Modelling visual saliency using degree centrality R Pal, A Mukherjee, P Mitra, J Mukherjee IET computer vision 4 (3), 218-229, 2010 | 35 | 2010 |
A new image watermarking scheme using saliency based visual attention model A Sur, SS Sagar, R Pal, P Mitra, J Mukhopadhyay 2009 Annual IEEE India Conference, 1-4, 2009 | 30 | 2009 |
Differentiating pen inks in handwritten bank cheques using multi-layer perceptron P Dansena, S Bag, R Pal International conference on pattern recognition and machine intelligence …, 2017 | 28 | 2017 |
Document fraud detection by ink analysis using texture features and histogram matching A Gorai, R Pal, P Gupta 2016 International Joint Conference on Neural Networks (IJCNN), 4512-4517, 2016 | 27 | 2016 |
Reversible Data Hiding Using Improved Gradient Based Prediction and Adaptive Histogram Bin Shifting R Uyyala, R Pal 2020 7th International Conference on Signal Processing and Integrated …, 2020 | 18 | 2020 |
Reversible data hiding using B-tree triangular decomposition based prediction R Uyyala, R Pal, MVNK Prasad IET Image Processing 13 (11), 1986-1997, 2019 | 16 | 2019 |
Reversible Data Hiding Based on the Random Distribution of Reference Pixels R Uyyala, R Pal 2018 IEEE Region Ten Symposium (Tensymp), 225-230, 2018 | 16 | 2018 |
How do warm colors affect visual attention? R Pal, J Mukherjee, P Mitra Proceedings of the Eighth Indian Conference on Computer Vision, Graphics and …, 2012 | 15 | 2012 |
Computational Models of Visual Attention: A Survey R Pal Research Developments in Computer Vision and Image Processing: Methodologies …, 2013 | 14* | 2013 |
Fingerprint based cryptographic key generation K Suresh, R Pal, SR Balasundaram Intelligent Data Communication Technologies and Internet of Things: ICICI …, 2020 | 13 | 2020 |
Detection of manipulated cheque images in cheque truncation system using mismatch in pixels M Rajender, R Pal 2014 2nd International Conference on Business and Information Management …, 2014 | 12 | 2014 |
Two-factor-based RSA key generation from fingerprint biometrics and password for secure communication K Suresh, R Pal, SR Balasundaram Complex & Intelligent Systems 8 (4), 3247-3261, 2022 | 11 | 2022 |
Reversible Data Hiding with Selected Directional Context Based Prediction Using 8-Neighborhood R Uyyala, R Pal 2020 IEEE International Conference on Electronics, Computing and …, 2020 | 11 | 2020 |
Reversible Data Hiding Using Multi-Layer Perceptron Based Pixel Prediction A Bhandari, S Sharma, R Uyyala, R Pal, M Verma Proceedings of the 11th International Conference on Advances in Information …, 2020 | 11 | 2020 |
Line based extraction of important regions from a cheque image P Dansena, KP Kumar, R Pal 2015 Eighth International Conference on Contemporary Computing (IC3), 183-189, 2015 | 11 | 2015 |
Detecting tampered cheque images in cheque truncation system using difference expansion based watermarking S Kota, R Pal 2014 IEEE International Advance Computing Conference (IACC), 1041-1047, 2014 | 10 | 2014 |
Quantitative assessment of capabilities of colour models for pen ink discrimination in handwritten documents P Dansena, R Pal, S Bag IET Image Processing 14 (8), 1594-1604, 2020 | 9 | 2020 |
Selected context dependent prediction for reversible watermarking with optimal embedding R Uyyala, MVNK Prasad, R Pal Proceedings of International Conference on Computer Vision and Image …, 2016 | 9 | 2016 |
Gradient dependent reversible watermarking with low embedding impact R Uyyala, R Pal, MVNK Prasad 2016 3rd International Conference on Signal Processing and Integrated …, 2016 | 9 | 2016 |
Image steganography using single digit sum with varying base C Balakrishna, V NaveenChandra, R Pal 2014 IEEE International Conference on Electronics, Computing and …, 0 | 8 | |