Kishore Kumar

Learn More
Visual cryptography encodes a secret image into n shares which are distributed to n participants. Pixel Sieve method was proposed recently to encode an image into shares, but the encryption quality is poor. In this paper an improved version of pixel sieve method is proposed to achieve more security then existing pixel sieve method. Based on cross merge and(More)
OBJECTIVES To describe formal, external to programme methods for size estimation of high-risk populations and compare execution challenges and validity of results. DESIGN A cross-sectional HIV risk behavioural and biological survey was implemented among 24, 10 and five female sex workers, high-risk men who have sex with men and injecting drug user survey(More)
Content-based image retrieval (CBIR) systems normally return the retrieval results according to the similarity between features extracted from the query and candidate images. In certain circumstances, however users are most qualified to specify the query “content” or objects(e.g., Eiffel Tower) of their interest , not the computer and only wish to retrieve(More)
Kalman filter is a well known adaptive filtering Algorithm, widely used for target tracking applications. When the system model and measurements are non linear, variation of Kalman filter like extended Kalman filter (EKF) and Unscented Kalman filters (UKF) are used. For obtaining reliable estimate of the target state, filter has to be tuned before the(More)
We have proposed new approach for the speech recognition system by applying kernel adaptive filter for speech enhancement and for the recognition, the hybrid HMM/DTW methods are used in this paper. Noise removal is very important in many applications like telephone conversation, speech recognition, etc. In the recent past, the kernel methods are showing(More)