Sunil Kumar

ORCID: 0000-0003-4617-704X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cloud Computing and Resource Management
  • IoT and Edge/Fog Computing
  • Digital Media Forensic Detection
  • Advanced Steganography and Watermarking Techniques
  • Image Processing Techniques and Applications
  • Chaos-based Image/Signal Encryption
  • Anomaly Detection Techniques and Applications
  • Video Surveillance and Tracking Methods
  • Face and Expression Recognition
  • Software-Defined Networks and 5G
  • Distributed and Parallel Computing Systems
  • Caching and Content Delivery
  • Advanced Data Storage Technologies
  • Advanced Authentication Protocols Security
  • User Authentication and Security Systems
  • Neural Networks and Applications
  • Nutritional Studies and Diet
  • Advanced Clustering Algorithms Research
  • Network Security and Intrusion Detection
  • Parallel Computing and Optimization Techniques
  • Face recognition and analysis
  • Blockchain Technology Applications and Security
  • Wireless Body Area Networks
  • Internet Traffic Analysis and Secure E-voting
  • Cell Image Analysis Techniques

Manipal University Jaipur
2019-2025

Chandigarh University
2025

Lingaya's Vidyapeeth
2024

Sharda University
2021-2022

National Institute of Technical Teachers Training and Research
2018

Mody University of Science and Technology
2013-2017

Faculty (United Kingdom)
2015

Veer Surendra Sai University of Technology
2015

Sri Sri University
2015

Manipal Academy of Higher Education
2011

Over the past few years, paradigm of social networking has grown to such a degree that websites have evolved into full-fledged platforms, catering wide range consumer interests. The near-ubiquity Internet access facilitated proliferation users indulge in networking. However, this spread usage and particular brings with it need design implement plethora security enhancing privacy preserving protocols standards. Several mechanisms been proposed ensure primary features as confidentiality,...

10.1109/csnt.2011.141 article EN International Conference on Communication Systems and Network Technologies 2011-06-01

Software-defined network (SDN) becomes a new revolutionary paradigm in networks because it provides more control and operation over infrastructure. The SDN controller is considered as the operating system of based infrastructure, responsible for executing different applications maintaining services functionalities. Despite all its tremendous capabilities, face many security issues due to complexity architecture. Distributed denial (DDoS) common attack on centralized architecture, especially...

10.32604/cmc.2022.021669 article EN Computers, materials & continua/Computers, materials & continua (Print) 2021-11-03

Music is the form of art known to have a greater connection with person's emotion. It has got unique ability lift up one's mood. If user receives recommendation based on his preference, it will also improve listing experience. recommendations existed for long time. Still, in most scenarios, decided after learning preferences over time, like looking at their past song preferences, amount time they listen music, etc. This paper suggests neural network-based approach where facial expressions...

10.1109/icrito51393.2021.9596276 article EN 2022 10th International Conference on Reliability, Infocom Technologies and Optimization (Trends and Future Directions) (ICRITO) 2021-09-03

Software fault prediction (SFP) refers to the early identification of faults that can pose significant challenges sustainable software development (SSD) goals, primarily through resource waste, increased energy consumption, and extended cycles. SFP allows testing efforts focus on fixing issues before they escalate, minimizing wasted time effort. models facilitate high-quality end-products with reduced environmental impact optimal utilization by enabling organizations minimize failures align...

10.47852/bonviewjcce52024884 article EN Journal of Computational and Cognitive Engineering 2025-04-08

Copy move forgery detection is emerging as one of the hot research topic among researchers in area image forensics. Many techniques have been suggested to detect such type tampering with original image, but problem far from being solved. Some issues still remained either unsolved or there a lot scope for performance improvement. Block matching algorithm block tiling most commonly used method duplication image. One major challenges time complexity algorithms. As size increases number...

