Sudipta Banerjee

ORCID: 0000-0003-1623-7697
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Face recognition and analysis
  • Biometric Identification and Security
  • Digital Media Forensic Detection
  • Generative Adversarial Networks and Image Synthesis
  • Advanced Steganography and Watermarking Techniques
  • User Authentication and Security Systems
  • Adipokines, Inflammation, and Metabolic Diseases
  • Image Processing Techniques and Applications
  • Adversarial Robustness in Machine Learning
  • Ovarian cancer diagnosis and treatment
  • Advanced Neural Network Applications
  • Anomaly Detection Techniques and Applications
  • Remote Sensing and LiDAR Applications
  • 3D Shape Modeling and Analysis
  • Advanced Image Fusion Techniques
  • Food Supply Chain Traceability
  • Photoacoustic and Ultrasonic Imaging
  • Innovation and Socioeconomic Development
  • Brain Tumor Detection and Classification
  • Hypothalamic control of reproductive hormones
  • Facial Nerve Paralysis Treatment and Research
  • Advanced Image and Video Retrieval Techniques
  • Fire Detection and Safety Systems
  • Intelligent Tutoring Systems and Adaptive Learning
  • Hydrological Forecasting Using AI

Institute of Post Graduate Medical Education and Research
2023-2025

Symbiosis International University
2024-2025

Medical College and Hospital, Kolkata
2025

New York University
2023-2024

National Institute of Technology Durgapur
2024

Indian Institute of Technology Hyderabad
2022-2023

International Institute of Information Technology, Hyderabad
2023

Michigan State University
2017-2022

Maulana Abul Kalam Azad University of Technology, West Bengal
2021

University of Salzburg
2019

The need for reliably determining the identity of a person is critical in number different domains ranging from personal smartphones to border security; autonomous vehicles e-voting; tracking child vaccinations preventing human trafficking; crime scene investigation personalization customer service. Biometrics, which entails use biological attributes such as face, fingerprints and voice recognizing person, being increasingly used several applications. While biometric technology has made...

10.1109/icb45273.2019.8987307 article EN 2019-06-01
Mohd Ashraf Ganie Subhankar Chowdhury Neena Malhotra Rakesh Sahay Prasanta Kumar Bhattacharya and 95 more Sarita Agrawal Puthiyaveettil Khadar Jabbar Vanita Suri Roya Rozati Vishnubhatla Sreenivas Mohammad Salem Baba Imtiyaz Ahmad Wani Haroon Rashid Abhilash Nair Amlin Shukla Taruna Arora Bharati Kulkarni Parvaiz A Koul Zafar A. Shah Shariq Rashid Masoodi Tariq Parvez Ghulam Nabi Yatoo Nicole Chow Tariq Gojwari Muzaffar Wani Seema Qayoom Wahid Ali Khan Rama Walia Deepenkar De Aashima Arora Tulika Singh Neena Khanna Nitish Naik Shyam Prakash Nandita Gupta Rajesh Sagar Jai Bhagwan Sharma Devasenathipathy Kandasamy Narender Kuber Bodhey Eli Mohapatra Sabah Siddiqui Gourisankar Kamilya Archana Singh Pradip Mukhopadhyay Nehar Ranjan Sarkar Alice Abraham Ruram Jessy Abraham Donboklang Lynser Manika Agrawal Lin Rao Sudha Bindu Malathi Ponnuru Nadeem Ahmad Sujatha Rani Aleem Ahmad Khan Sultan Rizwan Ahmad Prabhakar Rao Nirmala Chongtham Anuja Elizabeth George Jayasree Leelamma Gaurav Thakur Saba Noor Khursheed Paddar Gaivee Vinam Meshram Sewa Ram Choudhary Aafia Rashid Wasia Showkat Rohina Bashir Rabiya Rashid Jaida Manzoor Nisar Ahmad Pieu Adhikary Subhasish Pramanik Rahul Harish Mudasir Makhdoomi Mudasir Fayaz Nafeez Rehman Neha Ravi Ajay Kumar Siffali Chandrakar Nithlesh Kumar Sudipta Banerjee Humaira Minhaj B. Bhaskar Shaik Iqbal Babu Ram Arya Suresh RS Sharma Shalini Singh Malabika Roy Reeta Rasilly Nomita Chandiok M. Rajab A. R. Reshi Deeba Farhat Abid Rashid Nusrat Jahan Sewa Ram Choudhary Naila Mohiudin Ranjith Sreedharan

Importance The prevalence of polycystic ovary syndrome (PCOS) varies across the globe. Indian studies on PCOS are limited by poor design, small sizes, regional representations, and varying methods. Objectives To estimate nationwide in India, examine phenotypic spectrum, assess magnitude comorbidities associated with PCOS. Design, Setting, Participants This cross-sectional study recruited 9824 women aged 18 to 40 years from November 1, 2018, July 31, 2022, 5 zones country. A prevalidated...

