Dayanand G Savakar

Work place: Department of Computer Science, Rani Channamma University, Belagavi India



Research Interests: Information Systems, Image Processing, Information Security, Pattern Recognition


Dr. Dayanand G. Savakar, Associate Professor, Department of Computer Science, Rani Channamma University, Belagavi, India. He has obtained his B E in Computer Science & Engineering in 1990, Master’s degree in Software Systems in 1997 and Ph.D. in
Computer Science and Engineering in the year 2010. He has published 35 research papers in peer reviewed International Journals and conferences. His research area of interest is Image Processing and Pattern Recognition.

Author Articles
Hidden Markov Model for Identification of Different Marks on Human Body in Forensic Perspective

By Dayanand G Savakar Anil Kannur

DOI:, Pub. Date: 8 Mar. 2019

This paper proposes a computational forensic methodology which identify and classify different marks on the human body using Hidden Markov model. The methodology gives an efficient and effective computerized approach for the characteristics of different marks such as birthmarks, burntmarks, tattoos and weapons’ wounds found on human body. This proposed method will be a computationally effective substitution for the traditional forensic method in identifying the body marks in crime investigation of homicidal cases. Hidden Markov Model (HMM) is statistical and logical tool suitable for this identification. The marks on human body describe different patterns with characteristics that are helpful in identification. The experimental results achieved for identification of different marks with an average accuracy of 94.6%, on the available database of 400 images that includes four categories: Birthmarks, Burntmarks, Tattoos and weapons’ wounds (100 images of each marks). The methodology gives the better combination of features (color, texture and shape), which are extracted for the identification of marks on human body for the purpose of computational forensic science.

[...] Read more.
Ensemble Learning Approach for Weapon Recognition Using Images of Wound Patterns: A Forensic Perspective

By Dayanand G Savakar Anil Kannur

DOI:, Pub. Date: 8 Nov. 2018

This paper presents a forensic perspective way of recognizing the weapons by processing wound patterns using ensemble learning that gives an effective forensic computational approach for the distinguished weapons used in most of crime cases. This will be one of the computational and effective substitutes to investigate the weapons used in crime, the methodology uses the collective wound patterns images from the human body for the recognition. The ensemble learning used in this proposed methodology improves the accuracy of machine learning methods by combining several methods and predicting the final accuracy by meta-classifier. It has given better recognition process compared to single individual model and the traditional method. Ensemble learning is more flexible in function and is better in the wound pattern recognition and their respective weapons as it overcomes the issue to overfit training data. The result achieved for weapon recognition based on wound patterns is 98.34%, from existing database of 800 images of pattern consisting of wounds of stabbed and gunshots. The authenticated experiments out-turns the preeminence of projected method over the widespread feature extraction approach considered in the work and also compares and suggest the false positive recognition verses false negative recognition. The proposed methodology has given better results compared to traditional method and will be helpful in forensic and crime investigation.

[...] Read more.
Digital Image Watermarking Using DWT and FWHT

By Dayanand G Savakar Shivanand Pujar

DOI:, Pub. Date: 8 Jun. 2018

Digital Image Watermarking is a process of embedding a known data into an Image. Several techniques are developed to embed a watermark into a known cover image. Digital image watermarking provides security like copyright protection, ownership, and authentication to the images. In this paper, a new robust image watermarking and the watermark extraction algorithm is proposed using DWT-FWHT transformation. The watermarking algorithm further calculates the peak-signal to noise ratio(PSNR) values on the selected images and the extraction process involves the process of correlating the extracted watermark with the original watermark for various sub-bands of discrete wavelet transformation. The digital image watermarking algorithms using discrete wavelet transformation have been identified to be more prevalent as compared to those with the other watermarking algorithms. This is due to the wavelets high spatial localization, frequency spread, and multi-resolution characteristic features which are much similar to that of the theoretical models of the human visual system.

[...] Read more.
Serial Digital Color Image Watermarking using Composite Scheme

By Dayanand G Savakar Anand Ghuli

DOI:, Pub. Date: 8 Nov. 2017

Digital watermarking is one of the ways to have Copyright protection for digital information. The digital watermarking scheme used for watermark embedding has to satisfy robustness property to ensure the security of the secret information hidden. The scheme presented here will support the above said statement significantly. We propose here the scheme as composition of both blind and non-blind digital watermarking technique in a process of serial watermarking. A secret binary image is embedded in the first cover image to get first watermarked image by using blind watermarking technique. Then this first watermarked image is again embedded into second cover image to get serial watermarked image using non-blind watermarking technique. To extract secret binary image, first non-blind watermark extraction technique and then blind watermark extraction techniques are used. From this composite approach and serial watermark embedding procedure, we achieved considerable fidelity and robustness against - Rotation, JPEG compression and for noises Salt & pepper, Gaussian, Speckle, Poisson and multiple noises.

[...] Read more.
Other Articles