10.1109/iciip.2013.6707675 article EN 2013-12-01

World population has increased manifolds in the last ten years. With increase at this alarming rate, studying and understanding crowd patterns their collective behaviour is very important. Researchers from various domains like artificial intelligence, machine learning, social science have shown interest phenomena social, psychological, technical points of view. Computer vision techniques play a vital role developing methods that help analysing automatically. In article, we surveyed many...

10.1080/21681163.2021.1986859 article EN Computer Methods in Biomechanics and Biomedical Engineering Imaging & Visualization 2021-10-15

The major objective of the article is to supply novel and efficient methodology digital image steganography that describes individuality regarding secret transmission using adaptive circular queue least significant bits (LSBs) substitution. data structure employed dynamically in resource distribution between multiple communication recipients once information transmitted asynchronously. Here, RSA cryptosystem for confidentiality authentication. result organised into various blocks. In method,...

10.1016/j.pisc.2016.04.093 article EN cc-by-nc-nd Perspectives in Science 2016-05-03

Cloud computing is frequently alluded to as a model that furnishes boundless information handling conveniences with compensation for each utilization framework. Present day cloud foundations resources virtual machines (VMs) actual utilizing virtualization innovation. All VMs works their involved structure and exhaust from machine which behaves like host. For load adjusting, moves exceptionally troubled real low machines. The delay of this calculation expansions in the organization are...

10.17762/ijritcc.v10i8.5683 article EN International Journal on Recent and Innovation Trends in Computing and Communication 2022-08-31

Copy move forgery detection in digital images has become a very popular research topic the area of image forensics.Due to availability sophisticated editing tools and ever increasing hardware capabilities, it an easy task manipulate images.Passive techniques are more relevant as they can be applied without prior information about question.Block based used detect copy forgery, but have limitations large time complexity sensitivity against affine operations like rotation scaling.Keypoint...

10.12785/ijcds/040203 article EN cc-by-nc-nd International Journal of Computing and Digital Systems 2015-04-01

Edge detection is a vital feature in the field of Computer Vision for extracting meaningful information from digital images. The primary aim our proposed technique to obtain thin edges, so that result derived suitable more further applications such as boundary detection, image segmentation, motion detection/estimation, texture analysis, object identification and on. We have done comparative analysis four edge detectors use different methods detecting edges tested their results under variety...

10.1109/icccis51004.2021.9397225 article EN 2022 International Conference on Computing, Communication, and Intelligent Systems (ICCCIS) 2021-02-19

We propose a fast and robust global motion estimation (GME) algorithm, based on 2-stage coarse-to-fine refinement strategy, which is capable of measuring large motions. A 6-parameter affine model has been used. Coarse carried out in the frequency domain using polar, log-polar or log-log sampling Fourier magnitude spectrum sub-sampled image. The scheme adaptively selected, past patterns. stage consists RANSAC fitting to vectors randomly selected high-activity blocks, hence outliers. vector...

10.1109/icassp.2004.1326549 article EN IEEE International Conference on Acoustics Speech and Signal Processing 2004-09-28

Copy move forgery detection is a very popular research area and lot of methods have been suggested by researchers.However, every method has its own merits weaknesses hence, new techniques are being continuously devised analyzed.There many post processing operations used the manipulators to obstruct techniques.One such operation changing contrast whole image or copy moved regions, which existing fail address.A novel using binary discrete cosine transform vectors proposed detect in presence...

10.5815/ijigsp.2015.06.05 article EN International Journal of Image Graphics and Signal Processing 2015-05-08

Nowadays all the visual forms have become digital for communication of important and useful data. It has imperative to check authenticity content available in form images. Image forensic is an emerging area realness reliability Amongst various image forgeries known, copy-move forgery poses a serious threat society experts. "copy-move" considered one most difficult problems detection forensics. In forgery, partof its copied pasted within same image. For copy move many methods been proposed...

10.1080/09720510.2017.1395181 article EN Journal of Statistics and Management Systems 2017-07-04
Coming Soon ...