Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Coverless Steganography: A Comprehensive Study on Concealing Data Without a Cover Medium

    This study examines the concept of coverless steganography, a method employed for the purpose of concealing information without relying on a traditional cover medium. This statement underscores the importance ...

    Pabak Indu, Mousumi Dutta, Parichay Nandi in Proceedings of 4th International Conferenc… (2024)

  2. No Access

    Article

    Energetic, environmental and economic assessment of multi-evaporator CO2–NH3 cascade refrigeration system for seafood application

    Refrigeration plays a vital role in ensuring quality and safety of seafood. In a tropical country like India, the seafood industry has a relatively larger cooling load throughout the supply chain due to higher...

    Santosh Kumar Saini, Mani Sankar Dasgupta in Journal of Thermal Analysis and Calorimetry (2023)

  3. No Access

    Chapter and Conference Paper

    Natural Refrigerant Based Cascade System for Seafood Application

    Refrigeration plays a vital role to ensure quality and safety of seafood. In a tropical country like India, the seafood industry has relatively larger cooling load throughout the supply chain due to higher tem...

    Santosh Kumar Saini, Mani Sankar Dasgupta in Fluid Mechanics and Fluid Power (Vol. 2) (2023)

  4. No Access

    Chapter and Conference Paper

    A Pioneer Image Steganography Method Using the SOD Algorithm

    Steganography is a technology that has gained popularity in recent years as people’s fears and susceptibilities have increased in today’s digital environment. As a result of this work, we have shed light on th...

    Pabak Indu, Sabyasachi Samanta in Intelligent Systems and Human Machine Coll… (2023)

  5. No Access

    Article

    Comparative investigation of low GWP pure fluids as potential refrigerant options for a cascade system in seafood application

    The world is conscious about contribution to global warming from refrigeration and air-conditioning sector. A search is ongoing for energy-efficient refrigeration systems and environment-friendly refrigerants....

    Santosh Kumar Saini, Mani Sankar Dasgupta in Mitigation and Adaptation Strategies for G… (2022)

  6. No Access

    Chapter and Conference Paper

    Randomised Key Selection and Encryption of Plaintext Using Large Primes

    Study of ciphertext plays a major role in Cryptanalysis. Functionally correct realization of a cryptosystem does not ensure the confidentiality of message always. Most classical cryptosystem are not quantum se...

    Soumen Das, Souvik Bhattacharyya in Internet of Things and Connected Technolog… (2022)

  7. No Access

    Chapter and Conference Paper

    Hiding IoT Communication Using DCT Difference Modulation (DCTDM)

    In the past few decades, the involvement of the Internet and technologies has become an integral part of our life. From morning till evening, we come across many automated devices which are connected via the I...

    Pabak Indu, Souvik Bhattacharyya in Advances in Medical Physics and Healthcare Engineering (2021)

  8. No Access

    Chapter and Conference Paper

    Real-Time Watermarking of Medical Images and Secure Transmission Through Steganography

    Medical images and reports are highly confidential information and should not be leaked, or modified in any circumstances. Healthcare organizations constantly face cyber-attacks with the motive of stealing med...

    Ajay Biswas, Pabak Indu in Advances in Medical Physics and Healthcare… (2021)

  9. No Access

    Chapter and Conference Paper

    Studies on Performance Improvement of an R744 Transcritical Refrigeration System Using Dedicated Mechanical Subcooling

    Due to low critical temperature, the performance of a conventional, single-stage R744-based transcritical refrigeration cycle drops drastically when the heat sink temperature is high. However, the performance ...

    Mihir Mouchum Hazarika, Maddali Ramgopal in Advances in Air Conditioning and Refrigera… (2021)

  10. Article

    Open Access

    Dead cells release a ‘necrosignal’ that activates antibiotic survival pathways in bacterial swarms

    Swarming is a form of collective bacterial motion enabled by flagella on the surface of semi-solid media. Swarming populations exhibit non-genetic or adaptive resistance to antibiotics, despite sustaining cons...

    Souvik Bhattacharyya, David M. Walker, Rasika M. Harshey in Nature Communications (2020)

  11. No Access

    Chapter

    Early Work Vis-à-Vis Current Trends in Internet of Things Security

    IoT has contributed heavily in the growth of Internet with its versatile applications. The IoT devices act as a bridge between the digital world and the real world. Therefore, the previous embankment of securi...

    Pabak Indu, Souvik Bhattacharyya in Innovations in Cybersecurity Education (2020)

  12. No Access

    Article

    Transient analysis of subcritical/supercritical carbon dioxide based natural circulation loop with end heat exchangers: experimental study

    Carbon dioxide (CO2) based natural circulation loops (NCLs) has gained attention due to its compactness with higher heat transfer rate. In the present study, experimental investigations have been carried out to c...

    Ajay Kumar Yadav, Maddali Ramgopal, Souvik Bhattacharyya in Heat and Mass Transfer (2017)

  13. No Access

    Article

    Computational fluid dynamic analysis of a supercritical CO2 based natural circulation loop with end heat exchangers

    Steady state simulation of a 3D model of supercritical CO2 based natural circulation loop with end heat exchangers has been carried out employing the commercial CFD (computational fluid dynamics) code, FLUENT. Th...

    Ajay Kumar Yadav, M. Ram Gopal in International Journal of Advances in Engin… (2012)

  14. No Access

    Article

    Do bacteria age?

    Aging, a progressive deterioration of the physical functions necessary for survival and fertility, resulting from deleterious changes, is one of the most fundamental features of Eukaryotes. Bacteria are though...

    Souvik Bhattacharyya in Resonance (2012)

  15. No Access

    Chapter and Conference Paper

    Text Steganography through Quantum Approach

    Steganography maintain the security of the secret data through a communication channel, which causing attempts to break and reveal the original messages. In this paper, a text steganography technique has been ...

    Indradip Banerjee, Souvik Bhattacharyya in Wireless Networks and Computational Intell… (2012)

  16. No Access

    Chapter and Conference Paper

    A Novel Approach of Video Steganography Using PMM

    Steganography is an emerging area, used for secured data transmission trough any public media. Different researcher’s developed newer steganographic techniques. This paper proposes a novel video steganography ...

    Souvik Bhattacharyya, Gautam Sanyal in Wireless Networks and Computational Intelligence (2012)

  17. No Access

    Article

    Rewetting analysis of hot surfaces with internal heat source by the heat balance integral method

    A two region conduction-controlled rewetting model of hot vertical surfaces with internal heat generation and boundary heat flux subjected to constant but different heat transfer coefficient in both wet and dr...

    S. K. Sahu, P. K. Das, Souvik Bhattacharyya in Heat and Mass Transfer (2008)