Welcome to Department of

Prof. Khumanthem Manglem Singh

Professor
Computer Science and Engineering

Email: [email protected]

Name : Khumanthem Manglem Singh

Designation : Professor

Department : Computer Science & Engineering

Permanent Address : Lamding Khumanthem Leikai, PO Wangjing -795148, Manipur, India

Email : [email protected]

 

Experience

1. 11/09/2018 - till date Professor (CSE), NIT Manipur

1. 21/09/2014 -10/09/2018, Associate Professor (CSE), NIT Manipur

2. 21/09/2010 - 19/09/2014, Associate Professor (CSE) (On Deputation), NIT Manipur

3. 26/10/2009 - 20/10/2010, Scientist E, NIELIT Imphal

4. 01/07/2007 - 25/10/2009, Scientist D, NIELIT Imphal

5. 01/07/1996 - 30/06/2002, Scientist C, NIELIT Imphal

6. 19/01/1991 - 30/06/1996, Scientist B, Nielit Imphal

7. 01/06/1990 - 31/12/1990, R & D Engineer, Elnova PVT LTD, New Delhi

8. 07/05/1989 - 01/06/1990, R & D Engineer, Danfoss (I) LTD, Delhi

Paper Published

Number of PhD students guided

1. Y. Jina Chanu, Development of new techniques for staganography and steganalysis, NERIST, Itanagar, 12/12/2014

2. Th. Rupachandra Singh, VC based blind video watermarking scheme for copyright protection in DWT domain, Assam University Silchar, 19/01/2015

3. T. Romen Singh, Study of power law transformation in image enhancement technique, Assam University Silchar, 22/07/2015

4. A. Neelima, New developments in perceptual hashing functions for images and videos, NIT Manipur, 01/10/2016

5. Th. Dalton Meitei, A shot boundary detection technique for video retrieval system, Assam University Silchar, 24/01/2016

6. B. Pushpa Devi, Study of dual image watermarking scheme based on singular value decomposition and VC in DWT, Assam University Silchar, 01/09/2017

7. L. Dolendro Singh, Development of new cryptographic algorithms for digital images, NIT Manipur, 26/10/2017

8. B. A. Shimray, Decision support system for large hydropower plant site selection based on hybrid neuro fuzzy framework, NIT Manipur, 16/02/2018

9. K. Pritamdas, Impulse noise removal from color images based on localized image characteristics and noise levels, NIT Manipur, 19/11/2018

10. Manoj Kumar, Content based medical image retrieval systems using combined features, NIT Manipur, 01/05/2019

11. Rajeev Rajkumar, A robust forensic method of copy move digital image forgery detection based on block matching technique, Assam   University Silchar,  30/05/2019

12. P. Roji Chanu, Study of quaternion based switching vector median filters for removal of impulse noise from color images, NIT Nagaland, 19/06/2019

13. Th. Ibungomacha Singh, New development in segmentation technique for MRI images, Assam University Silchar, 16/03/2020

