![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
CCLHF-Net: Constrained Convolution Layer and Hybrid Features-Based Skip Connection Network for Image Forgery Detection
Nowadays, images are playing a crucial role in various important applications like medical, forensic, and legal. However, if someone tampers with these images, they become invalid. Unfortunately, the increasin...
-
Article
Sentiment classification with modified RoBERTa and recurrent neural networks
The unprecedented growth in the use of social media platforms, where opinions and decisions are made and updated within seconds. Hence, Twitter is becoming a huge commercial interest for brands and companies t...
-
Article
Enhanced resource provisioning and migrating virtual machines in heterogeneous cloud data center
Data centers have become an indispensable part of modern computing infrastructures. It becomes necessary to manage cloud resources efficiently to reduce those ever-increasing power demands of data centers. Dyn...
-
Chapter and Conference Paper
Smart Contract Based Next-Generation Public Key Infrastructure (PKI) Using Permissionless Blockchain
The traditional Public Key Infrastructure (PKI) solutions are centralized and non-transparent schemes which struggle to combat the current era of distributed applications. One of the major challenging issues o...
-
Chapter and Conference Paper
Deep Learning-Based Pothole Detection for Intelligent Transportation Systems
The presence of potholes on the roads is one of the major causes of road accidents as well as wear and tear of vehicles. Various methods have been implemented to solve this problem ranging from manual reportin...
-
Chapter and Conference Paper
Non-invertible Cancellable Template for Fingerprint Biometric
In this work we propose an approach for generation of secure and non-invertible fingerprint templates. Firstly, we have to find the points around the reference point and select the n points sorted in ascending...
-
Chapter and Conference Paper
Computer Vision based Animal Collision Avoidance Framework for Autonomous Vehicles
Animals have been a common sighting on roads in India which leads to several accidents between them and vehicles every year. This makes it vital to develop a support system for driverless vehicles that assists...
-
Chapter and Conference Paper
Real-Time Traffic Sign Recognition and Classification Using Deep Learning
Traffic signs convey information, an instruction, or a warning to the driver. Recognizing these traffic signs and classifying them into their appropriate classes is an imperative task for autonomous driving as...
-
Chapter and Conference Paper
Spatial Co-location Pattern Mining Using Delaunay Triangulation
Spatial data mining is the process of finding interesting patterns that may implicitly exist in spatial database. The process of finding the subsets of features that are frequently found together in a same loc...
-
Chapter and Conference Paper
Fast Fingerprint Retrieval Using Minutiae Neighbor Structure
This paper proposes a novel fingerprint identification system using minutiae neighborhood structure. First, we construct the nearest neighborhood for each minutia in the fingerprint. In the next step, we extra...
-
Book
-
Chapter
Hierarchical Decomposition of Extended Triangulation for Fingerprint Indexing
In biometric identification systems, the identity corresponding to the query image is determined by comparing it against all images in the database. This exhaustive matching process increases the response time...
-
Chapter
A New Cluster-Based Indexing Technique for Palmprint Databases Using Scores and Decision-Level Fusion
This chapter proposes a new clustering-based indexing technique for large biometric databases. We compute a fixed-length index code for each biometric image in the database by computing its similarity against ...
-
Chapter
Efficient Score-Based Indexing Technique for Fast Palmprint Retrieval
Biometric identification systems capture biometric (i.e., fingerprint, palm, and iris) images and store them in a central database. During identification, the query biometric image is compared against all imag...
-
Chapter
Conclusions and Future Scope
This chapter discusses the outcomes of our research. This chapter summarizes our research contributions and also discuss some future research directions.
-
Chapter
Introduction
In biometric identification systems, the identity corresponding to an individual is determined by comparing his/her template against all user templates in the database. This exhaustive matching process increas...
-
Chapter and Conference Paper
An Efficient Coding Method for Indexing Hand-based Biometric Databases
Biometric identification systems capture biometric (i.e., fingerprint, palm, and iris) images and store them in a central database. During identification, the query biometric image is compared against all imag...
-
Chapter and Conference Paper
Palmprint Recognition Using Fusion of 2D-Gabor and 2D Log-Gabor Features
Palmprint technology is a new branch of biometrics used to identify an individual. Palmprint has rich set of features like palm lines, wrinkles, minutiae points, texture, ridges etc. Several line and texture e...
-
Chapter and Conference Paper
A New Indexing Method for Biometric Databases Using Match Scores and Decision Level Fusion
This paper proposes a new clustering-based indexing technique for large biometric databases. We compute a fixed length index code for each biometric image in the database by computing its similarity against a ...
-
Chapter and Conference Paper
Vein Pattern Indexing Using Texture and Hierarchical Decomposition of Delaunay Triangulation
In biometric identification systems, the identity corresponding to the query image is determined by comparing it against all images in the database. This exhaustive matching process increases the response time...