Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Redundancy removal for isolated gesture in Indian sign language and recognition using multi-class support vector machine., , and . IJCVR, 4 (1/2): 23-38 (2014)Secret Image Sharing Using Grayscale Payload Decomposition and Irreversible Image Steganography., , and . CoRR, (2014)A framework for dynamic hand Gesture Recognition using key frames extraction., , , and . NCVPRIPG, page 1-4. IEEE, (2015)Secret image sharing using grayscale payload decomposition and irreversible image steganography., , and . J. Inf. Secur. Appl., 18 (4): 180-192 (2013)An efficient bit plane X-OR algorithm for irreversible image steganography., , and . Int. J. Trust. Manag. Comput. Commun., 1 (2): 140-155 (2013)A framework for abandoned object detection from video surveillance., , and . NCVPRIPG, page 1-4. IEEE, (2013)A Context Based Tracking for Similar and Deformable Objects., , , and . IJCVIP, 8 (4): 1-15 (2018)Crowd Behavior Recognition Using Hybrid Tracking Model and Genetic algorithm Enabled Neural Network., and . Int. J. Comput. Intell. Syst., 10 (1): 234-246 (2017)An architecture to identify violence in video surveillance system using ViF and LBP., , and . RAIT, page 1-6. IEEE, (2018)Unmasking the potential: evaluating image inpainting techniques for masked face reconstruction., and . Multim. Tools Appl., 83 (1): 893-918 (January 2024)