Skip to main content

Showing 1–7 of 7 results for author: Roja, M M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2006.11161  [pdf, other

    cs.CV cs.AI cs.LG cs.MM eess.IV

    iSeeBetter: Spatio-temporal video super-resolution using recurrent generative back-projection networks

    Authors: Aman Chadha, John Britto, M. Mani Roja

    Abstract: Recently, learning-based models have enhanced the performance of single-image super-resolution (SISR). However, applying SISR successively to each video frame leads to a lack of temporal coherency. Convolutional neural networks (CNNs) outperform traditional approaches in terms of image quality metrics such as peak signal to noise ratio (PSNR) and structural similarity (SSIM). However, generative a… ▽ More

    Submitted 29 September, 2020; v1 submitted 12 June, 2020; originally announced June 2020.

    Comments: 11 pages, 6 figures, 4 tables, Project Page: https://iseebetter.amanchadha.com/

    Journal ref: Springer Journal of Computational Visual Media, Tsinghua University Press, 6(3):307-317, 2020

  2. arXiv:1509.04387  [pdf

    cs.CR cs.MM eess.IV

    Dual-Layer Video Encryption using RSA Algorithm

    Authors: Aman Chadha, Sushmit Mallik, Ankit Chadha, Ravdeep Johar, M. Mani Roja

    Abstract: This paper proposes a video encryption algorithm using RSA and Pseudo Noise (PN) sequence, aimed at applications requiring sensitive video information transfers. The system is primarily designed to work with files encoded using the Audio Video Interleaved (AVI) codec, although it can be easily ported for use with Moving Picture Experts Group (MPEG) encoded files. The audio and video components of… ▽ More

    Submitted 14 September, 2015; originally announced September 2015.

    Comments: arXiv admin note: text overlap with arXiv:1104.0800, arXiv:1112.0836 by other authors

    Journal ref: International Journal of Computer Applications 116(1):33-40, April 2015

  3. Face Recognition Using Discrete Cosine Transform for Global and Local Features

    Authors: Aman R. Chadha, Pallavi P. Vaidya, M. Mani Roja

    Abstract: Face Recognition using Discrete Cosine Transform (DCT) for Local and Global Features involves recognizing the corresponding face image from the database. The face image obtained from the user is cropped such that only the frontal face image is extracted, eliminating the background. The image is restricted to a size of 128 x 128 pixels. All images in the database are gray level images. DCT is appli… ▽ More

    Submitted 6 November, 2011; originally announced November 2011.

    Comments: face recognition; biometrics; person identification; authentication; discrete cosine transform; DCT; global local features; Proceedings of the 2011 International Conference on Recent Advancements in Electrical, Electronics and Control Engineering (IConRAEeCE) IEEE Xplore: CFP1153R-ART; ISBN: 978-1-4577-2149-6

  4. arXiv:1111.1090  [pdf

    cs.CV cs.CR eess.IV

    A robust, low-cost approach to Face Detection and Face Recognition

    Authors: Divya Jyoti, Aman Chadha, Pallavi Vaidya, M. Mani Roja

    Abstract: In the domain of Biometrics, recognition systems based on iris, fingerprint or palm print scans etc. are often considered more dependable due to extremely low variance in the properties of these entities with respect to time. However, over the last decade data processing capability of computers has increased manifold, which has made real-time video content analysis possible. This shows that the ne… ▽ More

    Submitted 4 November, 2011; originally announced November 2011.

    Comments: discrete wavelet transform, face detection, face recognition, person identification

    Journal ref: CiiT International Journal of Digital Image Processing, Vol. 15, No. 10, October 2011, ISSN 0974 - 9691 (Print) & ISSN 0974 - 9586 (Online)

  5. arXiv:1111.0024  [pdf

    cs.SD cs.CR cs.LG eess.AS

    Text-Independent Speaker Recognition for Low SNR Environments with Encryption

    Authors: Aman Chadha, Divya Jyoti, M. Mani Roja

    Abstract: Recognition systems are commonly designed to authenticate users at the access control levels of a system. A number of voice recognition methods have been developed using a pitch estimation process which are very vulnerable in low Signal to Noise Ratio (SNR) environments thus, these programs fail to provide the desired level of accuracy and robustness. Also, most text independent speaker recognitio… ▽ More

    Submitted 31 October, 2011; originally announced November 2011.

    Comments: Biometrics, Pattern Recognition, Security, Speaker Individuality, Text-independence, Pitch Extraction, Voice Recognition, Autocorrelation; Published by Foundation of Computer Science, New York, USA

    Journal ref: International Journal of Computer Applications 31(10):43-50, 2011

  6. arXiv:1110.1209  [pdf

    cs.CR cs.IT cs.MM eess.AS

    Audio Watermarking with Error Correction

    Authors: Aman Chadha, Sandeep Gangundi, Rishabh Goel, Hiren Dave, M. Mani Roja

    Abstract: In recent times, communication through the internet has tremendously facilitated the distribution of multimedia data. Although this is indubitably a boon, one of its repercussions is that it has also given impetus to the notorious issue of online music piracy. Unethical attempts can also be made to deliberately alter such copyrighted data and thus, misuse it. Copyright violation by means of unauth… ▽ More

    Submitted 6 October, 2011; originally announced October 2011.

    Comments: watermarking; audio watermarking; data hiding; data confidentiality

    Journal ref: International Journal of Advanced Computer Science and Applications ( IJACSA ) , Vol 2 Issue 9, 2011, 113 - 118

  7. arXiv:1110.1208  [pdf

    cs.CV cs.CR cs.IT cs.MM eess.IV

    Rotation, Scaling and Translation Analysis of Biometric Signature Templates

    Authors: Aman Chadha, Divya Jyoti, M. Mani Roja

    Abstract: Biometric authentication systems that make use of signature verification methods often render optimum performance only under limited and restricted conditions. Such methods utilize several training samples so as to achieve high accuracy. Moreover, several constraints are imposed on the end-user so that the system may work optimally, and as expected. For example, the user is made to sign within a s… ▽ More

    Submitted 6 October, 2011; originally announced October 2011.

    Comments: rotation; scaling; translation; RST; image registration; signature verification

    Journal ref: International Journal of Computer Technology and Applications, Vol 2 No 5, 2011, 1419 - 1425