Search Results - "Sarode, Tanuja"
-
1
Fabric Defect Detection Adopting Combined GLCM, Gabor Wavelet Features and Random Decision Forest
Published in 3D research (01-03-2019)“…In image analysis and pattern recognition activity, one of the most salient characteristics is texture. The global region of images in spatial domain has an…”
Get full text
Journal Article -
2
A new multi-resolution hybrid wavelet for analysis and image compression
Published in International journal of electronics (02-12-2015)“…Most of the current image- and video-related applications require higher resolution of images and higher data rates during transmission, better compression…”
Get full text
Journal Article -
3
Low-Cost Eye Tracking for Foveated Rendering Using Machine Learning
Published in 2019 IEEE International Conference on Cloud Computing in Emerging Markets (CCEM) (01-09-2019)“…This paper outlines a 50 head-mounted real-time eye tracker to track the user's eye, and uses foveated rendering reduce bandwidth costs and improve immersion…”
Get full text
Conference Proceeding -
4
Adaptive filtering a descreening approach for color scanned halftones
Published in 2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (01-08-2015)“…To print ceaseless tone images, Electrophotographic printers mostly use halftoning method. Scanned pictures procured from such hard transcripts are generally…”
Get full text
Conference Proceeding -
5
Analysis of Machine Learning Models for Stock Market Prediction
Published in 2023 International Conference on Integrated Intelligence and Communication Systems (ICIICS) (24-11-2023)“…With financial analysts and top institutions around the world utilising its power to derive sophisticated insights, machine learning has quickly become a…”
Get full text
Conference Proceeding -
6
Implementation of Exploratory Data Analysis on Weather Data
Published in 2023 International Conference on Communication System, Computing and IT Applications (CSCITA) (31-03-2023)“…This paper presents the Exploratory Data Analysis on the climate data of the city of Mumbai. The climate variables are closely associated with each other…”
Get full text
Conference Proceeding -
7
Image hashing by CCQ-CSLBP
Published in 2016 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE) (01-12-2016)“…Recent trends and also statistics show that the hashing concept has been gaining importance because its application lies in the area of authentication,…”
Get full text
Conference Proceeding -
8
Image hashing by SDQ-CSLBP
Published in 2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI) (01-09-2016)“…Approach for image hashing is to use powerful feature descriptor which captures essence of an image. Applications of image hashing lies in the area of content…”
Get full text
Conference Proceeding -
9
Image hashing using AQ-CSLBP with double bit quantization
Published in 2016 International Conference on Optoelectronics and Image Processing (ICOIP) (01-06-2016)“…This paper presents a novel image hashing method for authentication and tampering detection. Creation, modification and transfer of multimedia data becomes an…”
Get full text
Conference Proceeding -
10
Improved robust digital image watermarking with SVD and hybrid transform
Published in 2017 International Conference on Intelligent Communication and Computational Techniques (ICCT) (01-12-2017)“…In this paper two methods of color image watermarking are proposed. Both methods use SVD and DCT-Walsh hybrid transform. First method uses SVD on column hybrid…”
Get full text
Conference Proceeding -
11
Hybrid image compression using VQ on error image
Published in 2017 International Conference on Intelligent Communication and Computational Techniques (ICCT) (01-12-2017)“…Here color image is compressed using vector quantization (VQ) on transformed coefficients. First, image is compressed using hybrid wavelet transform to achieve…”
Get full text
Conference Proceeding -
12
Biometric watermarking using partial DCT-Walsh wavelet and SVD
Published in 2015 Third International Conference on Image Information Processing (ICIIP) (01-12-2015)“…Biometric has ever increasing demand in the field of security. However, integrity and security of biometric used to authenticate a legal user are the inherited…”
Get full text
Conference Proceeding -
13
Evaluation of Chaotic Map Lattice systems for image encryption
Published in 2014 International Conference on Circuits, Systems, Communication and Information Technology Applications (CSCITA) (01-04-2014)“…In this paper, the performance of Chaotic Map Lattice (CML) systems used for the purpose of digital image encryption is evaluated. The design and security…”
Get full text
Conference Proceeding -
14
Performance superiority of hybrid DKT-DCT wavelet compared to DKT, DCT individual transforms and their wavelets in image compression
Published in 2014 5th International Conference - Confluence The Next Generation Information Technology Summit (Confluence) (01-09-2014)“…This paper proposes simple and novel image compression method using transforms. Discrete cosine Transform (DCT) and Discrete Kekre Transform (DKT) are applied…”
Get full text
Conference Proceeding -
15
Forecasting Indian Stock Market Using Artificial Neural Networks
Published in 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA) (01-08-2018)“…The objective of this research is to predict the next day's opening value of Nifty-100 index of the National Stock Exchange (NSE) using Artificial Neural…”
Get full text
Conference Proceeding -
16
Digital image encryption using improved chaotic map lattice
Published in 2013 Annual IEEE India Conference (INDICON) (01-12-2013)“…Chaotic map lattice (CML) has been used recently for digital image encryption; however, it has several flaws in terms of irreversibility and violates some…”
Get full text
Conference Proceeding -
17
Robust watermarking by SVD of watermark embedded in DKT-DCT and DCT wavelet column transform of host image
Published in 2015 International Conference on Communication, Information & Computing Technology (ICCICT) (01-01-2015)“…Watermarking in wavelet domain and with SVD is popular due to its robustness. In this paper a watermarking technique using DCT wavelet and hybrid DKT-DCT…”
Get full text
Conference Proceeding -
18
Image scrambling using sinusoidal transforms for assorted color spaces using Walsh sequency
Published in International Conference & Workshop on Electronics & Telecommunication Engineering : 26-27 February 2016, Mumbai, India (26-02-2016)“…Digital images can be secured by using methods of scrambling/encryption. A number of techniques have been proposed to encrypt the digital images. One such…”
Get full text
Conference Proceeding -
19
An Efficient Fast Algorithm to Generate Codebook for Vector Quantization
Published in 2008 First International Conference on Emerging Trends in Engineering and Technology (01-07-2008)“…In this paper we present a very simple and yet effective algorithm to generate codebook. The algorithm uses sorting method to generate codebook and the…”
Get full text
Conference Proceeding -
20
Hand Gesture Recognition by Daubechies Wavelet Transformation
Published in IET Conference Proceedings (26-02-2016)“…Computer applications require interaction between humans and computers. This interaction has to be lucid and is a challenging task for the traditional devices…”
Get full text
Conference Proceeding