scispace - formally typeset
S

Sarbani Palit

Researcher at Indian Statistical Institute

Publications -  62
Citations -  746

Sarbani Palit is an academic researcher from Indian Statistical Institute. The author has contributed to research in topics: Singular value decomposition & Encryption. The author has an hindex of 11, co-authored 58 publications receiving 649 citations. Previous affiliations of Sarbani Palit include University College Dublin & University of Calcutta.

Papers
More filters
Journal ArticleDOI

Fetal ECG extraction from single-channel maternal ECG using singular value decomposition

TL;DR: The extraction of fetal electrocardiogram (ECG) from the composite maternal ECG signal obtained from the abdominal lead is discussed, and the proposed method employs singular value decomposition (SVD) and analysis based on the singular value ratio (SVR) spectrum.
Journal ArticleDOI

On multiple pattern extraction using singular value decomposition

TL;DR: A new concept of decomposition of a signal into component periodic waveforms is presented, configured for the sequential extraction of successively weaker components with different period lengths.
Journal ArticleDOI

Confusion and diffusion of color images with multiple chaotic maps and chaos-based pseudorandom binary number generator

TL;DR: In this paper, a chaos-based symmetric key encryption of RGB color images with multiple chaotic maps and pseudorandom binary number generator (PRBNG) has been proposed.
Journal ArticleDOI

The singular value decomposition—applied in the modelling and prediction of quasiperiodic processes

TL;DR: In this paper, singular value decomposition is used as a tool in the analysis of quasiperiodic processes, where the prime orthogonal components are used to separate the regular and the irregular parts of the process.
Journal ArticleDOI

A selective bitplane image encryption scheme using chaotic maps

TL;DR: It is shown that the proposed partial encryption scheme saves around 35% computation on the image database used here, and different types of attacks against this scheme are analysed to show the robustness of this approach.