Skip to main content

and
  1. No Access

    Article

    CC-CNN: A cross connected convolutional neural network using feature level fusion for facial expression recognition

    Facial expressions are an important form of non-verbal communication as they directly reflect the internal emotions of a person. The primary task of automated Facial Expression Recognition (FER) systems lies i...

    Kadimi Naveen Kumar Tataji, Mukku Nisanth Kartheek in Multimedia Tools and Applications (2024)

  2. No Access

    Article

    Chess pattern with different weighting schemes for person independent facial expression recognition

    Facial expressions are an important form of non-verbal communication as they can depict the internal mood and emotions of an individual. In Automatic Facial Expression Recognition (AFER) system, the main task ...

    Mukku Nisanth Kartheek, Munaga V. N. K. Prasad in Multimedia Tools and Applications (2022)

  3. No Access

    Article

    Privacy-preserving iris authentication using fully homomorphic encryption

    Rapid advancement in technology has led to the use of biometric authentication in every field. In particular, from the past few years, iris recognition systems has gained overwhelming advancement over other bi...

    Mahesh Kumar Morampudi, Munaga V. N. K. Prasad in Multimedia Tools and Applications (2020)

  4. No Access

    Chapter and Conference Paper

    Palmprint Recognition Using Fusion of 2D-Gabor and 2D Log-Gabor Features

    Palmprint technology is a new branch of biometrics used to identify an individual. Palmprint has rich set of features like palm lines, wrinkles, minutiae points, texture, ridges etc. Several line and texture e...

    Munaga V. N. K. Prasad, Ilaiah Kavati in Recent Trends in Computer Networks and Dis… (2014)

  5. No Access

    Chapter and Conference Paper

    Image and Template Security for Palmprint

    The wide spread use of biometrics in real world causes more security and privacy concerns to be raised, because conventional biometric systems store biometric templates as it is in database without any securit...

    Munaga V. N. K. Prasad in Intelligent Computing, Networking, and Informatics (2014)

  6. No Access

    Chapter and Conference Paper

    Digital Watermarking Based on Magic Square and Ridgelet Transform Techniques

    This paper proposes two algorithms for embedding and extraction of the watermark into the cover image based on magic square and ridgelet transform techniques. Spread-spectrum communication systems use the spre...

    Rama Seshagiri Rao Channapragada in Intelligent Computing, Networking, and Inf… (2014)

  7. No Access

    Chapter and Conference Paper

    Vein Pattern Indexing Using Texture and Hierarchical Decomposition of Delaunay Triangulation

    In biometric identification systems, the identity corresponding to the query image is determined by comparing it against all images in the database. This exhaustive matching process increases the response time...

    Ilaiah Kavati, Munaga V. N. K. Prasad in Security in Computing and Communications (2013)

  8. No Access

    Chapter and Conference Paper

    Hand Vein Authentication System Using Dynamic ROI

    This paper presents an efficient authentication system based on hand vein pattern. The stages involved in vein pattern authentication system are image acquisition, Region of Interest (ROI) Extraction, image en...

    Munaga V. N. K. Prasad, Ilaiah Kavati in Security in Computing and Communications (2013)

  9. No Access

    Chapter and Conference Paper

    Subset Selection Approach for Watermarking Relational Databases

    Information on the open medium like Internet is of great source of digital content. This can be copied easily, modified by the unauthorized users and shared among various unknown users of the Internet. This po...

    Burepalli V. S. Rao, Munaga V. N. K. Prasad in Data Engineering and Management (2012)

  10. No Access

    Chapter and Conference Paper

    Dynamic ROI Extraction Algorithm for Palmprints

    Region of Interest (ROI) extraction is an important task for palmprint identification. Earlier reported works used fixed size ROI for the recognition of palmprints. When the fixed size ROI is used the palm are...

    Hemantha Kumar Kalluri, Munaga V. N. K. Prasad in Advances in Swarm Intelligence (2012)

  11. No Access

    Chapter

    Intramodal Palmprint Authentication

    Palmprint technology is one of the biometric techniques used to identify an individual. Recognition of palmprints is based on the features like palm lines, texture, ridges etc. Several line and texture extract...

    Munaga. V.N.K. Prasad, P. Manoj in Signal Processing for Image Enhancement an… (2008)