default search action
Suneeta Agarwal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j34]Rajitha Bakthula, Suneeta Agarwal:
Segmentation of Epiphysis Region-of-Interest (EROI) using texture analysis and clustering method for hand bone age assessment. Multim. Tools Appl. 81(1): 1029-1054 (2022) - 2021
- [j33]Divya Srivastava, Bakthula Rajitha, Suneeta Agarwal:
Content-based image retrieval for categorized dataset by aggregating gradient and texture features. Neural Comput. Appl. 33(19): 12247-12261 (2021) - 2020
- [j32]Divya Srivastava, Rajitha Bakthula, Suneeta Agarwal, Shruti Singh:
Pattern-based image retrieval using GLCM. Neural Comput. Appl. 32(15): 10819-10832 (2020) - [c37]Prateek Patil, Suneeta Agarwal:
Dynamic Multimodal Biometric System. CVIP (1) 2020: 12-19
2010 – 2019
- 2019
- [j31]Sanjeev Kumar, Suneeta Agarwal, Ranvijay:
Fast and memory efficient approach for mapping NGS reads to a reference genome. J. Bioinform. Comput. Biol. 17(2): 1950008:1-1950008:17 (2019) - [j30]Divya Srivastava, Rajitha Bakthula, Suneeta Agarwal:
Image classification using SURF and bag of LBP features constructed by clustering with fixed centers. Multim. Tools Appl. 78(11): 14129-14153 (2019) - [j29]Shambhu Shankar Bharti, Manish Gupta, Suneeta Agarwal:
A novel approach for audio steganography by processing of amplitudes and signs of secret audio separately. Multim. Tools Appl. 78(16): 23179-23201 (2019) - 2018
- [j28]Anjali Goel, Rajesh Prasad, Suneeta Agarwal, Amit Sangal:
Efficient parameterized matching using burrows-wheeler transform. Int. Arab J. Inf. Technol. 15(1): 44-49 (2018) - [j27]Sanjeev Kumar, Suneeta Agarwal, Ranvijay:
WBFQC: A new approach for compressing next-generation sequencing data splitting into homogeneous streams. J. Bioinform. Comput. Biol. 16(5): 1850018:1-1850018:16 (2018) - [j26]Shambhu Shankar Bharti, Manish Gupta, Suneeta Agarwal:
SVM based Voice Activity Detection by fusing a new acoustic feature PLMS with some existing acoustic features of speech. J. Intell. Fuzzy Syst. 35(2): 1519-1530 (2018) - [j25]Manish Gupta, Shambhu Shankar Bharti, Suneeta Agarwal:
Emotion recognition from speech using wavelet packet transform and prosodic features. J. Intell. Fuzzy Syst. 35(2): 1541-1553 (2018) - [j24]Rajitha Bakthula, Shivendra Shivani, Suneeta Agarwal:
Self authenticating medical X-ray images for telemedicine applications. Multim. Tools Appl. 77(7): 8375-8392 (2018) - [j23]Shambhu Shankar Bharti, Manish Gupta, Suneeta Agarwal:
A novel approach for verifiable (n, n) audio secret sharing scheme. Multim. Tools Appl. 77(19): 25629-25657 (2018) - [j22]Shivendra Shivani, Suneeta Agarwal:
VPVC: verifiable progressive visual cryptography. Pattern Anal. Appl. 21(1): 139-166 (2018) - [i1]Saurav Jha, Nikhil Agarwal, Suneeta Agarwal:
Towards Improved Cartoon Face Detection and Recognition Systems. CoRR abs/1804.01753 (2018) - 2017
- [j21]Shivendra Shivani, Rajitha Bakthula, Suneeta Agarwal:
XOR based continuous-tone multi secret sharing for store-and-forward telemedicine. Multim. Tools Appl. 76(3): 3851-3870 (2017) - [j20]Priyanka Singh, Suneeta Agarwal:
A self recoverable dual watermarking scheme for copyright protection and integrity verification. Multim. Tools Appl. 76(5): 6389-6428 (2017) - [j19]Shivendra Shivani, Suneeta Agarwal:
Novel basis matrix creation and preprocessing algorithms for friendly progressive visual secret sharing with space-efficient shares. Multim. Tools Appl. 76(6): 8711-8744 (2017) - [c36]Shivendra Shivani, Priyanka Singh, Suneeta Agarwal:
A Dual Watermarking Scheme for Ownership Verification and Pixel Level Authentication. ICCAE 2017: 131-135 - [c35]Shruti Singh, Divya Srivastava, Suneeta Agarwal:
GLCM and its application in pattern recognition. ISCBI 2017: 20-25 - 2016
- [j18]Priyanka Singh, Suneeta Agarwal:
A region adaptive robust watermarking scheme based on homogeneity analysis. Int. Arab J. Inf. Technol. 13(5): 517-522 (2016) - [j17]Priyanka Singh, Suneeta Agarwal:
An efficient fragile watermarking scheme with multilevel tamper detection and recovery based on dynamic domain selection. Multim. Tools Appl. 75(14): 8165-8194 (2016) - [j16]Shivendra Shivani, Suneeta Agarwal:
Progressive Visual Cryptography with Unexpanded Meaningful Shares. ACM Trans. Multim. Comput. Commun. Appl. 12(4): 50:1-50:24 (2016) - [c34]Shambhu Shankar Bharti, Manish Gupta, Suneeta Agarwal:
A new spectral subtraction method for speech enhancement using adaptive noise estimation. RAIT 2016: 128-132 - 2015
- [j15]Neelam Bhardwaj, Suneeta Agarwal, Vikash Bhardwaj:
An imaging approach for the automatic thresholding of photo defects. Pattern Recognit. Lett. 60-61: 32-40 (2015) - [c33]Rajitha Bakthula, Anjana Tiwari, Suneeta Agarwal:
A new local homogeneity analysis method based on pixel intensities for image defect detection. ReTIS 2015: 200-206 - 2013
- [j14]Durgesh Singh, Shivendra Shivani, Suneeta Agarwal:
Quantization-Based Fragile Watermarking using Block-Wise Authentication and Pixel-Wise Recovery Scheme for Tampered Image. Int. J. Image Graph. 13(2) (2013) - [c32]Priyanka Singh, Suneeta Agarwal:
A hybrid DCT-SVD based robust watermarking scheme for copyright protection. AFRICON 2013: 1-5 - [c31]Shivendra Shivani, Durgesh Singh, Suneeta Agarwal:
DCT Based Approach for Tampered Image Detection and Recovery Using Block Wise Fragile Watermarking Scheme. IbPRIA 2013: 640-647 - 2012
- [c30]Kusum Lata Pandey, Suneeta Agarwal, Sanjay Misra, Rajesh Prasad:
Plagiarism Detection in Software Using Efficient String Matching. ICCSA (4) 2012: 147-156 - [c29]Kumar Sharma, Alok Singh, Suneeta Agarwal, Kusum Lata Pandey, Rajesh Prasad:
Improved bit-parallel string matching algorithm overcoming computer word size limitation. RAIT 2012: 478-481 - [c28]Uphar Goyal, Suneeta Agarwal, Vaibhav Singhal, Swami Nath Singh, Rajesh Prasad:
Reoptimization for Steiner tree problem Adding and deleting an edge. RAIT 2012: 559-563 - [c27]Priyanka Singh, Suneeta Agarwal:
A region specific robust watermarking scheme based on singular value decomposition. SIN 2012: 117-123 - [c26]Kunal Sain, Mradula Sharma, Suneeta Agarwal:
(Student contribution) ASPS: an authentication scheme using pre-formed visual cryptographic shares. SIN 2012: 183-187 - 2011
- [j13]Ashutosh Gupta, Suneeta Agarwal:
Searching a pattern in compressed DNA sequences. Int. J. Bioinform. Res. Appl. 7(2): 115-129 (2011) - [j12]Sushila Kamble, Vikas Maheshkar, Suneeta Agarwal, Vinay Kumar Srivastava:
Multiple watermarking for copyright protection using DWT and dual-tree CWT. Int. J. Intell. Eng. Informatics 1(3/4): 348-369 (2011) - [c25]Shivendra Shivani, Anoop Kumar Patel, Sushila Kamble, Suneeta Agarwal:
An effective pixel-wise fragile watermarking scheme based on ARA bits. ICCCS 2011: 221-226 - [c24]Rajesh Prasad, Suneeta Agarwal, Anuj Kumar Sharma, Alok Singh, Sanjay Misra:
Efficient Algorithm for Detecting Parameterized Multiple Clones in a Large Software System. ICCSA (5) 2011: 398-409 - [c23]Shivendra Shivani, Anoop Kumar Patel, Akhilendra Pratap Singh, Suneeta Agarwal:
Self recoverable block-wise fragile watermarking scheme based on histogram segmentation. ICWET 2011: 658-662 - [c22]Vikas Maheshkar, Sushila Kamble, Suneeta Agarwal, Vinay Kr. Agarwal:
Real Dual Tree Based Feature Variance for Face Recognition. SocProS (2) 2011: 637-647 - 2010
- [j11]Ashutosh Gupta, Suneeta Agarwal:
A fast dynamic compression scheme for natural language texts. Comput. Math. Appl. 60(12): 3139-3151 (2010) - [j10]Ashutosh Gupta, Suneeta Agarwal:
Partial retrieval of compressed semi-structured documents. Int. J. Comput. Appl. Technol. 38(4): 239-249 (2010) - [j9]Krishna Kumar, Rajesh Prasad, Suneeta Agarwal:
Software maintenance by multi-patterns parameterized string matching with q-gram. ACM SIGSOFT Softw. Eng. Notes 35(3): 1-5 (2010) - [j8]Rajesh Prasad, Suneeta Agarwal:
Parameterized string matching: an application to software maintenance. ACM SIGSOFT Softw. Eng. Notes 35(3): 1-5 (2010) - [j7]Shankar Bhausaheb Nikam, Suneeta Agarwal:
Curvelet-based fingerprint anti-spoofing. Signal Image Video Process. 4(1): 75-87 (2010) - [c21]Rajesh Prasad, Suneeta Agarwal, Ishadutta Yadav, Bharat Singh:
Efficient bit-parallel multi-patterns string matching algorithms for limited expression. Bangalore Compute Conf. 2010: 10:1-10:6 - [c20]Ashutosh Gupta, Vinay Rishiwal, Suneeta Agarwal:
Efficient Storage of Massive Biological Sequences in Compact Form. IC3 (2) 2010: 13-22 - [c19]Sushila Kamble, Vikas Maheshkar, Suneeta Agarwal, Vinay Shrivastava:
Robust Multiple Watermarking Using Entropy Based Spread Spectrum. IC3 (1) 2010: 497-507 - [c18]Vikas Maheshkar, Sushila Kamble, Suneeta Agarwal, Vinay Kumar Srivastava:
DCT-based unique faces for face recognition using Mahalanobis distance. IITM 2010: 208-212
2000 – 2009
- 2009
- [j6]Shankar Bhausaheb Nikam, Suneeta Agarwal:
Wavelet-based multiresolution analysis of ridges for fingerprint liveness detection. Int. J. Inf. Comput. Secur. 3(1): 1-46 (2009) - [j5]Shankar Bhausaheb Nikam, Suneeta Agarwal:
Co-Occurrence Probabilities and Wavelet-Based Spoof Fingerprint Detection. Int. J. Image Graph. 9(2): 171-199 (2009) - [j4]Shankar Bhausaheb Nikam, Suneeta Agarwal:
