Volgen
Dr. Sudipta Kumar Ghosal
Dr. Sudipta Kumar Ghosal
Lecturer in Computer Software Technology, W.B.G.S.
Geverifieerd e-mailadres voor wbscte.ac.in
Titel
Geciteerd door
Geciteerd door
Jaar
High payload image steganography based on Laplacian of Gaussian (LoG) edge detector
SK Ghosal, JK Mandal, R Sarkar
Multimedia Tools and Applications 77 (23), 30403-30418, 2018
472018
Image steganography using deep learning based edge detection
B Ray, S Mukhopadhyay, S Hossain, SK Ghosal, R Sarkar
Multimedia Tools and Applications 80 (24), 33475-33503, 2021
402021
Binomial transform based fragile watermarking for image authentication
SK Ghosal, JK Mandal
Journal of information security and applications 19 (4-5), 272-281, 2014
392014
Image steganography based on Kirsch edge detection
SK Ghosal, A Chatterjee, R Sarkar
Multimedia Systems 27 (1), 73-87, 2021
282021
Fuzzy edge detection based steganography using modified Gaussian distribution
S Dhargupta, A Chakraborty, SK Ghosal, S Saha, R Sarkar
Multimedia Tools and Applications 78, 17589-17606, 2019
272019
Application of Lah transform for security and privacy of data through information hiding in telecommunication
SK Ghosal, S Mukhopadhyay, S Hossain, R Sarkar
Transactions on Emerging Telecommunications Technologies 32 (2), e3984, 2021
242021
LSB based steganography with OCR: an intelligent amalgamation
A Chatterjee, SK Ghosal, R Sarkar
Multimedia tools and applications 79 (17), 11747-11765, 2020
242020
Secured image steganography based on Catalan transform
S Mukhopadhyay, S Hossain, SK Ghosal, R Sarkar
Multimedia Tools and Applications 80, 14495-14520, 2021
222021
Exploiting Laguerre transform in image steganography
SK Ghosal, S Mukhopadhyay, S Hossain, R Sarkar
Computers & Electrical Engineering 89, 106964, 2021
212021
Extended exploiting modification direction based steganography using hashed-weightage array
S Saha, A Chakraborty, A Chatterjee, S Dhargupta, SK Ghosal, R Sarkar
Multimedia Tools and Applications 79, 20973-20993, 2020
182020
A secured image steganography method based on ballot transform and genetic algorithm
S Hossain, S Mukhopadhyay, B Ray, SK Ghosal, R Sarkar
Multimedia Tools and Applications 81 (27), 38429-38458, 2022
162022
On the use of the Stirling transform in image steganography
SK Ghosal, JK Mandal
Journal of Information Security and Applications 46, 320-330, 2019
152019
A new pair wise bit based data hiding approach on 24 bit color image using steganographic technique
SK Ghosal
Greater Kolkata College of Engineering & Management, Kolkata, India, 2011
152011
Separable discrete Hartley transform based invisible watermarking for color image authentication (SDHTIWCIA)
JK Mandal, SK Ghosal
Advances in Computing and Information Technology: Proceedings of the Second …, 2013
142013
Stego-chain: A framework to mine encoded stego-block in a decentralized network
P Sarkar, SK Ghosal, M Sarkar
Journal of King Saud University-Computer and Information Sciences 34 (8 …, 2022
122022
Improved exploiting modification direction‐based steganography using dynamic weightage array
S Saha, SK Ghosal, A Chakraborty, S Dhargupta, R Sarkar, JK Mandal
Electronics Letters 54 (8), 498-500, 2018
122018
Color image authentication based on two-dimensional separable discrete hartley transform (CIA2D-SDHT)
SK Ghosal, JK Mandal
AMSE Journals-Series: Advances B 57 (1), 68-87, 2014
102014
Image steganography based on difference of Gaussians edge detection
B Patwari, U Nandi, SK Ghosal
Multimedia Tools and Applications 82 (28), 43759-43779, 2023
62023
A fragile watermarking based on binomial transform in color images
JK Mandal, SK Ghosal, J Zizka
Computer Science and Information Technology, 281-288, 2013
62013
Diffmoment: an adaptive optimization technique for convolutional neural network
S Bhakta, U Nandi, T Si, SK Ghosal, C Changdar, RK Pal
Applied Intelligence 53 (13), 16844-16858, 2023
42023
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20