Vikas Humbe

Vikas Humbe
Swami Ramanand Teerth Marathwada University, sub-centre, latur · School of Technology

M. Sc. Ph. D. Computer Science

About

76
Publications
12,202
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
284
Citations
Additional affiliations
December 2010 - present
Swami Ramanand Teerth Marathwada University, sub-centre, latur
Position
  • Professor (Assistant)
December 2010 - present
Swami Ramanand Teerth Marathwada University, Sub-Centre, Latur
Position
  • Professor (Assistant)
Description
  • Teaching and Research
September 2009 - December 2010
Dr. babasaheb Ambedkar Marathwada University, auranagbad
Position
  • Professor (Assistant)
Description
  • Teaching to MCA Course

Publications

Publications (76)
Article
Full-text available
The increasing amount of fingerprints collected by law enforcement agencies has created an enormous problem in storage and transmission [1]. To reduce the increasing demand of storage space and transmission time, Compression techniques are the need of the day. There are many image compression techniques available at present. Wavelet coding is one o...
Article
Full-text available
Principal Component Analysis (PCA) is the best face recognition method. This research suggests PCA for fingerprint and signature recognition. Simple image processing transforms like DCT, 2DDCT, DWT, SWT, 2D-SWT, SVD (Singular Vector Decomposition), Entropy, and Rank can be used for feature extraction. These transforms and measures are utilized with...
Article
Full-text available
Due of its uniqueness, biometric technologies are employed for security and access control in today’s digital world. Global demand for biometric technology has led to the development of biometric systems integrating many features. The robustness depends on the capacity to derive meaningful information from single biometric features. Multimodal biom...
Article
Full-text available
Article
Full-text available
Visual Cryptography is a special cryptographic technique in which encryption of visual information such as pictures, drawing, graphs, written materials etc. is performed in such a way that the decryption can be performed by the human visual system. Visual cryptography is specially designed for data security or providing a more secure method fo...
Poster
admission notice
Article
Full-text available
The major problems of Visual Secret Sharing (VSS) are the pixel expansion and lossy recovery. The former creates large-sized shared images and makes their handling, storage, and speed transmission via networks challenging, whereas the latter leads to poor contrast of the recovered images. In addition, sharing a huge volume of images and transmittin...
Article
Full-text available
A secure and verifiable color visual cryptography has becoming an important field of study in recent development of visual cryptography. In recent era there is a need of security and verifiability of shares.This research paper introduce the new secure and verifiable color secrete sharing scheme which identifies and analyses cheating while presentin...
Presentation
Full-text available
Chapter
In this paper, we propose a new contrast optimal visual Cryptography Scheme for Half-tone images. This scheme can share Secrete Half-tone Image among n members and all n number of members can reveal the secrete by superimposing the n share together and n − 1 members can not reveal the secrete. The proposed method generate the noise like shares but...
Chapter
Biometric recognition is defined as an automated recognition for individuals based on their own biological characteristics such as fingerprint, iris, face, veins, etc. or behavioral characteristics such as voice, signature, walking. In the past, some biometric traits like fingerprint, palm print, and DNA techniques have been used as evidence tools...
Article
Full-text available
Multiple sources of biometric traits is known as multibiometric, where recognizing individuals based on more than one biometric traits called as multimodal biometric systems. Because of the poor identification performance using the unimodal biometric systems, fuses set of single biometric systems as an integrated multibiometric system is a solution...
Chapter
The biometric is an automated approach to recognize a person based on unique and distinct physiological or behavioral feature characteristics. The era of biometric characteristics starts from inked palm print to iris based person recognition system. The era has been evolved to use blood vascular structure lies at palm region of hand which is found...
Chapter
A innovative algorithm has been devloped for dorsal hand vein that forms template and matching in automatic dorsal hand vein recognition. Now a days, dorsal hand vein having uniqueness and liveness traits because of these properties biometrics is a promising component of biometric study. Our goal is to obtain less equal error rate, false acceptance...
Article
Full-text available
The dorsal hand-vein pattern is one of the human biometric signatures that can be used for personal verification. The first task of a verification process using hand-vein patterns is extracting the pattern from an infrared hand vein image. But before extracting the vein pattern we have to get the Region of interest. In hand vein imaging, region of...
Article
Full-text available
Halftone Visual Cryptography (HVC) is an encryption technique that encodes the secret image into halftone images in order to produce secure meaningful shares. Many methods have been proposed for developing HVC to protect the security of the images. Yet, these methods still have some problems such as poor visual quality of shares, large pixel expans...
Article
Full-text available
To improve classification performance and prediction time of (IDS) system when a few number of large hyperboxes are formed in the network. We have proposed FMM NN and PCA features extraction algorithms. The process of a system consisting of the pre-processing dataset based on interquartile ranges filter and features extraction. Followed by the Fuzz...
Article
This paper presents an analytical study of intruder detection system in the big data environment. In recent years, the size of data increasing at high speed, through daily increasing in number of people and online applications such as online airline ticket book-ing, online banking, online payment system etc using the Internet and network services,...
Article
Full-text available
Due to speedily growth technologies of network communication, the internet has emphasized the need to guarantee the security of sensitive and real-time data passing through networks. Several cryptography methods are considered to build the security mechanism of Big data, but is not sufficient due to the increments of the hacker's computation abilit...
Article
Full-text available
The dorsal hand vein pattern is unique biometric identity of the human beings. The dorsal hand vein recognition is a recent biometric technique which is used for authentication purposes in various applications. Different techniques used for designing the system has discussed here. A dorsal hand vein recognition system consists of the following step...
Article
Full-text available