10.1001/jamanetworkopen.2024.40583 article EN cc-by-nc-nd JAMA Network Open 2024-10-23

Abstract Context Prader-Willi Syndrome is one of the commonest mono-chromosomal (15q11-13), polygenic syndromic childhood obesity. Objectives We primarily compares and correlate serum Lp(a), hs-CRP,and baseline clinical characteristics genetically confirmed children with PWS at their growth-hormone treatment-naïve stage to control groups. Secondary objectives were Lp(a) hs-CRP concentration MLPA subgroups,body composition indices,sleep apnea parameters,and hepatic shear-stress by...

10.1210/jendso/bvaf082 article EN cc-by-nc-nd Journal of the Endocrine Society 2025-05-08

Medical diagnosis involves the expert opinion of trained health care professionals based on causal inference from medical data. While data are typically collected using specialized medical-grade sensors, similar characteristics useful for sometimes present in biometric (e.g., face images, ocular and speech signals). In this paper, we explore biometrics literature to study following questions. 1) What kind cues embedded commonly utilized forms audio-visual data? 2) How can these be gleaned...

10.1016/j.cviu.2022.103438 article EN cc-by-nc-nd Computer Vision and Image Understanding 2022-04-27

We present the task of differential face morph attack detection using a conditional generative network (cGAN). To determine whether image in an identification document, such as passport, is morphed or not, we propose algorithm that learns to implicitly disentangle identities from conditioned on trusted reference cGAN. Furthermore, proposed method can also recover some underlying information about second subject used generating morph. performed experiments AMSL morph, MorGAN, and EMorGAN...

10.1109/ijcb52358.2021.9484355 article EN 2021-07-20

A face morph is created by strategically combining two or more images corresponding to multiple identities. The intention for the morphed image match with Current attack detection strategies can detect morphs but cannot recover identities used in creating them. task of deducing individual from a known as demorphing. Existing work de-morphing assume availability reference pertaining one identity order accomplice - i.e., other identity. In this work, we propose novel method that both...

10.1109/ijcb54206.2022.10007977 article EN 2022-10-10

The principle of Photo Response Non Uniformity (PRNU) is often used to link a digital image with the sensor that produced it. In this regard, number schemes have been proposed in literature extract PRNU details from given input image. work, we study impact photometric transformations applied near-infrared ocular images, on PRNU-based iris identification accuracy. contributions work are as follows: (a) Firstly, evaluate 7 different 4 schemes; (b) Secondly, develop an explanatory model based...

10.1109/iwbf.2018.8401560 article EN 2018-06-01

The field of digital image forensics concerns itself with the task validating authenticity an or determining device that produced image. Device sensor identification can be accomplished by estimating sensor-specific pixel artifacts, such as Photo Response Non Uniformity (PRNU), leave imprint in resulting Research this has predominantly focused on images obtained using sensors operating visible spectrum. Iris recognition systems, other hand, utilize near-infrared (NIR) In work, we evaluate...

10.1109/iwbf.2017.7935081 article EN 2017-04-01

Social scientists have long been interested in the motives of hackers, particularly financially motivated attackers. This article analyzes web defacements, a less studied and more public form cyberattack, which content page is deliberately substituted with unwanted text graphics chosen by perpetrator. These attacks use variety strategies are performed for motives, including political ideological goals. The proliferation such has resulted vast amounts data that open new opportunities...

10.1177/0894439321994234 article EN Social Science Computer Review 2021-02-23

The performance of automated face recognition systems is inevitably impacted by the facial aging process. However, high quality datasets individuals collected over several years are typically small in scale. In this work, we propose, train, and validate use latent text-to-image diffusion models for synthetically de-aging images. Our succeed with few-shot training, have added benefit being controllable via intuitive textual prompting. We observe degrees visual realism generated images while...

10.1109/ijcb57857.2023.10448860 article EN 2023-09-25

This paper introduces a new technique for tracing the malicious nodes in mobile adhoc network (MANET) wireless communication. As hosts are free to move any where and can change topology frequently, each node of MANET much more vulnerable insider attacks specially under noise external due lack permanent infrastructure, limited resources, central administrator etc. Here this paper, we have done an investigation mathematical analysis based upon detection with modeling .We propose scanning...

10.1109/wicom.2008.1165 article EN 2008-10-01

The principle of Photo Response Non-Uniformity (PRNU) is used to link an image with its source, i.e., the sensor that produced it. In this work, we investigate if it possible modify iris acquired using one in order spoof PRNU noise pattern a different sensor. regard, develop perturbation routine iteratively modifies blocks pixels original such approaches target Experiments indicate efficacy proposed method spoofing patterns present whilst still retaining biometric content.

10.1109/isba.2019.8778483 article EN 2019-01-01

The principle of Photo Response Non Uniformity (PRNU) is often exploited to deduce the identity smartphone device whose camera or sensor was used acquire a certain image. In this work, we design an algorithm that perturbs face image acquired using such (a) sensor-specific details pertaining are suppressed (sensor anonymization); (b) pattern different incorporated spoofing); and (c) biometric matching perturbed not affected (biometric utility). We employ simple approach utilizing Discrete...

10.1109/btas46853.2019.9185996 article EN 2019-09-01
Coming Soon ...