Arunita Chaukiyal

Work place: Department of Computer Science, Acharya Narendra Dev College, University of Delhi, New Delhi, 110019, India

E-mail: arunita@andc.du.ac.in

Website: https://orcid.org/0009-0008-5185-5945

Research Interests:

Biography

Dr. Arunita Chaukiyal received the Ph.D. degree in computer science from Jawaharlal Nehru University,
currently serving as STA in Department of Computer Science, Acharya Narendra Dev College, a constituent
college of the University of Delhi. Her academic and research interest include Image Processing, Cyber security,
Wireless Networks (Ad Hoc and Sensors), Internet of Things (IoT), Machine Learning and Computational
Intelligence, . She has published research articles in international journals and international/national
conferences.

Author Articles
Novel Approach to Create and Detect Invisible Cloak using Monocular Camera or Web Cam

By Nishant Pratap Singh Adi Maqsood Arunita Chaukiyal Preeti Marwaha

DOI: https://doi.org/10.5815/ijem.2026.02.03, Pub. Date: 8 Apr. 2026

The design of an invisible cloak has attracted attention owing to its potential use in espionage and military applications. Advances in computer vision and image processing have enabled the creation of invisible cloaks. This study presents the design and detection of an invisible cloak using a cost-effective monocular camera. The proposed algorithm uses the OpenCV library in Python to create and detect the cloak by analyzing individual pixels in video frames to identify areas with minimal or no change in pixel values. The approach relies on pixel-level analysis using Gaussian curves for detection. Experimental validation of self-created and publicly available datasets demonstrates the effectiveness of the method. Although the algorithm performs well under static environmental conditions, challenges remain in dynamic settings, which will be addressed in future work to improve robustness. This study contributes to the development of practical and affordable invisibility cloak technology and reliable detection methods to mitigate potential misuse.

[...] Read more.
Other Articles