Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    Implementation of BTTC Image Compression Algorithm Using Fuzzy Technique

    This paper presents a new algorithm for image compression based on fuzzy domain decomposition, which is an improvement of the recently published Binary Tree Triangular Coding (BTTC) algorithm. The algorithm is...

    Munaga. V. N. K. Prasad, K. K. Shukla in Advances in Soft Computing — AFSS 2002 (2002)

  2. No Access

    Chapter

    Intramodal Palmprint Authentication

    Palmprint technology is one of the biometric techniques used to identify an individual. Recognition of palmprints is based on the features like palm lines, texture, ridges etc. Several line and texture extract...

    Munaga. V.N.K. Prasad, P. Manoj in Signal Processing for Image Enhancement an… (2008)

  3. No Access

    Chapter and Conference Paper

    New Quantization Technique in Semi-fragile Digital Watermarking for Image Authentication

    The Internet has been widely used for the distribution, commercialization and transmission of digital files such as images, audio and video. The growth of network multimedia systems has magnified the need for ...

    Raghu Gantasala, Munaga V. N. K. Prasad in Information Systems, Technology and Management (2009)

  4. No Access

    Chapter and Conference Paper

    Classification of Palmprint Using Principal Line

    In this paper, a new classification scheme for palmprint is proposed. Palmprint is one of the reliable physiological characteristics that can be used to authenticate an individual. Palmprint classification pro...

    Munaga V. N. K. Prasad, M. K. Pramod Kumar in Information Systems, Technology and Manage… (2009)

  5. No Access

    Chapter and Conference Paper

    Subset Selection Approach for Watermarking Relational Databases

    Information on the open medium like Internet is of great source of digital content. This can be copied easily, modified by the unauthorized users and shared among various unknown users of the Internet. This po...

    Burepalli V. S. Rao, Munaga V. N. K. Prasad in Data Engineering and Management (2012)

  6. No Access

    Chapter and Conference Paper

    Dynamic ROI Extraction Algorithm for Palmprints

    Region of Interest (ROI) extraction is an important task for palmprint identification. Earlier reported works used fixed size ROI for the recognition of palmprints. When the fixed size ROI is used the palm are...

    Hemantha Kumar Kalluri, Munaga V. N. K. Prasad in Advances in Swarm Intelligence (2012)

  7. No Access

    Chapter and Conference Paper

    Vein Pattern Indexing Using Texture and Hierarchical Decomposition of Delaunay Triangulation

    In biometric identification systems, the identity corresponding to the query image is determined by comparing it against all images in the database. This exhaustive matching process increases the response time...

    Ilaiah Kavati, Munaga V. N. K. Prasad in Security in Computing and Communications (2013)

  8. No Access

    Chapter and Conference Paper

    Hand Vein Authentication System Using Dynamic ROI

    This paper presents an efficient authentication system based on hand vein pattern. The stages involved in vein pattern authentication system are image acquisition, Region of Interest (ROI) Extraction, image en...

    Munaga V. N. K. Prasad, Ilaiah Kavati in Security in Computing and Communications (2013)

  9. No Access

    Chapter and Conference Paper

    Palmprint Recognition Using Fusion of 2D-Gabor and 2D Log-Gabor Features

    Palmprint technology is a new branch of biometrics used to identify an individual. Palmprint has rich set of features like palm lines, wrinkles, minutiae points, texture, ridges etc. Several line and texture e...

    Munaga V. N. K. Prasad, Ilaiah Kavati in Recent Trends in Computer Networks and Dis… (2014)

  10. No Access

    Chapter and Conference Paper

    Image and Template Security for Palmprint

    The wide spread use of biometrics in real world causes more security and privacy concerns to be raised, because conventional biometric systems store biometric templates as it is in database without any securit...

    Munaga V. N. K. Prasad in Intelligent Computing, Networking, and Informatics (2014)

  11. No Access

    Chapter and Conference Paper

    Digital Watermarking Based on Magic Square and Ridgelet Transform Techniques

    This paper proposes two algorithms for embedding and extraction of the watermark into the cover image based on magic square and ridgelet transform techniques. Spread-spectrum communication systems use the spre...

    Rama Seshagiri Rao Channapragada in Intelligent Computing, Networking, and Inf… (2014)

  12. No Access

    Chapter and Conference Paper

    A New Indexing Method for Biometric Databases Using Match Scores and Decision Level Fusion

    This paper proposes a new clustering-based indexing technique for large biometric databases. We compute a fixed length index code for each biometric image in the database by computing its similarity against a ...

    Ilaiah Kavati, Munaga V. N. K. Prasad in Advanced Computing, Networking and Informa… (2014)

  13. No Access

    Chapter and Conference Paper

    GLCM Based Texture Features for Palmprint Identification System

    In this paper, a new Palmprint recognition technique is introduced based on the gray-level co-occurrence matrix (GLCM). GLCM represents the distributions of the intensities and the information about relative p...

    Y. L. Malathi Latha, Munaga V. N. K. Prasad in Computational Intelligence in Data Mining … (2015)

  14. No Access

    Chapter and Conference Paper

    Watermarking Techniques in Curvelet Domain

    This paper proposes four different methods for embedding and extraction of the watermark into the cover image based on Curvelet Transform Technique. Magic Square Technique was used in the algorithms for spread...

    Rama Seshagiri Rao Channapragada in Computational Intelligence in Data Mining … (2015)

  15. No Access

    Chapter and Conference Paper

    Partial Segmentation and Matching Technique for Iris Recognition

    One of the main issues in iris segmentation is that the upper and lower region of the iris is occluded by the eyelashes and eyelids. In this paper, an effort has been made to solve the above problem. The pupil...

    Maroti Deshmukh, Munaga V. N. K. Prasad in Computational Intelligence in Data Mining … (2015)

  16. No Access

    Chapter and Conference Paper

    An Efficient Coding Method for Indexing Hand-based Biometric Databases

    Biometric identification systems capture biometric (i.e., fingerprint, palm, and iris) images and store them in a central database. During identification, the query biometric image is compared against all imag...

    Ilaiah Kavati, Munaga V. N. K. Prasad in Artificial Intelligence and Evolutionary A… (2015)

  17. No Access

    Book

  18. No Access

    Chapter

    Color Image Watermarking Techniques Based on Magic Square and Ridgelets

    Two techniques, namely image watermarking based on magic square (MST) and Image watermarking based on magic square and ridgelet transform (MSRTT), are discussed in this chapter. In the MST the watermark image ...

    Channapragada Rama Seshagiri Rao in Digital Watermarking Techniques in Curvele… (2016)

  19. No Access

    Chapter

    Conclusions and Future Scope

    Eight different digital watermarking techniques are discussed in this book. These techniques have been tested for their performance against various image compression attacks. The outcome of the work done so fa...

    Channapragada Rama Seshagiri Rao in Digital Watermarking Techniques in Curvele… (2016)

  20. No Access

    Chapter and Conference Paper

    Digital Watermarking Using Fractal Coding

    This paper presents a watermarking method using fractals. In the method discussed here, the host image is encoded by the proposed fractal coding method. To embed the watermark evenly over the whole host image,...

    Rama Seshagiri Rao Channapragada in Advances in Signal Processing and Intellig… (2016)

previous disabled Page of 3