K. B. Raja

According to our database1, K. B. Raja authored at least 30 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An optimised local feature compression using statistical and structural approach for face recognition.
Int. J. Comput. Vis. Robotics, 2023

2021
Low light image denoising solution with contrast enhancement in curvelet domain using Gaussian mixture adaptation model.
Int. J. Wavelets Multiresolution Inf. Process., 2021

FPGACam: A FPGA based efficient camera interfacing architecture for real time video processing.
IET Circuits Devices Syst., 2021

2020
FPGA Implementation of Optimized Karhunen-Loeve Transform for Image Processing Applications.
J. Real Time Image Process., 2020

Windowing approach for face recognition using the spatial-temporal method and artificial neural network.
Int. J. Appl. Pattern Recognit., 2020

2018
Implementation of Fingerprint Based Biometric System Using Optimized 5/3 DWT Architecture and Modified CORDIC Based FFT.
Circuits Syst. Signal Process., 2018

2016
An Efficient Reconfigurable Architecture for Fingerprint Recognition.
VLSI Design, 2016

Recognizing Human Faces with Tilt.
Proceedings of the 5th International Conference on Frontiers in Intelligent Computing: Theory and Applications, 2016

2015
PCVOS: Principal component variances based off-line signature verification.
Proceedings of the 2nd IEEE International Conference on Recent Trends in Information Systems, 2015

2014
Two-Hop Routing with Traffic-Differentiation for QoS Guarantee in Wireless Sensor Networks.
CoRR, 2014

Link-Reliability Based Two-Hop Routing for Wireless Sensor Networks.
CoRR, 2014

FPGA Based Efficient Multiplier for Image Processing Applications Using Recursive Error Free Mitchell Log Multiplier and KOM Architecture.
CoRR, 2014

2013
Link-reliability based two-hop routing for QoS guarantee in Wireless Sensor Networks.
Proceedings of the 16th International Symposium on Wireless Personal Multimedia Communications, 2013

Face recognition using transform domain texture features.
Proceedings of the Sixth International Conference on Machine Vision, 2013

DTCWT based high capacity steganography using coefficient replacement and adaptive scaling.
Proceedings of the Sixth International Conference on Machine Vision, 2013

Traffic-Differentiated Two-Hop Routing for QoS in Wireless Sensor Networks.
Proceedings of the 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2013

2012
DBC based Face Recognition using DWT
CoRR, 2012

2011
DWT Based Fingerprint Recognition using Non Minutiae Features
CoRR, 2011

Covariance Based Steganography Using DCT.
Proceedings of the Advances in Computing and Communications, 2011

2010
Low Power Reversible Parallel Binary Adder/Subtractor
CoRR, 2010

Fingerprint Recognition Using Minutia Score Matching
CoRR, 2010

Combined Off-Line Signature Verification Using Neural Networks.
Proceedings of the Information and Communication Technologies - International Conference, 2010

Fingerprint Recognition Using Inter Ridge Variation.
Proceedings of the 3rd International Conference on Emerging Trends in Engineering and Technology, 2010

2009
Fingerprint Verification based on Gabor Filter Enhancement
CoRR, 2009

Offline signature authentication using cross-validated graph matching.
Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, 2009

Iris feature extraction using directional filter bank for personal identification.
Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, 2009

Extracting hidden image using histogram, DFT and SVM.
Proceedings of the 2nd Bangalore Annual Compute Conference, Compute 2009, 2009

Advanced Biometric Identification on Face, Gender and Age Recognition.
Proceedings of the ARTCom 2009, 2009

2008
Robust image adaptive steganography using integer wavelets.
Proceedings of the Third International Conference on COMmunication System softWAre and MiddlewaRE (COMSWARE 2008), 2008

2007
Genetic Algorithm Based Steganography Using Wavelets.
Proceedings of the Information Systems Security, Third International Conference, 2007


  Loading...