Seguir
Dr. Sudipta Kumar Ghosal
Dr. Sudipta Kumar Ghosal
Lecturer in Computer Software Technology, W.B.G.S.
Dirección de correo verificada de wbscte.ac.in
Título
Citado por
Citado por
Año
High payload image steganography based on Laplacian of Gaussian (LoG) edge detector
SK Ghosal, JK Mandal, R Sarkar
Multimedia Tools and Applications 77 (23), 30403-30418, 2018
452018
Binomial transform based fragile watermarking for image authentication
SK Ghosal, JK Mandal
Journal of information security and applications 19 (4-5), 272-281, 2014
392014
Image steganography using deep learning based edge detection
B Ray, S Mukhopadhyay, S Hossain, SK Ghosal, R Sarkar
Multimedia Tools and Applications 80 (24), 33475-33503, 2021
342021
Image steganography based on Kirsch edge detection
SK Ghosal, A Chatterjee, R Sarkar
Multimedia Systems 27 (1), 73-87, 2021
272021
Fuzzy edge detection based steganography using modified Gaussian distribution
S Dhargupta, A Chakraborty, SK Ghosal, S Saha, R Sarkar
Multimedia Tools and Applications 78, 17589-17606, 2019
272019
LSB based steganography with OCR: an intelligent amalgamation
A Chatterjee, SK Ghosal, R Sarkar
Multimedia tools and applications 79 (17), 11747-11765, 2020
242020
Application of Lah transform for security and privacy of data through information hiding in telecommunication
SK Ghosal, S Mukhopadhyay, S Hossain, R Sarkar
Transactions on Emerging Telecommunications Technologies 32 (2), e3984, 2021
232021
Secured image steganography based on Catalan transform
S Mukhopadhyay, S Hossain, SK Ghosal, R Sarkar
Multimedia Tools and Applications 80, 14495-14520, 2021
212021
Exploiting Laguerre transform in image steganography
SK Ghosal, S Mukhopadhyay, S Hossain, R Sarkar
Computers & Electrical Engineering 89, 106964, 2021
212021
Extended exploiting modification direction based steganography using hashed-weightage array
S Saha, A Chakraborty, A Chatterjee, S Dhargupta, SK Ghosal, R Sarkar
Multimedia Tools and Applications 79, 20973-20993, 2020
172020
A secured image steganography method based on ballot transform and genetic algorithm
S Hossain, S Mukhopadhyay, B Ray, SK Ghosal, R Sarkar
Multimedia Tools and Applications 81 (27), 38429-38458, 2022
152022
On the use of the Stirling transform in image steganography
SK Ghosal, JK Mandal
Journal of Information Security and Applications 46, 320-330, 2019
152019
A new pair wise bit based data hiding approach on 24 bit color image using steganographic technique
SK Ghosal
Greater Kolkata College of Engineering & Management, Kolkata, India, 2011
152011
Separable discrete Hartley transform based invisible watermarking for color image authentication (SDHTIWCIA)
JK Mandal, SK Ghosal
Advances in Computing and Information Technology: Proceedings of the Second …, 2013
142013
Stego-chain: A framework to mine encoded stego-block in a decentralized network
P Sarkar, SK Ghosal, M Sarkar
Journal of King Saud University-Computer and Information Sciences 34 (8 …, 2022
122022
Improved exploiting modification direction‐based steganography using dynamic weightage array
S Saha, SK Ghosal, A Chakraborty, S Dhargupta, R Sarkar, JK Mandal
Electronics Letters 54 (8), 498-500, 2018
122018
Color image authentication based on two-dimensional separable discrete hartley transform (CIA2D-SDHT)
SK Ghosal, JK Mandal
AMSE Journals-Series: Advances B 57 (1), 68-87, 2014
102014
A fragile watermarking based on binomial transform in color images
JK Mandal, SK Ghosal, J Zizka
Computer Science and Information Technology, 281-288, 2013
62013
Image steganography based on difference of Gaussians edge detection
B Patwari, U Nandi, SK Ghosal
Multimedia Tools and Applications 82 (28), 43759-43779, 2023
42023
Stirling transform based color image authentication
SK Ghosal, JK Mandal
Procedia Technology 10, 95-104, 2013
42013
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20