Thounaojam Rupachandra Singh

Thounaojam Rupachandra Singh
Manipur University · Computer Science Department

PhD, NET

About

19
Publications
6,071
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
101
Citations
Citations since 2016
10 Research Items
76 Citations
2016201720182019202020212022051015
2016201720182019202020212022051015
2016201720182019202020212022051015
2016201720182019202020212022051015
Introduction
Skills and Expertise
Additional affiliations
May 2015 - July 2016
Manipur University
Position
  • Professor (Assistant)

Publications

Publications (19)
Article
Full-text available
Medical imaging is inevitable for the advanced healthcare system, and its extensive application has led to the generation of image repositories, and also picture storage and communication systems. These databases contains images obtained from a versatile modalitiesarray, multidimensional images, and also co-aligned multimodality images. In the medi...
Article
Diagnosis based on Medical-image is a challenging task and in different medical images, medical experts may overlook the small lesions because of human visual system‟s limited attention span. However, through an effective Content-Based Medical Image Retrieval (CBMIR) system, similar cases in previous medical database are explored for resolving this...
Chapter
Wormhole attack is a harmful attack that disrupts the normal functioning of the network by manipulating routing protocols and exhausting network resources. The paper presents a technique that detects the presence of wormhole attack in wire- less sensor network (WSN) using artificial neural network (ANN). The proposed technique uses connectivity inf...
Article
Full-text available
Wireless Sensor Network (WSN) is susceptible to various kinds of security attacks such as the misdirection attack. Detection of misdirection attack in WSN is a difficult job. The malicious node misdirects the arriving packets to a node other than the purposive node in the path from the source to the destination. Consequently, it introduces hig...
Article
Full-text available
This paper gives a complete analysis of Skype Traffic. Based on the analysis of Skype Traffic, we proposed a heuristic based detection method which classified the Skype Signaling and Skype Media Traffic. We properly categorized the Skype Media traffic as audio or video conversation. In this paper, we also propose a novel approach to identify VoIP N...
Article
Full-text available
Human communication technology has changed dynamically with time. With emerging trends and technologies, users nowadays are shifting from traditional phone call to VoIP (Voice over IP) applications viz Skype, Google Talk, Google+ Hangout, Asterisk etc. These VoIP applications generate a huge amount of network traffic. And these VoIP traffic need a...
Conference Paper
Full-text available
A novel video watermarking scheme based on visual cryptography and scene change detection in discrete wavelet transform domain is proposed. We start with a complete survey of the current image and video watermarking technologies, and have noticed that majority of the existing schemes are not capable of resisting all attacks. We propose the idea to...
Conference Paper
Full-text available
Multimedia security and copyright protection have become wide interest due the explosion of data exchange in the Internet and the extensive use of digital media. We propose an image watermarking scheme based on visual cryptography in discrete wavelet transform. A complete survey of the current image watermarking technologies was done and has been n...
Conference Paper
Full-text available
Normally the quality of an image is improved by enhancing contrast and sharpness. The enhancement of contrast and sharpening of an image with a single function is a complex task. In real-time imaging, many complex scenes require local contrast improvements that should bring details to the best possible visibility of the image. However, local enhanc...
Conference Paper
The technology of computer graphics and digital cameras are prevalent. High-resolution display and printer are available. High-resolution images are needed in order to produce high quality display images and high quality prints for use in desktop publishing, large artistic printing, mobile phone etc. However, since high-resolution images are not us...
Conference Paper
Full-text available
The technology of computer graphics and digital cameras are prevalent. High-resolution display and printer are available. High-resolution images are needed in order to produce high quality display images and high quality prints for use in desktop publishing, large artistic printing, mobile phone etc. However, since high-resolution images are not us...

Network

Cited By