Takip et
Dr. Sudipta Kumar Ghosal
Dr. Sudipta Kumar Ghosal
Lecturer in Computer Software Technology, W.B.G.S.
wbscte.ac.in üzerinde doğrulanmış e-posta adresine sahip
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
Image steganography using deep learning based edge detection
B Ray, S Mukhopadhyay, S Hossain, SK Ghosal, R Sarkar
Multimedia Tools and Applications 80 (24), 33475-33503, 2021
592021
High payload image steganography based on Laplacian of Gaussian (LoG) edge detector
SK Ghosal, JK Mandal, R Sarkar
Multimedia Tools and Applications 77 (23), 30403-30418, 2018
512018
Binomial transform based fragile watermarking for image authentication
SK Ghosal, JK Mandal
Journal of information security and applications 19 (4-5), 272-281, 2014
412014
Image steganography based on Kirsch edge detection
SK Ghosal, A Chatterjee, R Sarkar
Multimedia Systems 27 (1), 73-87, 2021
352021
LSB based steganography with OCR: an intelligent amalgamation
A Chatterjee, SK Ghosal, R Sarkar
Multimedia tools and applications 79 (17), 11747-11765, 2020
312020
Fuzzy edge detection based steganography using modified Gaussian distribution
S Dhargupta, A Chakraborty, SK Ghosal, S Saha, R Sarkar
Multimedia Tools and Applications 78, 17589-17606, 2019
312019
Application of Lah transform for security and privacy of data through information hiding in telecommunication
SK Ghosal, S Mukhopadhyay, S Hossain, R Sarkar
Transactions on Emerging Telecommunications Technologies 32 (2), e3984, 2021
292021
A secured image steganography method based on ballot transform and genetic algorithm
S Hossain, S Mukhopadhyay, B Ray, SK Ghosal, R Sarkar
Multimedia Tools and Applications 81 (27), 38429-38458, 2022
282022
Secured image steganography based on Catalan transform
S Mukhopadhyay, S Hossain, SK Ghosal, R Sarkar
Multimedia Tools and Applications 80, 14495-14520, 2021
262021
Exploiting Laguerre transform in image steganography
SK Ghosal, S Mukhopadhyay, S Hossain, R Sarkar
Computers & Electrical Engineering 89, 106964, 2021
262021
Extended exploiting modification direction based steganography using hashed-weightage array
S Saha, A Chakraborty, A Chatterjee, S Dhargupta, SK Ghosal, R Sarkar
Multimedia Tools and Applications 79, 20973-20993, 2020
212020
DiffMoment: an adaptive optimization technique for convolutional neural network
S Bhakta, U Nandi, T Si, SK Ghosal, C Changdar, RK Pal
Applied Intelligence 53 (13), 16844-16858, 2023
162023
On the use of the Stirling transform in image steganography
SK Ghosal, JK Mandal
Journal of Information Security and Applications 46, 320-330, 2019
162019
A new pair wise bit based data hiding approach on 24 bit color image using steganographic
SK Ghosal
IEMCON, 2011
162011
Separable discrete Hartley transform based invisible watermarking for color image authentication (SDHTIWCIA)
JK Mandal, SK Ghosal
Advances in Computing and Information Technology: Proceedings of the Second …, 2013
142013
Image steganography based on difference of Gaussians edge detection
B Patwari, U Nandi, SK Ghosal
Multimedia Tools and Applications 82 (28), 43759-43779, 2023
122023
Stego-chain: A framework to mine encoded stego-block in a decentralized network
P Sarkar, SK Ghosal, M Sarkar
Journal of King Saud University-Computer and Information Sciences 34 (8 …, 2022
122022
Improved exploiting modification direction‐based steganography using dynamic weightage array
S Saha, SK Ghosal, A Chakraborty, S Dhargupta, R Sarkar, JK Mandal
Electronics Letters 54 (8), 498-500, 2018
122018
Color image authentication based on two-dimensional separable discrete hartley transform (CIA2D-SDHT)
SK Ghosal, JK Mandal
AMSE Journals-Series: Advances B 57 (1), 68-87, 2014
102014
A fragile watermarking based on binomial transform in color images
JK Mandal, SK Ghosal, J Zizka
Computer Science and Information Technology, 281-288, 2013
62013
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20