Skip to main content

previous disabled Page of 4
and
  1. No Access

    Chapter and Conference Paper

    Ensuring e-Security Using a Private-Key Cryptographic System Following Recursive Positional Modulo-2 Substitutions

    In this paper, a bit-level secret-key block cipher system is proposed which follows the principle of substitution. The decimal equivalent of the block under consideration is is evaluated and the modulo-2 opera...

    Saurabh Dutta, J. K. Mandal in Applied Computing (2004)

  2. No Access

    Chapter and Conference Paper

    A Novel Visual Cryptographic Technique through Grey Level Inversion (VCTGLI)

    In this paper a new (2, 2) visual cryptographic technique has been proposed, where the aspect ratio and the dimension of the secrete image/share with respect to source image remains constant during the process...

    Jayanta Kumar Pal, J. K. Mandal in Recent Trends in Networks and Communicatio… (2010)

  3. No Access

    Chapter and Conference Paper

    A Novel Technique for Removal of Random Valued Impulse Noise Using All Neighbor Directional Weighted Pixels (ANDWP)

    In this paper an All Neighbor Directional Weighted Pixels (ANDWP) based filter has been proposed for removal of highly random valued impulse noise (RVIN). The proposed approach works in two phases. The first p...

    J. K. Mandal, Somnath Mukhopadhyay in Advances in Parallel Distributed Computing (2011)

  4. No Access

    Chapter and Conference Paper

    A Fourier Transform Based Authentication of Audio Signals through Alternation of Coefficients of Harmonics (FTAT)

    With commercial growth of digital processing of audio signals like song, voice, speech etc the intention to make piracy of originality of the same is increasing day by day. It is a real problem of intellectual...

    Uttam Kr. Mondal, J. K. Mandal in Advances in Parallel Distributed Computing (2011)

  5. No Access

    Chapter and Conference Paper

    A Novel DFT Based Information Embedding for Color Image Authentication (DFTIECIA)

    In this paper, a novel two-dimensional Discrete Fourier Transformation based information embedding has been proposed for color image authentication (DFTIECIA). The DFT is applied on each 2 x 2 sub-image block ...

    J. K. Mandal, S. K. Ghosal in Advances in Computer Science, Engineering & Applications (2012)

  6. No Access

    Chapter and Conference Paper

    A Novel Invisible Watermarking Based on Cascaded PVD Integrated LSB Technique

    To enhance the payload of secret data a scheme on the basis of least significant bit (LSB) substitution cascaded with pixel value differencing (PVD) has been proposed in this paper. Firstly secret bits are emb...

    J. K. Mandal, Debashis Das in Eco-friendly Computing and Communication Systems (2012)

  7. No Access

    Chapter and Conference Paper

    Secret Data Hiding within Tolerance Level of Embedding in Quality Songs (DHTL)

    Embedding message into audio signal especially within songs without compromising its audible quality is one of the growing research areas. The techniques are used for different purposes in practical life. Vari...

    Uttam Kr. Mondal, J. K. Mandal in Advances in Computer Science, Engineering & Applications (2012)

  8. No Access

    Chapter and Conference Paper

    A GIS Based Approach of Clustering for New Facility Areas in a Digitized Map

    This paper presents the technique for finding the suitable locations for building new facility areas, such as Schools, Cold Storages etc. in the given map. The maps are combination of irregular polygons. Infor...

    J. K. Mandal, Anirban Chakraborty in Eco-friendly Computing and Communication S… (2012)

  9. No Access

    Article

    An Authentication Technique for Image/Legal Document (ATILD)

    The paper presents an image/legal-document authentication and secures message transmission technique by embedding message/image/message-digest into color images. Image authentication is done by embedding messa...

    Nabin Ghoshal, J. K. Mandal, A. Khamrui in Journal of Signal Processing Systems (2012)

  10. No Access

    Chapter and Conference Paper

    Separable Discrete Hartley Transform Based Invisible Watermarking for Color Image Authentication (SDHTIWCIA)

    In this paper a novel two-dimensional Separable Discrete Hartley Transform based invisible watermarking scheme has been proposed for color image authentication (SDHTIWCIA). Two dimensional SDHT is applied on e...