14. H. Saxena Devi, Development of Novel 3D Red-cyan Anaglyph Image Watermarking Systems, NIT Manipur, 01/06/2020

15. S. Inunganbi Chanu, Developing Offline Handwritten Recognition Systems for Meitei Mayek, NIT Manipur, 10/09/2020

16. Sapam Jitu Singh, Path planning of a mobile robot in dynamic environment, Assam University Silchar, 23/12/2020

All SCI Journal Papers

  1. RB Devi, YJ Chanu, KM Singh, Discriminative object tracking with subspace representationThe Visual Computer 37, 1207-1219, 2021
  2. RB Devi, YJ Chanu, KM Singh, Incremental visual tracking via sparse discriminative classifierMultimedia Systems 27 (2), 287-299, 2021
  3. D Laishram, KM Singh, A watermarking scheme for source authentication, ownership identification, tamper detection and restoration for color medical imagesMultimedia Tools and Applications, 80pages23815–23875, 2021
  4. PK Bhagat, P C and KM Singh, Meitei Mayek handwritten dataset: compilation, segmentation, and character recognitionThe Visual Computer 37 (2), 291-305, 2021
  5. PK Bhagat, P C and KM Singh, A novel approach based on fully connected weighted bipartite graph for zero-shot learning problems, Journal of Ambient Intelligence and Humanized Computing, 1-16, 2021.
  6. S. Inunganbi, P Choudhury and KM Singh, Line and word segmentation of handwritten text document by mid-point detection and gap trailing, Multimedia Tools and Applications, 13 August 2020.
  7. S. Inunganbi, P Choudhury and KM Singh, Handwritten Meitei Mayek recognition using three-channel convolution neural network of gradients and gray, Computational Intelligence, August 11, 2020. 
  8. S. Inunganbi, P Choudhury and KM Singh, Local texture descriptors and projection histogram based hand written Meitei Mayek character recognition, Multimedia Tool and Applications, December 2019, https://doi.org/10.1007/s11042-019-08482-4
  9. H.S Devi and KM Singh, Red-cyan Anaglyph Image Watermarking using DWT, Hadamard Transform and Singular value Decomposition for copyright protection, Journal of Information Security and Applications, Vol. 50, 2019.
  10. R Rajkumar, S Roy and KM Singh, A robust and forensic transform for copy move digital image forgery detection based on dense depth block matching, Imaging Science Journal, Taylor & Francis, 67(6), 343-57, 2019.
  11. Kh. Motilal, A. Neelima, T. Tuithung and KM Singh, Robust perceptual image hashing using SIFT and SVD, Current Science, 2019.
  12. RK BIdyalaxmi, Y. Jina Chanu and KM Singh, Incremental online object tracking via supervised dimension reduction, Signal Image Video Processing (Springer), 1-8, 2019. 
  13. D.M. Thounaojam, Th Khelchandra, Th. Devi, S. Roy and K. M. Singh, Colour Histogram and Modified Multi-layer Perceptron Neural Network based Video Shot Boundary Detection, IAJIT, 6, 2019.  
  14. P.R. Chanu and K.M. Singh, A two-stage switching vector median filter based on quaternion for removing impulse noise in color images, Multimedia Tools and Applications (Springer), 2018.
  15. P.R. Chanu and K.M. Singh, Impulse Noise Removal from Medical Images by Two Stage Quaternion Vector Median Filter, Journal of Medical Systems (Springer) 2018 tps://doi.org/10.1007/s10916-018-1057-8
  16. S.B. Singh, Y.J. Singh and K.M. Singh, Speckle reduction of ultrasound medical images using Bhattacharyya distance in modified non-local mean filter, Signal, Image and Video Processing (Springer) 2018 https://doi.org/10.1007/s11760-018-1357-y
  17. R Huidrom, Y J Chanu and K M Singh, Pulmonary nodule detection on computed tomography using neuro-evolutionary scheme, Signal Image and Video Processing (Springer) 2018 https://doi.org/10.1007/s11760-018-1327-4
  18. S J Singh, S Roy, K M Singh and T. Khelchandra,Motion planning of mobile robot using Fuzzy-GA method along with Three Path concept in dynamic environment, Journal of Intelligent and Fuzzy systems, 2018 10.3233/JIFS-169686
  19. M. Kumar and K.M. Singh, Retrieval of X-ray Images Using Scale Invariant Feature Transform and Combination of Region and Elliptic Fourier Descriptors Feature, Journal of Medical Imaging and Health informatics, 8, 747-782, 2018.
  20. S.B. Singh, Y.J. Chanu and K.M. Singh, Despeckling of SAR images by finding the expected values using the probability distribution of speckle, Iranian Journal of Science and Technology Transaction A: Science (Springer), 2018.
