• Publications
  • Influence
Segmentation and histogram generation using the HSV color space for image retrieval
TLDR
We have analyzed the properties of the HSV (hue, saturation, value) color space with emphasis on the visual perception of the variation in hue, saturation and intensity values of an image pixel. Expand
  • 486
  • 17
  • PDF
Credit Card Fraud Detection Using Hidden Markov Model
TLDR
We model the sequence of operations in credit card transaction processing using a hidden Markov model (HMM) and show how it can be used for the detection of frauds. Expand
  • 308
  • 12
Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning
TLDR
We propose a novel approach for credit card fraud detection, which combines evidences from current as well as past behavior. Expand
  • 250
  • 12
  • PDF
Gait Recognition in the Presence of Occlusion: A New Dataset and Baseline Algorithms
TLDR
We present a new dataset for gait recognition which addresses the problem of dynamic and static inter object occlusion. Expand
  • 49
  • 9
  • PDF
Database Intrusion Detection using Weighted Sequence Mining
TLDR
We propose an algorithm for finding dependencies among important data items in a relational database management system. Expand
  • 82
  • 8
  • PDF
Automatic Detection of Human Fall in Video
TLDR
We present an approach for human fall detection using a single camera video sequence. Expand
  • 126
  • 7
Analyzing temporal role based access control models
TLDR
We consider the temporal extension of Role Based Access Control (TRBAC), and develop safety analysis techniques for it. Expand
  • 32
  • 7
  • PDF
BLAST-SSAHA Hybridization for Credit Card Fraud Detection
TLDR
We propose to use two-stage sequence alignment in which a profile analyzer (PA) first determines the similarity of an incoming sequence of transactions on a given credit card with the genuine cardholder's past spending sequences. Expand
  • 51
  • 7
Gait recognition using Pose Kinematics and Pose Energy Image
TLDR
We model a gait cycle using a chain of key poses and extract a novel feature called Pose Energy Image (PEI). Expand
  • 77
  • 6
Weighted Intra-transactional Rule Mining for Database Intrusion Detection
TLDR
We propose an intrusion detection algorithm for database intrusion detection using a data mining technique, which takes the sensitivity of the attributes into consideration. Expand
  • 40
  • 6
  • PDF