Recently, based on the concept of Visual Secret Sharing (VSS) scheme proposed by Naor and Shamir in 1994, many of schemes have been proposed to protect the security of binary image. Yet, the problems of pixel expansion, extensive codebook designs, and lossy recovery are still unsolved. The current paper attempts to propose a new (k,n) scheme to ref...
Article
Full-text available
Big Data refers to large amount of data sets whose size is growing at a vast speed making it difficult to handle such large amount of data using traditional software tools available. This paper reviews the big data its back ground. First introduce general definition of big data and review on five phases of the value chain of big data (Components) s...
Conference Paper
Big Data refers to large amount of data sets whose size is growing at a vast speed making it difficult to handle such large amount of data using traditional software tools available. This paper reviews the big data its back ground. First introduce general definition of big data and review on five phases of the value chain of big data (Components) s...
Article
Palm vein recognition is a part of physiological biometric uses blood vessel structure for the identification. The blood transfusion from body parts to heart is made by the blood vein. The blood vein carries de-oxygenated hemoglobin that can be sensed under near infrared light. The pattern classification proposes a design cycle to build a system fo...
Conference Paper
Nowadays, the biometric palm vein is leading trait for person recognition. The biometric is formed on the basis of physiological and behavioral characteristic of human being. The blood vascular structure of each and every individual is unique and distinct. The blood vessel carries oxygenated or deoxygenated blood and found under the skin. The near...
Article
Full-text available
Satellite images used in many applications like geosciences studies, astronomy, and geographical information system. One of the major issues of satellite images is their resolution. In this paper, we propose a satellite image resolution enhancement technique using discrete wavelet transforms (DWT) to decompose the input image. Apply interpolation o...
Article
Full-text available
The palm vein biometrics is automated tool to recognize a person based on human vein pattern. The vein pattern is intrinsic and subcutaneous so that is very difficult to forge or fake. This paper discusses about the feature extraction of the hand based recognition system that involves features like vein pattern, principal lines and secondary lines....
Article
Full-text available
Visual Cryptography (VC) is recent technology used to the strengthen security of many applications in various fields. It allows visual information like printed text, handwritten notes, and images to be encrypted by dividing it into shares. The most important characteristic of VCS is that one can visually decrypted the secret image by stacking share...
Book
Full-text available
This book is developed using MATLAB Software. It is useful for the beginner to start with the simple steps and reach to the advanced level. If you've never used MATLAB before, the First chapter will help you to get started. If you're already famil¬iar with MATLAB, you can glance over most of the think of First chapter quickly.
Article
Biometrics is playing an important role for person recognition. The Biometrics identification of an individual is can be done by physiological or behavioral characteristics; where the palm print of an individual can be captured by using sensors and is one of among physiological characteristics of an individual. Palm print is a unique and reliable b...
Conference Paper
This recent technologies for recognizing fingerprints have proven as regards as reliable for security purposes. But, the efficient recognition is depending on the quality of fingerprint image and it is a complex computer problem while dealing with noisy and low quality images. The most common methods used to acquire the fingerprint images do not ne...
Article
Full-text available
Fingerprint analysis plays crucial role in crucial legal matters such as investigation of crime. But a fingerprint image consists of enormous amount of data. Therefore we have to reduce the amount of its data. To do this, we need some powerful image compression technique. There are many image compression techniques available, but still there is nee...
Conference Paper
In telemedicine, the storage of image and forwarding of image requires high storage space and high bandwidth respectively. To save the storage space and to reduce the bandwidth for communication; the image is to be compressed. Recently the multi-resolution technique by wavelet transform has emerged as a cutting edge technology within the field of i...
Article
Full-text available
Recognition systems based on biometrics (faces, hand shapes and fingerprints etc.) are finally taking off although it has taken a long way to come. Fingerprints have been a precious tool for law enforcement, forensics and recently in commercial use for over a century. Evaluate the performance of these emerging technologies is tricky problem. Most f...
Conference Paper
Full-text available
In this paper, we have considered a problem of uneven background extraction and segmentation of good, normal and bad quality fingerprint images, though we propose an algorithm based on morphological transformations. Our result shows that the proposed algorithm can successfully extract the background of good, normal and bad quality images of fingerp...
Article
Full-text available
The increasing amount of fingerprints collected by law enforcement agencies has created an enormous problem in storage and transmission [1]. To reduce the increasing demand of storage space and transmission time, Compression techniques are the need of the day. There are many image compression techniques available at present. Wavelet coding is one o...
Conference Paper
Full-text available
New technology for recognizing fingerprints for security purposes is proving reliable but efficient recognition depends on the quality of the input fingerprint image. Recognition of the fingerprint becomes a complex computer problem while dealing with noisy and low quality images. The proposed SWT based composite method is used for fingerprint imag...
Chapter
Full-text available
Many Image Processing techniques have been developed for analyzing the output of medical imaging systems to have the advantage of analyzing the symptoms of patients with ease. Often the medical images get noisy during acquisition process. The Elimination of the effect of noise plays a crucial role in medical images, which is a challenging task/prob...
Article
In automatic fingerprint recognition system the quality of fingerprint image is an important because the performance of the automation recognition system is highly depends on the input Fingerprint Image. A fingerprint image may not always be well defined due to elements of noise that corrupts the clarity of ridge structure. Most of the fingerprint...
Article
The performance of recognition system is highly depends on the quality of fingerprint. A fingerprint image may not always be well defined due to elements of noise that corrupts the clarity of the ridge structures or basic information, which is required for recognition. Noise may occur due to variations in skin and impression condition. Thus, image...

Questions

Question (1)
Question
Which is best book for DIP?

Network

Cited By