Search Results - "Sarode, Tanuja"

Refine Results
  1. 1

    Fabric Defect Detection Adopting Combined GLCM, Gabor Wavelet Features and Random Decision Forest by Deotale, Nilesh Tejram, Sarode, Tanuja K.

    Published in 3D research (01-03-2019)
    “…In image analysis and pattern recognition activity, one of the most salient characteristics is texture. The global region of images in spatial domain has an…”
    Get full text
    Journal Article
  2. 2

    A new multi-resolution hybrid wavelet for analysis and image compression by Kekre, Hemant B., Sarode, Tanuja K., Vig, Rekha

    Published in International journal of electronics (02-12-2015)
    “…Most of the current image- and video-related applications require higher resolution of images and higher data rates during transmission, better compression…”
    Get full text
    Journal Article
  3. 3

    Low-Cost Eye Tracking for Foveated Rendering Using Machine Learning by Changwani, Ashay, Sarode, Tanuja

    “…This paper outlines a 50 head-mounted real-time eye tracker to track the user's eye, and uses foveated rendering reduce bandwidth costs and improve immersion…”
    Get full text
    Conference Proceeding
  4. 4

    Adaptive filtering a descreening approach for color scanned halftones by Gopale, Apeksha M., Sarode, Tanuja K.

    “…To print ceaseless tone images, Electrophotographic printers mostly use halftoning method. Scanned pictures procured from such hard transcripts are generally…”
    Get full text
    Conference Proceeding
  5. 5

    Analysis of Machine Learning Models for Stock Market Prediction by Jethani, Laksh, Patil, Ratnesh, Sanghvi, Shubh, Singh, Raj, Sarode, Tanuja

    “…With financial analysts and top institutions around the world utilising its power to derive sophisticated insights, machine learning has quickly become a…”
    Get full text
    Conference Proceeding
  6. 6

    Implementation of Exploratory Data Analysis on Weather Data by Adivarekar, Sahil, Nanwani, Shruti, Mandal, Nabanita, Sarode, Tanuja

    “…This paper presents the Exploratory Data Analysis on the climate data of the city of Mumbai. The climate variables are closely associated with each other…”
    Get full text
    Conference Proceeding
  7. 7

    Image hashing by CCQ-CSLBP by Patil, Varsha, Sarode, Tanuja

    “…Recent trends and also statistics show that the hashing concept has been gaining importance because its application lies in the area of authentication,…”
    Get full text
    Conference Proceeding
  8. 8

    Image hashing by SDQ-CSLBP by Patil, Varsha, Sarode, Tanuja

    “…Approach for image hashing is to use powerful feature descriptor which captures essence of an image. Applications of image hashing lies in the area of content…”
    Get full text
    Conference Proceeding
  9. 9

    Image hashing using AQ-CSLBP with double bit quantization by Patil, Varsha, Sarode, Tanuja

    “…This paper presents a novel image hashing method for authentication and tampering detection. Creation, modification and transfer of multimedia data becomes an…”
    Get full text
    Conference Proceeding
  10. 10

    Improved robust digital image watermarking with SVD and hybrid transform by Natu, Shachi, Natu, Prachi, Sarode, Tanuja

    “…In this paper two methods of color image watermarking are proposed. Both methods use SVD and DCT-Walsh hybrid transform. First method uses SVD on column hybrid…”
    Get full text
    Conference Proceeding
  11. 11

    Hybrid image compression using VQ on error image by Natu, Prachi, Natu, Shachi, Sarode, Tanuja

    “…Here color image is compressed using vector quantization (VQ) on transformed coefficients. First, image is compressed using hybrid wavelet transform to achieve…”
    Get full text
    Conference Proceeding
  12. 12

    Biometric watermarking using partial DCT-Walsh wavelet and SVD by Kekre, H. B., Sarode, Tanuja, Natu, Shachi

    “…Biometric has ever increasing demand in the field of security. However, integrity and security of biometric used to authenticate a legal user are the inherited…”
    Get full text
    Conference Proceeding
  13. 13

    Evaluation of Chaotic Map Lattice systems for image encryption by Chapaneri, Santosh, Chapaneri, Radhika, Sarode, Tanuja

    “…In this paper, the performance of Chaotic Map Lattice (CML) systems used for the purpose of digital image encryption is evaluated. The design and security…”
    Get full text
    Conference Proceeding
  14. 14

    Performance superiority of hybrid DKT-DCT wavelet compared to DKT, DCT individual transforms and their wavelets in image compression by Kekre, H. B., Sarode, Tanuja, Natu, Prachi

    “…This paper proposes simple and novel image compression method using transforms. Discrete cosine Transform (DCT) and Discrete Kekre Transform (DKT) are applied…”
    Get full text
    Conference Proceeding
  15. 15

    Forecasting Indian Stock Market Using Artificial Neural Networks by Kale, Ashutosh, Khanvilkar, Omkaar, Jivani, Hardik, Kumkar, Prathamesh, Madan, Ishan, Sarode, Tanuja

    “…The objective of this research is to predict the next day's opening value of Nifty-100 index of the National Stock Exchange (NSE) using Artificial Neural…”
    Get full text
    Conference Proceeding
  16. 16

    Digital image encryption using improved chaotic map lattice by Chapaneri, Radhika, Sarode, Tanuja, Chapaneri, Santosh

    “…Chaotic map lattice (CML) has been used recently for digital image encryption; however, it has several flaws in terms of irreversibility and violates some…”
    Get full text
    Conference Proceeding
  17. 17

    Robust watermarking by SVD of watermark embedded in DKT-DCT and DCT wavelet column transform of host image by Kekre, H. B., Sarode, Tanuja, Natu, Shachi

    “…Watermarking in wavelet domain and with SVD is popular due to its robustness. In this paper a watermarking technique using DCT wavelet and hybrid DKT-DCT…”
    Get full text
    Conference Proceeding
  18. 18

    Image scrambling using sinusoidal transforms for assorted color spaces using Walsh sequency by Sarode, T, Halarnkar, PN

    “…Digital images can be secured by using methods of scrambling/encryption. A number of techniques have been proposed to encrypt the digital images. One such…”
    Get full text
    Conference Proceeding
  19. 19

    An Efficient Fast Algorithm to Generate Codebook for Vector Quantization by Kekre, H.B., Sarode, T.K.

    “…In this paper we present a very simple and yet effective algorithm to generate codebook. The algorithm uses sorting method to generate codebook and the…”
    Get full text
    Conference Proceeding
  20. 20

    Hand Gesture Recognition by Daubechies Wavelet Transformation by Sarode, TK, Agrawal, P, Deshpande, G, Jogeshwar, A

    Published in IET Conference Proceedings (26-02-2016)
    “…Computer applications require interaction between humans and computers. This interaction has to be lucid and is a challenging task for the traditional devices…”
    Get full text
    Conference Proceeding