  21. K. Pritamdas and K.M. Singh, Removal of impulse noise from color images based on the localized image characteristics and noise level, Signal Image and Video Processing (Springer), 2018. https://doi.org/10.1007/s11760-018-1292-y
  22. L.D. Singh and K.M Singh, Visually Meaningful Multi-image Encryption Scheme, Arabian Journal for Science and Engineering (Springer) (2018), https://doi.org/10.1007/s13369-018-3104-7
  23. M. Kumar and K. M. Singh, Retrieval of head–neck medical images using Gabor filter based onpower-law transformation method and rank BHMT, Signal, Image and Video Processing (Springer), 17 December 2017.
  24. B. A. Shimray, K. M. Singh, T. Khelchandra and R. K. Mehta, A New MLP–GA–Fuzzy Decision Support System for Hydro Power Plant Site Selection, Arab J Sci Eng (Springer), 03 Nov, 2017
  25. K.M. Singh, A Robust Rotation Resilient Video Watermarking Scheme based on the SIFT, Multimedia Tools and Applications (Springer), 2017.
  26. C. Chongtham, M J Sanada, Y J Chanu, A Neelima, D M Thounaojam, P.R. Chanu and K M Singh, A copyright protection scheme for videos based on the SIFT, Iranian Journal of Science & Technology, Transaction of Electrical Engineering (Springer), 2018.
  27. D M Thounaojam, Khelchanda, K M Singh & S Roy, Color histogram and modified multi-layer perceptron neural network based video shot boundary detection, International Arab Journal of Information Technology, 2018.
  28. L D Singh and K M Singh, Medical image encryption based on improved ELGamal encryption technique, Optik- International Journal of Light and Electron Optics (Elsevier), 2017.
  29. L D Singh and K M Singh, A robust image encryption scheme based on chaotic system and elliptic curve over finite field, Multimedia Tools and Applications (Springer), 76(8), 1-24, 2017.
  30. H S Saxena and K M Singh, A novel efficient robust and blind imperceptible 3D anaglyph image watermarking, Arabian Journal of Science and Engineering (Springer), 42(8), 3521-3533, 2017.
  31. B P Devi, K M Singh and S Roy, New copyright protection scheme for digital images based on visual cryptography, IETE Journal of Research (Taylor & Francis), 1-11, 2017.
  32. A Neelima and K M Singh, Collusion and rotation resilient video hashing based on scale invariant feature transform, Imaging Science Journal (Taylor & Francis), 62-74, 65(1),2017.
  33. L D Singh and K M Singh, Cryptanalysis of symmetric key image encryption using chaotic Rossler system, Optik (Elsevier), 135, 200-209, 2017.
  34. B A Shimray, K M Singh, Khelchandra, and R K Mehta, Ranking of sites for installation of hydropower plant using MLP neural network trained with GA: A MADM approach, Computational Intelligence and Neoroscience, 1-8, 2017.
  35. K. Pritamdas, K M Singh and L L Singh, An adaptive switching filter based on approximated variance for detection of impulse noise from color images, SpringerPlus (Springer), 5(1), 1-22, 2016.
  36. D M Thounaojam, Khelchandra, K M Singh and S Roy, A genetic algorithm and fuizzy logic approach for video shot boundary detection, Computational Intelligence and Neoroscience, 1-11, 2016.
  37. B P Singh, K M Singh and S Roy, A copyright protection scheme for digital images based on shuffled singular value decomposition and visual cryptography, SpringerPlus (Springer), 1-11, 2016.
  38. A Neelima and K M Singh, Perceptual hash function based on scale invariant feature transform and singular value decomposition, Computer Journal (Oxford), 59(9), 1275-1281, 2016.
  39. K M Singh and Y J Chanu, Steganalysis of  k staganalysis based on noncausal linear predictor, IJCCC, 9(5), 565-574, 2014.
  40. K M Singh and P K Bora, Switching vector median filters based on noncausal linear prediction for detection of impulse noise, Imaging Science Journal (Taylor & Francis), 62(6), 313-326, 2014.
  41. T R Singh, K M Singh and S Roy, Video watermarking scheme based on visual cryptography and scene change detection, Electronics and Communication (Elsevier), 67(8), 645-651, 2013.
  42. K M Singh and P K Bora, Multi-stage detection based filtering for removal of impulse noise from image, IETE Journal of Research (Taylor & Francis), 50(2), 125-131, 2004.