Feature fusion using Gabor filters and cooccurrence probabilities for fingerprint antispoofing. Int. J. Intell. Syst. Technol. Appl. 7(3): 296-315 (2009) - [j3]Shankar Bhausaheb Nikam, Suneeta Agarwal:
Ridgelet-based fake fingerprint detection. Neurocomputing 72(10-12): 2491-2506 (2009) - [c17]Sweetesh Singh, Tarun Tiwari, Rupesh Srivastava, Suneeta Agarwal:
Back-forth sorting algorithm analysis and applications perspective. AICCSA 2009: 83-87 - [c16]Bharat Singh, Ishadutta Yadav, Suneeta Agarwal, Rajesh Prasad:
An Efficient Word Searching Algorithm through Splitting and Hashing the Offline Text. ARTCom 2009: 387-389 - [c15]Ishadutta Yadav, Bharat Singh, Suneeta Agarwal, Rajesh Prasad:
An Efficient Bit-Parallel Multi-Patterns Word Searching Algorithm through Splitting the Text. ARTCom 2009: 406-410 - [c14]Rajesh Prasad, Suneeta Agarwal:
Study of Bit-Parallel Approximate Parameterized String Matching Algorithms. IC3 2009: 26-36 - 2008
- [j2]Shankar Bhausaheb Nikam, Suneeta Agarwal:
Local binary pattern and wavelet-based spoof fingerprint detection. Int. J. Biom. 1(2): 141-159 (2008) - [j1]Suneeta Agarwal:
A note on "solving arithmetic problems using feed-forward neural networks". Neurocomputing 71(4-6): 1101-1102 (2008) - [c13]Shankar Bhausaheb Nikam, Suneeta Agarwal:
Fingerprint Liveness Detection Using Curvelet Energy and Co-Occurrence Signatures. CGIV 2008: 217-222 - [c12]Deepak Kumar Karna, Suneeta Agarwal, Shankar Bhausaheb Nikam:
Normalized Cross-Correlation Based Fingerprint Matching. CGIV 2008: 229-232 - [c11]Rajesh Prasad, Suneeta Agarwal:
A new parameterized string matching algorithm by combining bit-parallelism and suffix automata. CIT 2008: 778-783 - [c10]Shankar Bhausaheb Nikam, Suneeta Agarwal:
Gabor Filter-Based Fingerprint Anti-spoofing. ACIVS 2008: 1103-1114 - [c9]Rahul Gupta, Suneeta Agarwal:
A Novel Algorithm for Freeing Network from Points of Failure. CISIS 2008: 219-226 - [c8]Manish Verma, Suneeta Agarwal:
Fingerprint Based Male-Female Classification. CISIS 2008: 251-257 - [c7]Shankar Bhausaheb Nikam, Suneeta Agarwal:
Level 2 features and wavelet analysis based hybrid fingerprint matcher. Bangalore Compute Conf. 2008: 12 - [c6]Shankar Bhausaheb Nikam, Suneeta Agarwal:
Texture and Wavelet-Based Spoof Fingerprint Detection for Fingerprint Biometric Systems. ICETET 2008: 675-680 - [c5]Rajesh Prasad, Suneeta Agarwal:
An Efficient String Matching Algorithm Using Super Alphabets. ICETET 2008: 1181-1186 - [c4]Rahul Gupta, Ashutosh Gupta, Suneeta Agarwal:
A novel approach of data compression for dynamic data. SoSE 2008: 1-6 - 2007
- [c3]Ashutosh Gupta, Suneeta Agarwal:
Word Based Text Compression Using Encryption. IMECS 2007: 471-473 - [c2]Ashutosh Gupta, Suneeta Agarwal:
New Transform for Improving Compression Performance in Natural Language Text. IMECS 2007: 564-567 - 2005
- [c1]Suneeta Agarwal, Vikas Kumar:
Online Character Recognition. ICITA (1) 2005: 698-703
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint