the not too distant future, with the continued development of technology and the passage of time, more trustworthy methods for human recognition while wearing a face mask will come into use. It describes some of the practical uses of face detection and highlights the potential for advancements in reliable methods for human recognition even when individuals are wearing face masks. This technology has a variety of uses in public areas, schools, and other settings where persons need to be recognized despite wearing face masks in order to assist society. Facial recognition technology can also enhance security and streamline access control processes in a wide range of applications, from airports to corporate offices.

Concept paper

A Mobile App for Removing Duplicate Multimedia Images

Manikant Thakur* , Sankalp Tiwari**, Vipin Yadav***, Anand Khandare****
*-**** Department of Computer Engineering, Thakur College of Engineering and Technology, Mumbai, India.
Thakur, M., Tiwari, S., Yadav, V., and Khandare, A. (2023). A Mobile App for Removing Duplicate Multimedia Images. i-manager’s Journal on Image Processing, 10(3), 35-42. https://doi.org/10.26634/jip.10.3.19467

Abstract

With the development of multimedia technology and the popularity of smartphones, the collection of multimedia information from various applications has rapidly grown. This information encompasses text, images, video, and audio compositions. This multimedia information has not only transformed the way we communicate and share content but has also posed new challenges and opportunities in fields such as data analysis, content creation, and information management. Consequently, multimedia education has become the focal point for research institutions and businesses. The modern solution faces two main challenges: expensive uptime and comparative speed. Therefore, this study first introduces a washing method called Permutation (OPH) to reduce expensive working time. Furthermore, the study explores innovative techniques to enhance the comparative speed of the modern solution, ultimately aiming to achieve a more efficient and cost-effective system. With the OPH, a permutation wash (GOPH) has been developed, along with several useful techniques to address pressure changes. This development is based on the fact that most multimedia files differ from one another. A new hashing method, known as Hierarchical Permutation Hash (HOPH), has been created to enhance productivity. Extensive testing with real multimedia files clearly demonstrates that HOPH is five to seven times faster than Minis' while maintaining the same level of accuracy. HOPH achieves this remarkable speed improvement by efficiently leveraging hierarchical structures in data, making it a promising solution for a wide range of multimedia applications.