Image steganography using deep learning based edge detection B Ray, S Mukhopadhyay, S Hossain, SK Ghosal, R Sarkar Multimedia Tools and Applications 80 (24), 33475-33503, 2021 | 59 | 2021 |
High payload image steganography based on Laplacian of Gaussian (LoG) edge detector SK Ghosal, JK Mandal, R Sarkar Multimedia Tools and Applications 77 (23), 30403-30418, 2018 | 51 | 2018 |
Binomial transform based fragile watermarking for image authentication SK Ghosal, JK Mandal Journal of information security and applications 19 (4-5), 272-281, 2014 | 41 | 2014 |
Image steganography based on Kirsch edge detection SK Ghosal, A Chatterjee, R Sarkar Multimedia Systems 27 (1), 73-87, 2021 | 35 | 2021 |
LSB based steganography with OCR: an intelligent amalgamation A Chatterjee, SK Ghosal, R Sarkar Multimedia tools and applications 79 (17), 11747-11765, 2020 | 31 | 2020 |
Fuzzy edge detection based steganography using modified Gaussian distribution S Dhargupta, A Chakraborty, SK Ghosal, S Saha, R Sarkar Multimedia Tools and Applications 78, 17589-17606, 2019 | 31 | 2019 |
Application of Lah transform for security and privacy of data through information hiding in telecommunication SK Ghosal, S Mukhopadhyay, S Hossain, R Sarkar Transactions on Emerging Telecommunications Technologies 32 (2), e3984, 2021 | 29 | 2021 |
A secured image steganography method based on ballot transform and genetic algorithm S Hossain, S Mukhopadhyay, B Ray, SK Ghosal, R Sarkar Multimedia Tools and Applications 81 (27), 38429-38458, 2022 | 28 | 2022 |
Secured image steganography based on Catalan transform S Mukhopadhyay, S Hossain, SK Ghosal, R Sarkar Multimedia Tools and Applications 80, 14495-14520, 2021 | 26 | 2021 |
Exploiting Laguerre transform in image steganography SK Ghosal, S Mukhopadhyay, S Hossain, R Sarkar Computers & Electrical Engineering 89, 106964, 2021 | 26 | 2021 |
Extended exploiting modification direction based steganography using hashed-weightage array S Saha, A Chakraborty, A Chatterjee, S Dhargupta, SK Ghosal, R Sarkar Multimedia Tools and Applications 79, 20973-20993, 2020 | 21 | 2020 |
DiffMoment: an adaptive optimization technique for convolutional neural network S Bhakta, U Nandi, T Si, SK Ghosal, C Changdar, RK Pal Applied Intelligence 53 (13), 16844-16858, 2023 | 16 | 2023 |
On the use of the Stirling transform in image steganography SK Ghosal, JK Mandal Journal of Information Security and Applications 46, 320-330, 2019 | 16 | 2019 |
A new pair wise bit based data hiding approach on 24 bit color image using steganographic SK Ghosal IEMCON, 2011 | 16 | 2011 |
Separable discrete Hartley transform based invisible watermarking for color image authentication (SDHTIWCIA) JK Mandal, SK Ghosal Advances in Computing and Information Technology: Proceedings of the Second …, 2013 | 14 | 2013 |
Image steganography based on difference of Gaussians edge detection B Patwari, U Nandi, SK Ghosal Multimedia Tools and Applications 82 (28), 43759-43779, 2023 | 12 | 2023 |
Stego-chain: A framework to mine encoded stego-block in a decentralized network P Sarkar, SK Ghosal, M Sarkar Journal of King Saud University-Computer and Information Sciences 34 (8 …, 2022 | 12 | 2022 |
Improved exploiting modification direction‐based steganography using dynamic weightage array S Saha, SK Ghosal, A Chakraborty, S Dhargupta, R Sarkar, JK Mandal Electronics Letters 54 (8), 498-500, 2018 | 12 | 2018 |
Color image authentication based on two-dimensional separable discrete hartley transform (CIA2D-SDHT) SK Ghosal, JK Mandal AMSE Journals-Series: Advances B 57 (1), 68-87, 2014 | 10 | 2014 |
A fragile watermarking based on binomial transform in color images JK Mandal, SK Ghosal, J Zizka Computer Science and Information Technology, 281-288, 2013 | 6 | 2013 |