Shape measures for content based image retrieval: a comparison
BM Mehtre, MS Kankanhalli, WF Lee - Information processing & …, 1997 - Elsevier
A great deal of work has been done on the evaluation of information retrieval systems for
alphanumeric data. The same thing can not be said about the newly emerging multimedia and …
alphanumeric data. The same thing can not be said about the newly emerging multimedia and …
Fingerprint image analysis for automatic identification
BM Mehtre - Machine Vision and Applications, 1993 - Springer
… The segmentation method presented in this paper is an improved method over those presented
in our earlier papers (Mehtre et al. 1987a,b; Mehtre and Chatterjee 1989a). The concept …
in our earlier papers (Mehtre et al. 1987a,b; Mehtre and Chatterjee 1989a). The concept …
An overview of vulnerability assessment and penetration testing techniques
S Shah, BM Mehtre - Journal of Computer Virology and Hacking …, 2015 - Springer
All Internet facing systems and applications carry security risks. Security professionals
across the globe generally address these security risks by Vulnerability Assessment and …
across the globe generally address these security risks by Vulnerability Assessment and …
Segmentation of fingerprint images using the directional image
BM Mehtre, NN Murthy, S Kapoor, B Chatterjee - Pattern recognition, 1987 - Elsevier
In this paper the concept of the directional image is introduced and its application for
segmentation is presented. The directional image can be thought of as an image transform, where …
segmentation is presented. The directional image can be thought of as an image transform, where …
Segmentation of fingerprint images—a composite method
BM Mehtre, B Chatterjee - Pattern recognition, 1989 - Elsevier
In this paper the limitations of the segmentation of FP images using the directional criterion
as suggested in Ref. (1) are pointed out. The equation used for the direction computation …
as suggested in Ref. (1) are pointed out. The equation used for the direction computation …
Color matching for image retrieval
BM Mehtre, MS Kankanhalli, AD Narasimhalu… - Pattern Recognition …, 1995 - Elsevier
Color is an important attribute for image matching and retrieval. We present two new color
matching methods, the “Reference Color Table Method” and a “Distance Method”, for image …
matching methods, the “Reference Color Table Method” and a “Distance Method”, for image …
Network intrusion detection system using J48 Decision Tree
S Sahu, BM Mehtre - 2015 International Conference on …, 2015 - ieeexplore.ieee.org
As the number of cyber attacks have increased, detecting the intrusion in networks become
a very tough job. For network intrusion detection system (NIDS), many data mining and …
a very tough job. For network intrusion detection system (NIDS), many data mining and …
Vulnerability assessment & penetration testing as a cyber defence technology
JN Goel, BM Mehtre - Procedia Computer Science, 2015 - Elsevier
… Tripathi, N., Mehtre, BM Analysis of various arp poisoning mitigation techniques: A …
Goel, JN, Mehtre, BM. Dynamic ipv6 activation based defense for ipv6 router advertisement …
Goel, JN, Mehtre, BM. Dynamic ipv6 activation based defense for ipv6 router advertisement …
Static malware analysis using machine learning methods
HV Nath, BM Mehtre - International Conference on Security in Computer …, 2014 - Springer
Malware analysis forms a critical component of cyber defense mechanism. In the last decade,
lot of research has been done, using machine learning methods on both static as well as …
lot of research has been done, using machine learning methods on both static as well as …
Digital video tampering detection: An overview of passive techniques
K Sitara, BM Mehtre - Digital Investigation, 2016 - Elsevier
Video tampering is a process of malicious alteration of video content, so as to conceal an
object, an event or change the meaning conveyed by the imagery in the video. Fast …
object, an event or change the meaning conveyed by the imagery in the video. Fast …