Scopus Journal Papers

  1. TR Chanu, TR Singh, KM Singh, A Survey on Impulse Noise Removal from Color ImageTurkish Journal of Computer and Mathematics Education (TURCOMAT), Vol. 12 No. 13, 2021
  2. R. Rajkumar, S. Roy and KM Singh, S-transform-based efficient copy-move forgerydetection technique in digital images ,Int. J. Intelligent Enterprise,7(1/2/3):107-121, 2020.
  3. DM Thounaojam, VS Bhadouria, S Roy, KM Singh, Shot boundary detection using perceptual and semantic information, International Journal of Multimedia Information Retrieval 6 (2), 167-174, 2017.
  4. L.D. Singh and K.M. Singh, Implementation of Text Encryption using Elliptic Curve Cryptography, Procedia Computer Science (Elsevier), 54, 73-82, 2015.
  5. L.D. Singh and K.M. Singh, Image encryption using elliptic curve cryptography, Procedia Computer Science (Elsevier), 54, 472-481, 2015.
  6. N.D. Singh, Y.J. Chanu and K.M. Singh, Image Segmentation Using K -means Clustering Algorithm and Subtractive Clustering Algorithm, Procedia Computer Science (Elsevier), 54, 764-771, 2015.
  7. K.M. Singh, Vector median filter based on non-causal linear prediction for detection of impulse noise from images, International Journal of Computational Science and Engineering (Inderscience), 7(4), 345-355, 2012.
  8. K.M. Singh, Fuzzy rule based median filter for gray-scale images, Journal of information Hiding and Multimedia signal processing, 2(2), 108-122, 2011.

