Skip to main content

and
  1. Article

    Open Access

    Virtual-source imaging and repeatability for complex near surface

    Based on seismic interferometry, the virtual source (VS) method is able to produce virtual gathers at buried receiver locations by crosscorrelating the direct-downgoing waves with corresponding reflected-upgoi...

    Yang Zhao, Tao Liu, Genyang Tang, Houzhu Zhang, Madhumita Sengupta in Scientific Reports (2019)

  2. No Access

    Chapter and Conference Paper

    Authentication in Higher Region of Convergence of Z Transform Domain (AHRocZ)

    In this paper a novel technique for authentication has been proposed in composite real and imaginary components of Z transform domain in higher region of convergence

    Suman Mahapatra, J. K. Mandal in Information Systems Design and Intelligent… (2015)

  3. No Access

    Chapter and Conference Paper

    Image Authentication in Frequency Domain through G-Let Dihedral Group (IAFD-D3)

    In this paper a G-Let based authentication technique has been proposed to authenticate digital documents by embedding a secret image/message inside the cover image in frequency domain. Cover image is transform...

    Madhumita Sengupta, J. K. Mandal in Emerging ICT for Bridging the Future - Pro… (2015)

  4. No Access

    Chapter and Conference Paper

    KSOFM Network Based Neural Key Generation for Wireless Communication

    In this paper a single layer perceptron (KSOFM Network) based neural key generation for encryption/decryption for wireless communication has been proposed. Identical KSOFM network has been used in both sender ...

    Madhumita Sengupta, J. K. Mandal in Proceedings of the 3rd International Confe… (2015)

  5. No Access

    Chapter and Conference Paper

    Color Image Authentication through Visible Patterns (CAV)

    In this paper a copyright protection technique based on visual patterns (CAV) has been proposed for color image. This technique manipulates bits of color image to hide the hash of secret without embedding secr...

    Madhumita Sengupta, J. K. Mandal in ICT and Critical Infrastructure: Proceedin… (2014)