Sudeep D. Thepade

ORCID: 0000-0001-7809-4148
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Image Retrieval and Classification Techniques
  • Advanced Image and Video Retrieval Techniques
  • Advanced Image Fusion Techniques
  • Biometric Identification and Security
  • Remote-Sensing Image Classification
  • Advanced Data Compression Techniques
  • Video Analysis and Summarization
  • Face and Expression Recognition
  • Image Enhancement Techniques
  • Image and Signal Denoising Methods
  • Advanced Image Processing Techniques
  • Advanced Steganography and Watermarking Techniques
  • Face recognition and analysis
  • AI in cancer detection
  • Music and Audio Processing
  • Digital Media Forensic Detection
  • Digital Imaging for Blood Diseases
  • Cutaneous Melanoma Detection and Management
  • Medical Image Segmentation Techniques
  • Video Surveillance and Tracking Methods
  • User Authentication and Security Systems
  • Remote Sensing and Land Use
  • COVID-19 diagnosis using AI
  • Brain Tumor Detection and Classification
  • Chaos-based Image/Signal Encryption

Savitribai Phule Pune University
2015-2024

Chhattisgarh Dental College & Research Institute
2013-2024

Symbiosis International University
2023-2024

Conference Board
2023

Marymount University
2020-2023

D Y Patil International University
2021

Yes Technologies (United States)
2020

Xavier School of Management
2020

Compute Canada
2019

University of Calcutta
2012-2015

10.7763/ijcte.2010.v2.227 article EN International Journal of Computer Theory and Engineering 2010-01-01

With the tremendous growth of ICT (Information and Communication Technology), we are able to generate, store, share transfer enormous amount information. World Wide Web have further made is easy access information anytime, anywhere in world. advent high capacity communication links storage devices even most generated multimedia nature. Images major this number image achieves growing with jet speed Just having not useful unless do methodologies effectively search related data from it minimum...

10.1145/1523103.1523180 article EN 2009-01-23

The widespread use of social media has enormous consequences for the society, culture and business with potentially positive negative effects. As online networks are increasingly used dissemination information, at same they also becoming a medium spread fake news various commercial political purposes. Technologies such as Artificial Intelligence (AI) Natural Language Processing (NLP) tools offer great promise researchers to build systems, which could automatically detect news. However,...

10.1080/08839514.2019.1661579 article EN Applied Artificial Intelligence 2019-09-03

Mortality rates due to breast cancer in women are very high. Accurate prediction and detection at an early stage of required for a reduction death rates. A Computer-Aided Diagnosis (CAD) is useful doctors deciding screening levels. For identifying cancerous tumors, CAD-based classification benign, malignant tumor using Machine learning one the approaches. This paper has observed effect various thresholding methods like Otsu, Niblack, Bernsen, Thepade's Sorted block Truncation Coding (TSBTC),...

10.1016/j.iswa.2021.200046 article EN cc-by-nc-nd Intelligent Systems with Applications 2021-07-01

Biometrics has been evolving as an exciting yet challenging area in the last decade. Though face recognition is one of most promising biometrics techniques, it vulnerable to spoofing threats. Many researchers focus on liveness detection protect biometric authentication systems from attacks with printed photos, video replays, etc. As a result, critical investigate current research concerning detection, address whether recent advancements can give solutions mitigate rising challenges. This...

10.3390/bdcc7010037 article EN cc-by Big Data and Cognitive Computing 2023-02-17

Here we are presenting some novel techniques for squirting colors in grayscale images. The problem of coloring images has no exact solution. attempting to minimize the human efforts needed manually We need interaction only find a reference color image, then job transferring traits from image is done by proposed techniques. In these techniques, palette prepared using pixel windows degrees taken image. Then divided into with same degrees. For every window searched equivalent values, which...

10.1109/icetet.2008.107 article EN 2008-01-01

Authentication plays a pivotal role in contemporary security frameworks, with various methods utilized including passwords, hardware tokens, and biometrics. Biometric authentication face recognition hold significant application potential, albeit susceptible to forgery, termed as spoofing attacks. These attacks, encompassing 2D 3D modalities, pose challenges through fake photos, warped images, video displays, masks. The existing counter measures are attack specific use complex architecture...

10.1016/j.mex.2025.103229 article EN cc-by MethodsX 2025-02-17

The reversible method of converting color images into gray has been recently proposed using YCbCr space and Discrete Wavelet Transform (DWT). embeds the colors original colored image DWT. is being converted to textured because information embedding. This could be either printed or sent receiver with size less than image. After receiving image, applies DWT on it extracts veiled reconstruct scanned for digitization then techniques discussed here can extract recreate Using Kekre's LUV technique...