Other Journal Papers

  1. S. Subhasini and KM Singh, Color Image Edge Detection: A Survey,  IJIET, 8(1), 235-247, 2017. 
  2. D.M. Thounaojam, R Rajkumar, S Roy, KM Singh, A Robust and Efficient Copy-Move Forgery Detection Technique based on SIFT and SVD, Indian Journal of Science and Technology, 10(14), 1-10, 2017.
  3. K. Pritamdas, K.M. Singh, L.L. Singh, A Summary on Various Impulse Noise Removal Techniques, International Journal of Science and Research 6 (3), 941-954, 2017.
  4. L.S.S. Singh, AK Ahlawat, K.M. Singh, T.R. Singh, N. Dinamani, Fuzzy rule based edge detection technique, International Journal of Electronics, Electrical and Computational System, 6(3), 170-173, 2017.
  5. S. Subhasini and K.M. Singh, Color Image Edge Detection: A Survey, International Journal of Innovations in Engineering and Technology, 8(1), 235-247, 2017.
  6. B.A. Shimray, K.M. Singh and  R.K. Mehta, A survey of Multi-Criteria Decision Making Technique used in Renewable Energy Planning, International Journal of Computer, 124-140, 2017.
  7. M. Kumar and K.M. Singh, Content Based Medical Image Retrieval Using Fourier Descriptors Feature for Nose Images, International Journal of Electronics and Communication Engineering, 3(12), 1-4, 2016.
  8. P.R. Chanu and K.M. Singh, Vector Median Filters: A Survey, International Journal of Computer Science and Network Security, 6(12), 66-84, 2016.
  9. D.M. Thounaojam, S Roy and K.M. Singh, Video Shot Boundary Detection using Gray Level Cooccurrence Matrix, Indian Journal of Science and Technology 9 (7), 1-5, 2016.
  10. H.S. Devi and K.M. Singh, A Robust and Optimized 3D Red-Cyan Anaglyph Blind Image Watermarking in the DWT Domain, Contemporary Engineering Sciences, 9(32), 575 – 1589, 2016.
  11. H.S. Devi and K.M. Singh, A Brief Survey on 3D Watermarking Techniques, Journal of Basic and Applied Engineering Research, 2(19), 1644-1648, 2015.
  12. M. Kumar and K.M. Singh, Content Based Medical Image, IJCTA, 9(40), 353-358, 2016.
  13. B.P. Devi, K.M. Singh, S. Roy, Y.J. Chanu and T. Tuithung, A Watermarking Scheme for Digital Images Based on Visual Cryptography, Contemporary Engineering Science, 8(32), 1517-1528, 2015.
  14. U.R. Singh, K.M. Singh S. Roy, Energy Efficient Key Management Analysis using AVL Trees in Wireless Sensor Network, International Journal of Engineering Science Invention 4, 59-70, 2015.
  15. Y.S. Singh, B.P. Devi and K.M. Singh, Image Compression with Haar Wavelet Transform, International Journal of Computer Applications 121 (9), 2015.
  16. Y.S. Singh, B.P. Devi and K.M. Singh, Image Compression with Haar Wavelet Transform, International Journal of Computer Applications 121 (9), 2015.
  17. Y.J. Chanu, K.M. Singh, T. Tuithung, Adaptive Edge Steganography for Images, International Journal of Information and Computation Technology 4 (7), 777-786, 2014.
  18. T.R. Singh, S. Roy and K.M. Singh, Histogram Domain Adaptive Power Law Applications in Image Enhancement Technique, International Journal of Computer Science and Information Technologies, 5(3), 3972-3978, 2014.
  19. Y.J. Chanu, K.M. Singh and T. Tuithung, A robust steganographic method based on singular value decomposition, Int. J. Inf. Comput. Technol 4 (7), 717-726, 2014.
  20. Y.S. Singh, B.P. Devi and K.M. Singh, A review of different techniques on digital image watermarking scheme, International Journal of Engineering Research 2 (3), 193-199, 2013.
  21. A.B. Singh, S.D. Barma and K.M. Singh, Review of copy-move forgery detection of images using discrete cosine transform, International Journal of Computer Applications 84 (15), 2013.
  22. C. Ngangbam and K.M. Singh, Low-Power Maximum a Posteriori (MAP) Algorithm for WiMAX Convolutional Turbo Decoder, IJECCE 4 (3), 767-773, 2013.
  23. T.R. Singh, S. Roy and K.M. Singh, Threshold based adaptive power-Law applications in image enhancement, International Journal of Computer Applications (0975-888) 47 (7), 2012.
  24. T.R. Singh, S. Roy and K.M. Singh, Local adaptive automatic binarisation (laab), International Journal of Computer Applications, 40(6), 27-30, 2012.
  25. T.R. Singh, K.M. Singh and S. Roy, Image watermarking scheme based on visual cryptography in discrete wavelet transform, International Journal of Computer Applications 39 (1), 2012.
  26. T.R. Singh, S. Roy, O.I. Singh, T. Sinam and K.M. Singh, A new local adaptive thresholding technique in binarization, International Journal of Computer Science Issues, 8(6), 271-277, 2011.
  27. Y.J. Chanu, K.M. Singh and T. Tuithung, Steganography Technique based on SVD, International Journal of Research in Engineering and Technology, 6, 293-297, 2012.
  28. B.P. Devi, K.M. Singh and S. Roy, Dual image watermarking scheme based on singular value decomposition and visual cryptography in discrete wavelet transform, International Journal of Computer Applications 50 (12), 2012.
  29. Y.J. Chanu, K.M. Singh and T Tuithung, Image steganography and steganalysis: A survey, International Journal of Computer Applications 52 (2), 2012.
  30.  A. Neelima and K.M. Singh, A short survey on perceptual hash function, ADBU Journal of Engineering Technology, 1, 2014.
  31. T.R. Singh, O.I. Singh, K.M. Singh, T. Sinam and T.R. Singh, Image enhancement by adaptive power-law transformations, Bahria Univ. J. Inform. Commun. Technol 3 (1), 29-37, 2010.
  32. K.M. Singh, Verification of authenticity of transmitted images, International Journal of the Computer 17 (3), 47-56, 2009.
  33. K.M. Singh, Dual watermarking scheme for copyright protection, International Journal of Computer Science and Engineering System, 3 (2), 99-106, 2009.
  34. S. Bimol, K.M. Singh, Y.J. Singh and L.P. Devi, Assessment of transaction performance under distributed real time database system, IU-Journal of Electrical & Electronics Engineering 8 (2), 649-655, 2008.
  35. K.M. Singh, S.B. Singh and L.S.S. Singh, Hiding encrypted message in the features of images, IJCSNS 7 (4), 302-307, 2007.
  36. K.M. Singh, P.K. Bora and S.B. Singh, Vector median filter for removal of impulse noise from color images, WSEAS Transactions on Computers 3 (1), 209-217, 2004.
  37. K.M. Singh and P.K. Bora, Adaptive vector median filter for removal of impulse noise from color images, IU-Journal of Electrical & Electronics Engineering 4 (1), 1063-1072, 2004.
  38. K.M. Singh and P.K. Bora, Noncausal vector linear prediction filter, WSEAS Trans Circuits Syst 2, 1211-1219, 2003.

SCI/Scopus Indexed Conference Papers

  1. R. Huidrom, Y J Chanu and K M Singh,A fast automated lung segmentation method for the diagnosis of lung cancer, IEEE Tencon, 2017  10.1109/TENCON.2017.8228094
  2. P R Chanu and K M Singh,A Switching vector median filter for impulse noise removal from color images, IEEE Tencon, 2017  10.1109/TENCON.2017.8228341
  3. L.D. Singh and K.M. Singh, Implementation of Text Encryption using Elliptic Curve Cryptography, 11th International conference on Communication Networks, 21-23 August, Bangalore, 2015.
  4. L.D. Singh and K.M. Singh, Image encryption using elliptic curve cryptography, 11th International Conference on Image and Signal Processing, 21-23 August, Bangalore, 2015.
  5. N.D. Singh, Y.J. Chanu and K.M. Singh, Image Segmentation Using K -means Clustering Algorithm and Subtractive Clustering Algorithm, 11th International Conference on Image and Signal Processing, 21-23 August, Bangalore, 2015.
  6. KM Singh, PK Bora, Adaptive vector median filter for removal impulses from color images, IEEE International Symposium on Circuits and Systems, 2003.
  7. K.M. Singh, P.K. Bora and S.B. Singh, Rank-ordered mean filter for removal of impulse noise from images, IEEE ICIT, 2, 980-985, 2002.
  8. K.M. Singh and P.K. Bora, Improved rank conditioned median filter for removal of impulse noise from images, IEEE TENCON, 557-560, 2002.
  9. K.M. Singh and  P.K. Bora and A. Mahanta, Features preserving filters using fuzzy kohonen clustering network in detection of impulse noise, IEEE Tencon, 1, 420-423, 2002. 
  10. K.M. Singh and P.K. Bora, Texture image classification in the JPEG domain, SPIE Conf, 2001.

Other Conference Papers

1. K. Pritamdas and K.M. Singh, A new adaptive switching approach for impulse noise removal from color images,  International conference on Man and Machine Interfacing (MAMI), 1-6, 2015.

2. A. Neelima and K.M. Singh, A robust image hash function based on color and texture features of the image, International Symposium on Advanced Computing and Communication (ISACC), 238-243, 2015.

3. R. Rajkumar and K.M. Singh, Digital image forgery detection using SIFT feature, International Symposium on Advanced Computing and Communication (ISACC), 186-191, 2015.

4. A. SenGupta, D.M. Thounaojam, K.M. Singh and S. Roy, Video Shot Boundary Detection: A Review, International Conference on Electrical, Computer and Communication Technologies (ICECCT), 1-6, 2015.

5. S. Debbarma, A.B. Singh and K.M. Singh, Keypoints based copy-move forgery detection of digital images, International Conference on Informatics, Electronics & Vision (ICIEV), 1-5, 2014.

6. T. Romen Singh, S. Roy and K.M. Singh, Global DCT domain power law transformations in image enhancement technique, International Symposium on Computational and Business Intelligence (ISCBI), 269-273, 2013.

7. Y.S. Singh, B.P. Devi and K.M. Singh, Image Compression using Multilayer Feed Forward Artificial Neural Network with Conjugate Gradient, World Congress on Information and Communication Technologies (WICT), 2012.

