default search action
K. B. Raja
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j7]A. Divya, K. B. Raja, K. R. Venugopal:
An optimised local feature compression using statistical and structural approach for face recognition. Int. J. Comput. Vis. Robotics 13(5): 469-496 (2023) - 2021
- [j6]Sayantam Sarkar, Satish S. Bhairannawar, K. B. Raja:
FPGACam: A FPGA based efficient camera interfacing architecture for real time video processing. IET Circuits Devices Syst. 15(8): 814-829 (2021) - [j5]K. Sreekala, H. C. Sateesh Kumar, K. B. Raja:
Low light image denoising solution with contrast enhancement in curvelet domain using Gaussian mixture adaptation model. Int. J. Wavelets Multiresolution Inf. Process. 19(1): 2050054:1-2050054:17 (2021) - 2020
- [j4]A. Divya, K. B. Raja, K. R. Venugopal:
Windowing approach for face recognition using the spatial-temporal method and artificial neural network. Int. J. Appl. Pattern Recognit. 6(2): 124-162 (2020) - [j3]Satish S. Bhairannawar, Sayantam Sarkar, K. B. Raja:
FPGA Implementation of Optimized Karhunen-Loeve Transform for Image Processing Applications. J. Real Time Image Process. 17(2): 357-370 (2020)
2010 – 2019
- 2018
- [j2]Satish S. Bhairannawar, Sayantam Sarkar, K. B. Raja, K. R. Venugopal:
Implementation of Fingerprint Based Biometric System Using Optimized 5/3 DWT Architecture and Modified CORDIC Based FFT. Circuits Syst. Signal Process. 37(1): 342-366 (2018) - 2016
- [j1]Satish S. Bhairannawar, K. B. Raja, K. R. Venugopal:
An Efficient Reconfigurable Architecture for Fingerprint Recognition. VLSI Design 2016: 9532762:1-9532762:22 (2016) - [c15]H. S. Jagadeesh, K. Suresh Babu, K. B. Raja:
Recognizing Human Faces with Tilt. FICTA (2) 2016: 427-435 - 2015
- [c14]J. S. Arunalatha, C. R. Prashanth, V. Tejaswi, K. Shaila, K. B. Raja, Dinesh Anvekar, K. R. Venugopal, S. Sitharama Iyengar, Lalit M. Patnaik:
PCVOS: Principal component variances based off-line signature verification. ReTIS 2015: 195-199 - 2014
- [i8]T. Shivaprakash, K. B. Raja, K. R. Venugopal, S. S. Iyengar, Lalit M. Patnaik:
Two-Hop Routing with Traffic-Differentiation for QoS Guarantee in Wireless Sensor Networks. CoRR abs/1402.7198 (2014) - [i7]Prakash T. Shiva, K. B. Raja, K. R. Venugopal, S. S. Iyengar, Lalit M. Patnaik:
Link-Reliability Based Two-Hop Routing for Wireless Sensor Networks. CoRR abs/1403.0001 (2014) - [i6]Satish S. Bhairannawar, R. Rathan, K. B. Raja, K. R. Venugopal, Lalit M. Patnaik:
FPGA Based Efficient Multiplier for Image Processing Applications Using Recursive Error Free Mitchell Log Multiplier and KOM Architecture. CoRR abs/1407.2082 (2014) - 2013
- [c13]T. Shivaprakash, K. B. Raja, K. R. Venugopal, S. S. Iyengar, Lalit M. Patnaik:
Traffic-Differentiated Two-Hop Routing for QoS in Wireless Sensor Networks. CyberC 2013: 356-363 - [c12]N. Sathisha, R. Priya, K. Suresh Babu, K. B. Raja, K. R. Venugopal, L. M. Patnaik:
DTCWT based high capacity steganography using coefficient replacement and adaptive scaling. ICMV 2013: 90671O - [c11]Rangaswamy Y., Ramya S. K, K. B. Raja, Venugopal K. R., L. M. Patnaik:
Face recognition using transform domain texture features. ICMV 2013: 90671P - [c10]Prakash T. Shiva, K. B. Raja, K. R. Venugopal, S. S. Iyengar, Lalit M. Patnaik:
Link-reliability based two-hop routing for QoS guarantee in Wireless Sensor Networks. WPMC 2013: 1-6 - 2012
- [i5]H. S. Jagadeesh, K. Suresh Babu, K. B. Raja:
DBC based Face Recognition using DWT. CoRR abs/1205.1644 (2012) - 2011
- [c9]N. Sathisha, K. Suresh Babu, K. B. Raja, K. R. Venugopal, Lalit M. Patnaik:
Covariance Based Steganography Using DCT. ACC (2) 2011: 636-647 - [i4]D. R. Shashi Kumar, K. B. Raja, R. K. Chhotaray, Sabyasachi Pattanaik:
DWT Based Fingerprint Recognition using Non Minutiae Features. CoRR abs/1106.3517 (2011) - 2010
- [c8]A. C. Ramachandra, M. A. N. S. Raghavendra, K. B. Raja, K. R. Venugopal, Lalit M. Patnaik:
Fingerprint Recognition Using Inter Ridge Variation. ICETET 2010: 207-212 - [c7]D. R. Shashi Kumar, R. Ravi Kumar, K. B. Raja, R. K. Chhotaray, Sabyasachi Pattanaik:
Combined Off-Line Signature Verification Using Neural Networks. ICT 2010: 580-583 - [i3]J. Ravi, K. B. Raja, K. R. Venugopal:
Fingerprint Recognition Using Minutia Score Matching. CoRR abs/1001.4186 (2010) - [i2]H. G. Rangaraju, U. Venugopal, K. N. Muralidhara, K. B. Raja:
Low Power Reversible Parallel Binary Adder/Subtractor. CoRR abs/1009.6218 (2010)
2000 – 2009
- 2009
- [c6]K. Ramesha, N. Srikanth, K. B. Raja, K. R. Venugopal, Lalit M. Patnaik:
Advanced Biometric Identification on Face, Gender and Age Recognition. ARTCom 2009: 23-27 - [c5]C. R. Prashanth, S. P. Ganavi, T. D. Mahalakshmi, K. B. Raja, K. R. Venugopal, Lalit M. Patnaik:
Iris feature extraction using directional filter bank for personal identification. Bangalore Compute Conf. 2009: 6 - [c4]A. C. Ramachandra, K. Pavithra, K. Yashasvini, K. B. Raja, K. R. Venugopal, Lalit M. Patnaik:
Offline signature authentication using cross-validated graph matching. Bangalore Compute Conf. 2009: 7 - [c3]T. H. Manjula Devi, Pooja P. Shenoy, Swathi Saigali, Harsha Mathew, K. B. Raja, K. R. Venugopal, Lalit M. Patnaik:
Extracting hidden image using histogram, DFT and SVM. Bangalore Compute Conf. 2009: 26 - [i1]B. N. Lavanya, K. B. Raja, K. R. Venugopal:
Fingerprint Verification based on Gabor Filter Enhancement. CoRR abs/0912.0950 (2009) - 2008
- [c2]K. B. Raja, S. Sindhu, T. D. Mahalakshmi, S. Akshatha, B. K. Nithin, M. Sarvajith, K. R. Venugopal, Lalit M. Patnaik:
Robust image adaptive steganography using integer wavelets. COMSWARE 2008: 614-621 - 2007
- [c1]K. B. Raja, Kiran Kumar K., Satish Kumar N., M. S. Lakshmi, H. Preeti, K. R. Venugopal, Lalit M. Patnaik:
Genetic Algorithm Based Steganography Using Wavelets. ICISS 2007: 51-63
Coauthor Index
aka: L. M. Patnaik
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint