Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Copy-Move Forgery Detection Using Scale Invariant Feature Transform

    In the era of digital technology, digital images play an important role in the day to day applications starting from medical diagnosis to court of laws as evidence for the crime investigation. Nowadays it beco...

    Bandita Das, Debabala Swain in Machine Learning and Information Processing (2021)

  2. No Access

    Chapter and Conference Paper

    Reversible Region-Based Embedding in Images for Secured Telemedicine Approach

    In the current era, to provide quality healthcare service remotely, telemedicine is one of the well-known techniques worldwide. The prescribed diagnosis disease details the doctor for faster diagnosis over the...

    Prachee Dewangan, Bijay Ku Paikaray in Machine Learning and Information Processing (2021)

  3. No Access

    Chapter and Conference Paper

    Empowering the Visually Impaired Learners with Text-to-Speech-Based Solution

    Attending classes and completing education is a particularly daunting task for students with visual disability. Their challenges have been further escalated during the prevailing pandemic situation. So, mere t...

    Debabala Swain, Sony Snigdha Sahoo in Machine Learning and Information Processing (2021)

  4. No Access

    Chapter and Conference Paper

    Transforming the Lives of Socially Dependent to Self-dependent Using IoT

    Internet of Things (IoT) explores the new sensor-based wearable devices and technologies that can be used in day-to-day life. It has opened up a wide range of new dimensions in elderly care, disability care an...

    Debabala Swain, Sony Snigdha Sahoo in Machine Learning and Information Processing (2021)

  5. No Access

    Chapter and Conference Paper

    A Spatial Domain Technique for Digital Image Authentication and Tamper Recovery

    Nowadays, digital watermarking techniques are used to protect the integrity and authenticity of digital image and to provide capabilities for self-recovery of tampered locations. In this paper, a blind waterma...

    Monalisa Swain, Debabala Swain in Machine Learning and Information Processing (2021)

  6. No Access

    Chapter and Conference Paper

    An Extensive Study on Medical Image Security with ROI Preservation: Techniques, Evaluations, and Future Directions

    In the current era of digitization, the worldwide healthcare service is a common practice; it enables the remote healthcare service with proper digits: diagnosis and medication. The main thread for the about s...

    Bijay Ku. Paikaray, Prachee Dewangan in Machine Learning and Information Processing (2020)

  7. No Access

    Chapter and Conference Paper

    Privacy Preservation in ROI of Medical Images Using LSB Manipulation

    In the current era of digitization, the medical images are getting transmitted over the communication channel for diagnosis. During this process, it can be modified accidentally or intentionally. This occurs b...

    Madhusmita Das, Debabala Swain in Machine Learning and Information Processing (2020)

  8. No Access

    Chapter and Conference Paper

    A Competitive Analysis on Digital Image Tamper Detection and Its Secure Recovery Techniques Using Watermarking

    Digital images play a vital role in human life. Hence, its protection from unauthorized access is a serious matter of concern. Even if the contents are modified then its detection and recovery must be defined....

    Monalisa Swain, Debabala Swain in Machine Learning and Information Processing (2020)

  9. No Access

    Chapter and Conference Paper

    An Application of NGBM for Forecasting Indian Electricity Power Generation

    The average generation of electricity is getting increased day by day due to its increasing demand. So forecasting the future needs of electricity is very essential, especially in India. In this paper, a Grey ...

    Dushant P. Singh, Prashant J. Gadakh in Computational Intelligence in Data Mining (2017)

  10. No Access

    Chapter and Conference Paper

    A Pragmatic Delineation on Cache Bypass Algorithm in Last-Level Cache (LLC)

    Last-level cache is a high level cache memory shared by all core in a multi-core chip to improve the overall efficiency of modern processors. Most of the cache management policies are based on the residency of...

    Banchhanidhi Dash, Debabala Swain in Computational Intelligence in Data Mining—… (2016)