8. T.R. Singh, K.M. Singh and S. Roy, Robust video watermarking scheme based on visual cryptography, 2012 World Congress on Information and Communication Technologies (WICT), 2012.

9. Y.J. Chanu, T. Tuithung and K.M. Singh, A short survey on image steganography and steganalysis techniques, national conference on Emerging trends and applications in computer science (NCETACS), 52-55, 2012.

10.  B.P. Devi, K.M. Singh and S. Roy, Dual Image Watermarking Scheme Based on Singular Value Decomposition, Trends in Innovative Computing-Information Retrieval and Data Mining, 2012.

11.  K.M. Singh, S. Nandi, S.B. Singh and L.S. Singh, Stealth steganography in visual cryptography for half tone images, International Conference on Computer and Communication Engineering, 2008. ICCCE 2008.

12.  S. Bimol, P.Devi and K.M. Singh, Experimental Comparison of Transaction Commit and Abort under Real Time Distributed Database System, AITIS, 2008.

13.  S. Bimol, P. Devi and K.M. Singh, ICT: A new horizontal of school education, IndiaCom, 2008.

14.  K.M. Singh, L.S. Singh, A.B. Singh and K.S. Devi, Hiding secret message in edges of the image, International conference on Information and Communication Technology, 2007.

15.  K.M. Singh and P.K. Bora, Impulse noise models for images, Proceedings of the 4th WSEAS International Conference on Telecommunications, 2005.

16.  K.M. Singh, P.K. Bora and S.B. Singh, Fuzzy Rank-conditioning and Threshold Impulse Detectors for Gray-scale Images, InTech, 2003.

17.  K.M. Singh and P.K. Bora, Adaptive rank-ordered mean filter for removal of impulse noise from images, ICVGIP, 2002.

18.  K.M. Singh and P.K. Bora, Impulse Noise Removal Using Fuzzy Rank Selection Technique, ICECE, 2002.

19.  K.M. Singh and P.K. Bora, Enhanced Vector SD-ROM Filter for removal of impulse noise from Color images, ICHPC, 2002.

20.  K.M. Singh and P.K. Bora, Enhanced SD-ROM filter for the removal of streaks from images, NSIITD, 2002.

21.  K.M. Singh and P.K. Bora, Rank conditioned vector median filters for removal of impulse noise from color images, NSECT, 2002.

22.  K.M. Singh and P.K. Bora, Fuzzy vector rank filters for color image processing, NCIAIS, 2002.

23.  K.M. Singh and P.K. Bora, 2-D linear prediction based median filtering, NCC, 2001.

24.  K.M. Singh and P.K. Bora, Rank order median filter for removal of impulse noise from color images, BBOFC, 2002.

25.  K.M. Singh and P.K. Bora, Fuzzy based multilevel median filter, ICMS, 2000.

26.  K.M. Singh, Measurement of Heart Beat using MP, NCTP, 1999.

27.  K.M. Singh, Noise reduction using fuzzy method, ACTIMA, 1999.

28.  K.M. Singh, Construction of Membership Functions in Noisy Environment, TEAM, 1999.

29.  K.M. Singh, Message Authentication using Digital Signatures in Computer Communication, NCIT, 1999.

30.  K.M. Singh, The Public Key Cryptography using RSA Algorithm for Network Security, NCWA, 1999.

31.  K.M. Singh, Intelligent Controller for a Solar Panel, CADCO, 1998.

32.  K.M. Singh, Fuzzy Logic Controller for a Regulated Three phase AC    power Supply, CADCO, 1998.

33.  K.M. Singh, Linguistic state space stability of fuzzy logic control system, MSC, 1998.

34.  K.M. Singh, Expert system for TV diagnosis, MSC, 1998.

35.  K.M. Singh, Fuzzy logic based incubator, MSC, 1997.

36.  K.M. Singh, The Web, MSC, 1997.

37.  K.M. Singh, Cyber Crime, MITEX, 1996.

 