    J. K. Mandal, S. K. Ghosal in Advances in Computing and Information Technology (2013)

  11. No Access

    Chapter and Conference Paper

    A Novel Genetic Algorithm Based Data Embedding Technique in Frequency Domain Using Z Transform (ANGAFDZT)

    In this paper a transformed domain based gray scale image authentication/data hiding technique using Z transform (ZT) termed as ANGAFDZT, has been proposed. Z-Transform is applied on 2 x 2 mask of the source i...

    J. K. Mandal, A. Khamrui, S. Chakraborty in Advances in Computing and Information Tech… (2013)

  12. No Access

    Chapter and Conference Paper

    Invisible Image Watermarking Using Z Transforms (IIWZT)

    This paper presents an invisible image watermarking technique in frequency domain through Z transform, with a hiding capacity of 1.5 bpB (1.5 bits per byte). Z(rejω ) is a complex variable comes fro...

    J. K. Mandal, Rakesh Kanji in Advances in Computing and Information Technology (2013)

  13. No Access

    Chapter and Conference Paper

    A Wavelet Transform Based Image Authentication Approach Using Genetic Algorithm (AWTIAGA)

    Steganography is the technique of hiding confidential information within a media. In this paper a Genetic Algorithm based image authentication technique in transformed domain using haar wavelet transform is pr...

    Amrita Khamrui, J. K. Mandal in ICT and Critical Infrastructure: Proceedin… (2014)

  14. No Access

    Chapter and Conference Paper

    Color Image Authentication through Visible Patterns (CAV)

    In this paper a copyright protection technique based on visual patterns (CAV) has been proposed for color image. This technique manipulates bits of color image to hide the hash of secret without embedding secr...

    Madhumita Sengupta, J. K. Mandal in ICT and Critical Infrastructure: Proceedin… (2014)

  15. No Access

    Chapter and Conference Paper

    A Framework of Secured and Bio-Inspired Image Steganography Using Chaotic Encryption with Genetic Algorithm Optimization (CEGAO)

    The two key issues related to steganography techniques are, statistical undetectability and picture quality. Image steganography takes the advantage of limited power of Human Visual System (HVS). The proposed ...

    Debiprasad Bandyopadhyay, Kousik Dasgupta in Proceedings of the Fifth International Con… (2014)

  16. No Access

    Chapter and Conference Paper

    Complete Binary Tree Architecture Based Triple Layer Perceptron Synchronized Group Session Key Exchange and Authentication in Wireless Communication (CBTLP)

    In this paper, Triple Layer Perceptron harmonized one time session key exchange and authentication (CBTLP) has been proposed based on the structural design of complete binary tree. In this proposed technique 3...

    Arindam Sarkar, J. K. Mandal in ICT and Critical Infrastructure: Proceedin… (2014)

  17. No Access

    Chapter and Conference Paper

    Unique Key Based Authentication of Song Signal through DCT Transform (UKASDT)

    Authentication of song signal is one of the assessments to detect the originality in ease of alteration of its content. In this paper, DCT transform has been applied to song signal to extract a unique key for ...

    Uttam Kr. Mondal, J. K. Mandal in ICT and Critical Infrastructure: Proceedin… (2014)

  18. No Access

    Article

    A Fuzzy Switching Median Filter of Impulses in Digital Imagery (FSMF)

    This paper proposed a fuzzy-based switching technique that aims at detection and filtering of impulse noises from digital images. Two types of noise models are used to obtain the noisy images. In this two-step...

    Somnath Mukhopadhyay, J. K. Mandal in Circuits, Systems, and Signal Processing (2014)

  19. No Access

    Book and Conference Proceedings

  20. No Access

    Book and Conference Proceedings

previous disabled Page of 4