10.1109/iadcc.2009.4809189 article EN IEEE International Advance Computing Conference 2009-03-01

The paper discusses novel image retrieval methods based on shape features extracted using gradient operators and slope magnitude technique with Block Truncation Coding (BTC).Four variations of proposed "Mask-Shape-BTC" techniques are masks like Robert, Sobel, Prewitt Canny.The tested generic database 1000 images spread across 11 categories.In all 55 queries (5 from each category) fired the database.The average precision recall computed considered for performance analysis.In extraction, CBIR...

10.5120/1094-1430 article EN International Journal of Computer Applications 2010-09-10

Iris recognition has been a fast growing, challenging and interesting area in real-time applications.A large number of iris algorithms have developed for decades.The paper presents novel Haarlet Pyramid based technique.Here is done using the image feature set extracted from Haar Wavelets at various levels decomposition.Analysis was performed proposed method, consisting False Acceptance Rate Genuine Rate.The technique tested on an database having 384 images.The results show that Haarlets...

10.5120/1638-2202 article EN International Journal of Computer Applications 2010-12-10

Content based image classification is a vital component of machine learning and attaining increasing importance in the field processing. This paper has carried out widespread comparison block truncation coding techniques for feature vector extraction images which precursor classification. A new (BTC) technique using even odd parts also introduced to perform The performances classifier algorithms are compared Receiver Operating Characteristic (ROC) Space. Two different categories classifiers...

10.1109/indcon.2013.6726053 article EN 2013-12-01

Advancement in deep learning is mapping to every field of life and applying it almost all research problems. Numerous Deep Convolutional Neural Network (DCNN) architectures are being proposed, giving different results based on the depth value hyperparameters. The entire development such DCNN from scratch needs a lot effort, may not be used for other applications than one they structured for. Transfer way modify these pre-trained networks make them suitable newer diverse applications. This...

10.1016/j.iswa.2022.200107 article EN cc-by Intelligent Systems with Applications 2022-08-07

Iris recognition has been a fast growing, challenging and interesting area in real-time applications. A large number of iris algorithms have developed for decades. The paper presents novel Walshlet Pyramid based technique. Here is done using the image feature set extracted from Walsh Wavelets at various levels decomposition. Analysis was performed proposed method, consisting False Acceptance Rate Genuine Rate. technique tested on an database having 384 images. results show that level-5...

10.1145/1980022.1980038 article EN 2011-01-01

A number of techniques have been proposed earlier for feature extraction using image binarization. Efficiency the was dependent on proper threshold selection binarization method. In this paper, a new technique has proposed. The binarized significant bit planes an by selecting local thresholds. algorithm tested public dataset and compared with existing widely used features. It inferred that method outclassed all shown consistent classification performance.

10.1155/2014/439218 article EN cc-by Journal of Engineering 2014-01-01

Biometrics is progressively becoming vital due to vulnerabilities of traditional security systems leading frequent breaches. an automated device that studies human beings’ physiological and behavioral features for their unique classification. Iris-based authentication offers stronger, unique, contactless identification the user. Iris liveness detection (ILD) confronts challenges such as spoofing attacks with contact lenses, replayed video, print attacks, etc. Many researchers focus on ILD...

10.3390/inventions6040065 article EN cc-by Inventions 2021-10-06

Rapid progress in deep learning (DL) is benefitting almost all fields including ‘Remote Sensing’. Until now several convolutional neural networks (DCNN) are proposed, every one of them gives distinct results according to its depth as well hyperparameters. It’s very arduous develop these DCNNs from scratch because it requires huge efforts and computing resources. Transfer (TL) a technique customizing such pre-trained molding for newer classification tasks like ‘Land Usage Identification’...

10.1016/j.jestch.2021.05.018 article EN cc-by Engineering Science and Technology an International Journal 2021-06-05

In the realm of computer vision, image classification is a critical issue with many applications, including multimedia content analysis, security and surveillance, medical imaging. The accuracy algorithms has considerably increased development deep learning. discipline dramatically benefited from usage pre-trained Convolutional Neural Network (CNN) models. this study, we perform on Wang dataset composed 1000 images separated into ten categories, using six different CNN research made use...

10.1109/raeeucci57140.2023.10134069 article EN 2023-04-19

There is increasing interest in the development of reliable, rapid and non-intrusive security control systems. Multimodal biometrics such as palmprints iris provide highly effective automatic mechanisms for use personal identification helps to minimize system error rate. This paper presents a new method extracting features spatial domain from iris. Thepade's Block Truncation Coding using level 2 taken here reduce feature vector size. For improving accuracy form genuine acceptance rate(GAR)in...

10.1016/j.procs.2016.03.060 article EN Procedia Computer Science 2016-01-01
Coming Soon ...