default search action
Rajarshi Pal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j6]K. Suresh, Rajarshi Pal, S. R. Balasundaram:
A stable cryptographic key generation from fingerprint biometrics using Gray code for secure data storage. Int. J. Inf. Comput. Secur. 20(3/4): 366-398 (2023) - [c27]Sabhapathy Myakal, Rajarshi Pal, Nekuri Naveen:
A Novel Pixel Value Predictor Using Long Short Term Memory (LSTM) Network. MIWAI 2023: 324-335 - [c26]Sabhapathy Myakal, Rajarshi Pal, Nekuri Naveen:
Pixel Value Prediction Task: Performance Comparison of Multi-Layer Perceptron and Radial Basis Function Neural Network. MIWAI 2023: 543-553 - [c25]Shadab Ahmad, Rajarshi Pal, Avatharam Ganivada:
Identifying a Person in Mask: Fusion of Masked Face and Iris. PReMI 2023: 802-812 - 2022
- [j5]Prabhat Dansena, Soumen Bag, Rajarshi Pal:
Pen ink discrimination in handwritten documents using statistical and motif texture analysis : A classification based approach. Multim. Tools Appl. 81(21): 30881-30909 (2022) - [j4]Shadab Ahmad, Rajarshi Pal, Avatharam Ganivada:
Rank level fusion of multimodal biometrics using genetic algorithm. Multim. Tools Appl. 81(28): 40931-40958 (2022) - [c24]Shadab Ahmad, Rajarshi Pal, Avatharam Ganivada:
Matching Score-Based Biometric Quality Estimation for Score and Rank Level Fusion for Person Identification. ICVGIP 2022: 56:1-56:8 - 2021
- [j3]Prabhat Dansena, Soumen Bag, Rajarshi Pal:
Generation of Synthetic Data for Handwritten Word Alteration Detection. IEEE Access 9: 38979-38990 (2021) - [c23]Shadab Ahmad, Rajarshi Pal, Avatharam Ganivada:
Score Level Fusion of Multimodal Biometrics Using Genetic Algorithm. CEC 2021: 2242-2250 - [c22]Challa Venkatrao, Rajarshi Pal, Ashish Verma, Debashis Sen:
Image Re-attentionizing Using Particle Swarm Optimization. PReMI 2021: 32-41 - [c21]Shadab Ahmad, Rajarshi Pal, Avatharam Ganivada:
Rank Level Fusion of Multimodal Biometrics Using Particle Swarm Optimization. PReMI 2021: 387-397 - 2020
- [j2]Prabhat Dansena, Rajarshi Pal, Soumen Bag:
Quantitative assessment of capabilities of colour models for pen ink discrimination in handwritten documents. IET Image Process. 14(8): 1594-1604 (2020) - [c20]Abhishek Bhandari, Shivraj Sharma, Ravi Uyyala, Rajarshi Pal, Mridula Verma:
Reversible Data Hiding Using Multi-Layer Perceptron Based Pixel Prediction. IAIT 2020: 11:1-11:8
2010 – 2019
- 2019
- [j1]Ravi Uyyala, Rajarshi Pal, Munaga V. N. K. Prasad:
Reversible data hiding using B-tree triangular decomposition based prediction. IET Image Process. 13(11): 1986-1997 (2019) - [c19]Prabhat Dansena, Rahul Pramanik, Soumen Bag, Rajarshi Pal:
Ink Analysis Using CNN-Based Transfer Learning to Detect Alteration in Handwritten Words. CVIP (2) 2019: 223-232 - 2018
- [c18]Rajarshi Pal, Naveen Chowdary:
Statistical Profiling of n-grams for Payload Based Anomaly Detection for HTTP Web Traffic. ANTS 2018: 1-6 - [c17]Shadab Ahmad, Lalit Mohan Sanagavarapu, Rajarshi Pal, Y. Raghu Reddy:
Rank Aggregation Approach for Identifying Critical Information Infrastructure. ICACCI 2018: 1328-1333 - [c16]Abhishek Tiwari, Rajarshi Pal:
Gaze-Based Graphical Password Using Webcam. ICISS 2018: 448-461 - 2017
- [c15]Rajarshi Pal, Dipanjan Roy:
Enhancing Saliency of an Object Using Genetic Algorithm. CRV 2017: 337-344 - [c14]Prabhat Dansena, Soumen Bag, Rajarshi Pal:
Differentiating Pen Inks in Handwritten Bank Cheques Using Multi-layer Perceptron. PReMI 2017: 655-663 - [c13]Ayonya Prabhakaran, Rajarshi Pal:
Image Pixel Prediction from Neighborhood Pixels Using Multilayer Perceptron. SocProS (2) 2017: 221-230 - [c12]Dipanjan Roy, Rajarshi Pal:
Enhancing Saliency of a Target Object Through Color Modification of Every Object Using Genetic Algorithm. SocProS (2) 2017: 771-779 - [e1]Ashish Ghosh, Rajarshi Pal, Rajendra Prasath:
Mining Intelligence and Knowledge Exploration - 5th International Conference, MIKE 2017, Hyderabad, India, December 13-15, 2017, Proceedings. Lecture Notes in Computer Science 10682, Springer 2017, ISBN 978-3-319-71927-6 [contents] - 2016
- [c11]Ravi Uyyala, Munaga V. N. K. Prasad, Rajarshi Pal:
Selected Context Dependent Prediction for Reversible Watermarking with Optimal Embedding. CVIP (2) 2016: 35-46 - [c10]Prasun Chandra Tripathi, Rajarshi Pal:
Content-aware image retargeting with controlled distortion for small displays. ICACCI 2016: 193-200 - [c9]Apurba Gorai, Rajarshi Pal, Phalguni Gupta:
Document fraud detection by ink analysis using texture features and histogram matching. IJCNN 2016: 4512-4517 - 2015
- [c8]Prabhat Dansena, K. Pramod Kumar, Rajarshi Pal:
Line based extraction of important regions from a cheque image. IC3 2015: 183-189 - [c7]Ram Prakash Sharma, Rajarshi Pal:
Saliency based image steganography with varying base SDS and multi-objective genetic algorithm. ICACCI 2015: 1966-1974 - 2014
- [c6]K. Rakesh, Rajarshi Pal:
Detecting Background Line as Preprocessing for Offline Signature Verification. MIKE 2014: 164-171 - 2012
- [c5]Rajarshi Pal, Jayanta Mukherjee, Pabitra Mitra:
How do warm colors affect visual attention? ICVGIP 2012: 24 - [c4]Rajarshi Pal, Pabitra Mitra, Jayanta Mukherjee:
Image retargeting using controlled shrinkage. ICVGIP 2012: 71 - [r1]Rajarshi Pal, Ashish Ghosh, Sankar K. Pal:
Video Summarization and Significance of Content. Handbook of Soft Computing for Video Surveillance 2012: 79-102 - 2011
- [c3]Rajarshi Pal, Jayanta Mukhopadhyay, Pabitra Mitra:
Image Retargeting through Constrained Growth of Important Rectangular Partitions. PReMI 2011: 104-109
2000 – 2009
- 2009
- [c2]Rajarshi Pal, Jayanta Mukherjee, Pabitra Mitra:
An Approach for Preparing Groundtruth Data and Evaluating Visual Saliency Models. PReMI 2009: 279-284 - 2008
- [c1]Rajarshi Pal, Pabitra Mitra, Jayanta Mukhopadhyay:
ICam: Maximizes Viewers' Attention on Intended Objects. PCM 2008: 821-824
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-07 22:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint