- Cloud Computing and Resource Management
- IoT and Edge/Fog Computing
- Digital Media Forensic Detection
- Advanced Steganography and Watermarking Techniques
- Image Processing Techniques and Applications
- Chaos-based Image/Signal Encryption
- Anomaly Detection Techniques and Applications
- Video Surveillance and Tracking Methods
- Face and Expression Recognition
- Software-Defined Networks and 5G
- Distributed and Parallel Computing Systems
- Caching and Content Delivery
- Advanced Data Storage Technologies
- Advanced Authentication Protocols Security
- User Authentication and Security Systems
- Neural Networks and Applications
- Nutritional Studies and Diet
- Advanced Clustering Algorithms Research
- Network Security and Intrusion Detection
- Parallel Computing and Optimization Techniques
- Face recognition and analysis
- Blockchain Technology Applications and Security
- Wireless Body Area Networks
- Internet Traffic Analysis and Secure E-voting
- Cell Image Analysis Techniques
Manipal University Jaipur
2019-2025
Chandigarh University
2025
Lingaya's Vidyapeeth
2024
Sharda University
2021-2022
National Institute of Technical Teachers Training and Research
2018
Mody University of Science and Technology
2013-2017
Faculty (United Kingdom)
2015
Veer Surendra Sai University of Technology
2015
Sri Sri University
2015
Manipal Academy of Higher Education
2011
Over the past few years, paradigm of social networking has grown to such a degree that websites have evolved into full-fledged platforms, catering wide range consumer interests. The near-ubiquity Internet access facilitated proliferation users indulge in networking. However, this spread usage and particular brings with it need design implement plethora security enhancing privacy preserving protocols standards. Several mechanisms been proposed ensure primary features as confidentiality,...
Software-defined network (SDN) becomes a new revolutionary paradigm in networks because it provides more control and operation over infrastructure. The SDN controller is considered as the operating system of based infrastructure, responsible for executing different applications maintaining services functionalities. Despite all its tremendous capabilities, face many security issues due to complexity architecture. Distributed denial (DDoS) common attack on centralized architecture, especially...
Music is the form of art known to have a greater connection with person's emotion. It has got unique ability lift up one's mood. If user receives recommendation based on his preference, it will also improve listing experience. recommendations existed for long time. Still, in most scenarios, decided after learning preferences over time, like looking at their past song preferences, amount time they listen music, etc. This paper suggests neural network-based approach where facial expressions...
Software fault prediction (SFP) refers to the early identification of faults that can pose significant challenges sustainable software development (SSD) goals, primarily through resource waste, increased energy consumption, and extended cycles. SFP allows testing efforts focus on fixing issues before they escalate, minimizing wasted time effort. models facilitate high-quality end-products with reduced environmental impact optimal utilization by enabling organizations minimize failures align...
Copy move forgery detection is emerging as one of the hot research topic among researchers in area image forensics. Many techniques have been suggested to detect such type tampering with original image, but problem far from being solved. Some issues still remained either unsolved or there a lot scope for performance improvement. Block matching algorithm block tiling most commonly used method duplication image. One major challenges time complexity algorithms. As size increases number...
World population has increased manifolds in the last ten years. With increase at this alarming rate, studying and understanding crowd patterns their collective behaviour is very important. Researchers from various domains like artificial intelligence, machine learning, social science have shown interest phenomena social, psychological, technical points of view. Computer vision techniques play a vital role developing methods that help analysing automatically. In article, we surveyed many...
The major objective of the article is to supply novel and efficient methodology digital image steganography that describes individuality regarding secret transmission using adaptive circular queue least significant bits (LSBs) substitution. data structure employed dynamically in resource distribution between multiple communication recipients once information transmitted asynchronously. Here, RSA cryptosystem for confidentiality authentication. result organised into various blocks. In method,...
Cloud computing is frequently alluded to as a model that furnishes boundless information handling conveniences with compensation for each utilization framework. Present day cloud foundations resources virtual machines (VMs) actual utilizing virtualization innovation. All VMs works their involved structure and exhaust from machine which behaves like host. For load adjusting, moves exceptionally troubled real low machines. The delay of this calculation expansions in the organization are...
Copy move forgery detection in digital images has become a very popular research topic the area of image forensics.Due to availability sophisticated editing tools and ever increasing hardware capabilities, it an easy task manipulate images.Passive techniques are more relevant as they can be applied without prior information about question.Block based used detect copy forgery, but have limitations large time complexity sensitivity against affine operations like rotation scaling.Keypoint...
Edge detection is a vital feature in the field of Computer Vision for extracting meaningful information from digital images. The primary aim our proposed technique to obtain thin edges, so that result derived suitable more further applications such as boundary detection, image segmentation, motion detection/estimation, texture analysis, object identification and on. We have done comparative analysis four edge detectors use different methods detecting edges tested their results under variety...
We propose a fast and robust global motion estimation (GME) algorithm, based on 2-stage coarse-to-fine refinement strategy, which is capable of measuring large motions. A 6-parameter affine model has been used. Coarse carried out in the frequency domain using polar, log-polar or log-log sampling Fourier magnitude spectrum sub-sampled image. The scheme adaptively selected, past patterns. stage consists RANSAC fitting to vectors randomly selected high-activity blocks, hence outliers. vector...
Copy move forgery detection is a very popular research area and lot of methods have been suggested by researchers.However, every method has its own merits weaknesses hence, new techniques are being continuously devised analyzed.There many post processing operations used the manipulators to obstruct techniques.One such operation changing contrast whole image or copy moved regions, which existing fail address.A novel using binary discrete cosine transform vectors proposed detect in presence...
Nowadays all the visual forms have become digital for communication of important and useful data. It has imperative to check authenticity content available in form images. Image forensic is an emerging area realness reliability Amongst various image forgeries known, copy-move forgery poses a serious threat society experts. "copy-move" considered one most difficult problems detection forensics. In forgery, partof its copied pasted within same image. For copy move many methods been proposed...