S
Sarbani Palit
Researcher at Indian Statistical Institute
Publications - 62
Citations - 746
Sarbani Palit is an academic researcher from Indian Statistical Institute. The author has contributed to research in topics: Singular value decomposition & Encryption. The author has an hindex of 11, co-authored 58 publications receiving 649 citations. Previous affiliations of Sarbani Palit include University College Dublin & University of Calcutta.
Papers
More filters
Journal ArticleDOI
Fetal ECG extraction from single-channel maternal ECG using singular value decomposition
TL;DR: The extraction of fetal electrocardiogram (ECG) from the composite maternal ECG signal obtained from the abdominal lead is discussed, and the proposed method employs singular value decomposition (SVD) and analysis based on the singular value ratio (SVR) spectrum.
Journal ArticleDOI
On multiple pattern extraction using singular value decomposition
P.P. Kanjilal,Sarbani Palit +1 more
TL;DR: A new concept of decomposition of a signal into component periodic waveforms is presented, configured for the sequential extraction of successively weaker components with different period lengths.
Journal ArticleDOI
Confusion and diffusion of color images with multiple chaotic maps and chaos-based pseudorandom binary number generator
TL;DR: In this paper, a chaos-based symmetric key encryption of RGB color images with multiple chaotic maps and pseudorandom binary number generator (PRBNG) has been proposed.
Journal ArticleDOI
The singular value decomposition—applied in the modelling and prediction of quasiperiodic processes
P.P. Kanjilal,Sarbani Palit +1 more
TL;DR: In this paper, singular value decomposition is used as a tool in the analysis of quasiperiodic processes, where the prime orthogonal components are used to separate the regular and the irregular parts of the process.
Journal ArticleDOI
A selective bitplane image encryption scheme using chaotic maps
TL;DR: It is shown that the proposed partial encryption scheme saves around 35% computation on the image database used here, and different types of attacks against this scheme are analysed to show the robustness of this approach.