Multi Modal Hybrid Image Fusion using Discrete Wavelet and Contourlet Transform
Latha B. M1, Manjula B. K2, Venkata Sumana C. H3

1Dr. Latha B M, Dept. ECE, GMIT, Davanagere, India
2Manjula B K, Dept. ECE, GMIT, Davanagere, India
3Venkata Sumana CH, Dept. ECE, GMIT, Davanagere, India

Manuscript received on 02 July 2019 | Revised Manuscript received on 09 July 2019 | Manuscript published on 30 August 2019 | PP: 2206-2210 | Volume-8 Issue-10, August 2019 | Retrieval Number: J94180881019/2019©BEIESP | DOI: 10.35940/ijitee.J9418.0881019
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: Now in the era of artificial intelligence and digitalisation financial sector is adopting various digital tools in their products and services offerings. That’s why user acceptance of technology in the financial sector has became the important field of the study. Internet banking, mobile banking,ATM,cash deposit machines, instant payment services, online trading in stock markets, online funds transfers,E-wallets,wealth management, peer to peer lending,blockchain technology are various fintech products and services. This study is an attempt to analyse the users acceptance of technology in their financial management decisions by using cognitive computational model. Cognitive computing provides a great opportunity for users to understand the true nature of risk for the industry especially new upcoming risk such as cyber security. This study mainly focuses on how different cognitive factors such as perceived expenditure, ease of time, level of risk, service quality, frequent use of automated tools, socio cultural factors, perceived trust, perceived usability and perceived convenience to use influence the users motive to adopt and utilise the Financial Technology.
Keywords: Image fusion, Computed tomography, Magnetic resonance angiography, Discrete wavelet and contourlet, Entropy
Scope of the Article: Image Security