Book Chapter

  1. D.M. Thounaojam, A. Trivedi, K.M. Singh and S. Roy, A Survey on Video Segmentation, D. P. Mohapatra and S. Patnaik (eds.), Springer Intelligent Computing, Networking, and Informatics, Advances in Intelligent Systems and Computing, 903-912,  2014.
  2. P.R. Chanu and K.M. Singh,  Color Image Denoising, Encyclopedia of Image Processing, Taylor & Francis,2019 .
  3. PKB, PC, KMS, A comparative study for brain tumor detection in MRI images using texture features, Advances in ubiquitous sensing applications for healthcar, Sensors for Health Monitoring 259-287, 2019
  4. A. Neelima and KM Singh, Perceptual Hash Function for Images Based on Hierarchical Ordinal Pattern, Handbook of Multimedia Information Security: Techniques and Applications pp 267-287, 20/07/2019

Academic Information

Qualification

HSLC (Class X) from Lamding High School, PO Wangjing, Manipur

PUSc (Class XII) from D M College of Science, Imphal, Manipur

BSc Engineering (Electrical ) from Dayalbagh Education Institute (DEI), Agra, UP in 1986

ME (Electrical - Control & Instrumentation) from Delhi College of Engineering (DCE), Delhi University in 1992

MS (Software Systems) from Birla Institute of Technology & Science (BITS) , Pilani, Rajasthan, in 1994

PhD (Digital Image Processing) from Indian Institute of Technology, Guwahati (IITG), Assam in 2007

 

Areas of Interest

Digital Image & Video Processing, Digital Watermarking and Information Hiding, Cryptography, Hashing Functions, Cyber Forensics

Project Information

1. Cyber Forensic for North East India, MeitY, DIT, Rs 2.93 Crores, 2009-2010

2. Information Security Education Awareness (ISEA), MeitY, DIT, Rs 18 Lakhs, 2006-2010

3. Dielect Detection of Manipuri Language, DST, Rs 1 Lakh, Manipur, 2018

Other Activity Information

Training Courses Attended

Sl No.

Programme

Duration & Date

Organized by

1

Fundamental of Incident Handling

5 days, 12-16 Sep 05

CMU, Pittsburg, USA

2

Information Security for Technical Staff

5 days, 19-23 Sep 05

CMU, Pittsburg, USA

3

Computer Forensics for Technical Staff

2 days, 26-27 Sep 05

CMU, Pittsburg, USA

4

Servicing techniques

12 days, 1-12 Jul 91

IIT, Delhi

5

Intelligent controllers

3 days, 7-9 Jun 93

CEDT, Calicut

6

Data mining & computational biology

5 days, 14-18, 05

ISI/MU

7

Digital signal processing

2 months, 30/10/95  – 22/12/95

IISc, Bangalore

8

Soft Computing, Data Mining and Bio Informatics

5 days, 14-18 Feb, 2005

ISI/NERIST

9

Intellectual Property Rights (IPR)

1 day, 29/01/2014

NIELIT, Imphal

10

NCETACS

2 days, 30-31 Mar 2012

St Anthony’s College, Shillong

Invited lectures

Sl No.

Title of the lecture / academic session

Title conference/ seminar

Date (s) of the event

Organized by

Whether international / national

1

Singular value decompositions for information hiding

NWC

12-13 Oct 12

UGC, DMC

National

2

Introduction to computer basic and cyber crime

NWAL

19 Sep 12

UGC, MU

National

3

Cyber crime

Orientation

21 Jan 12

UGC, MU

National

4

Steganography & applications

WIS

05/01/05

DOEACC, Imphal

State

5

Computer & electronics tools for effective management

CAUGG

28/04/07

Forest Dept, Imphal

State

6

Network Security

UGC

14/01/10

MU

National

7

Computer Forensic

NLW

25/03/10

MU

National

8

Introduction to DIP

XWW

19/11/10

XWave

State

9

Comparative Cost Analysis of Technical Education Between North East and Outside

PTENEI

19/05/13

Sanathong

National

10

Net wars

MITEX

10/03/03

IETE

National

11

Information Hiding

MU Lib

18/01/14

MU

National

12

Image and video watermarking and hashing function

NITS

2016

NIT Silchar

National