Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Authentication in Higher Region of Convergence of Z Transform Domain (AHRocZ)

    In this paper a novel technique for authentication has been proposed in composite real and imaginary components of Z transform domain in higher region of convergence

    Suman Mahapatra, J. K. Mandal in Information Systems Design and Intelligent… (2015)

  2. No Access

    Chapter and Conference Paper

    Image Authentication in Frequency Domain through G-Let Dihedral Group (IAFD-D3)

    In this paper a G-Let based authentication technique has been proposed to authenticate digital documents by embedding a secret image/message inside the cover image in frequency domain. Cover image is transform...

    Madhumita Sengupta, J. K. Mandal in Emerging ICT for Bridging the Future - Pro… (2015)

  3. No Access

    Chapter and Conference Paper

    KSOFM Network Based Neural Key Generation for Wireless Communication

    In this paper a single layer perceptron (KSOFM Network) based neural key generation for encryption/decryption for wireless communication has been proposed. Identical KSOFM network has been used in both sender ...

    Madhumita Sengupta, J. K. Mandal in Proceedings of the 3rd International Confe… (2015)

  4. No Access

    Chapter and Conference Paper

    Color Image Authentication through Visible Patterns (CAV)

    In this paper a copyright protection technique based on visual patterns (CAV) has been proposed for color image. This technique manipulates bits of color image to hide the hash of secret without embedding secr...

    Madhumita Sengupta, J. K. Mandal in ICT and Critical Infrastructure: Proceedin… (2014)