Biswapati Jana
Orcid: 0000-0003-4476-3459
According to our database1,
Biswapati Jana
authored at least 51 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
A cellular automata based secured reversible data hiding scheme for dual images using bit-reversal permutation technique.
Comput. Stand. Interfaces, 2025
2024
Vis. Comput., May, 2024
Reversible data hiding strategy exploiting circular distance interpolation utilizing optimal pixel adjustment with error substitution.
Multim. Tools Appl., May, 2024
Reference pixel-based reversible data hiding scheme using multi-level pixel value ordering.
Multim. Tools Appl., February, 2024
Robust data hiding scheme for highly compressed image exploiting btc with hamming code.
Multim. Tools Appl., January, 2024
A Dual-Image Based Secured Reversible Data Hiding Scheme Exploiting Weighted Matrix and Cellular Automata.
Proceedings of the Cellular Automata Technology - Third Asian Symposium, 2024
2023
Soft Comput., April, 2023
Aspect based sentiment analysis using multi-criteria decision-making and deep learning under COVID-19 pandemic in India.
CAAI Trans. Intell. Technol., March, 2023
Serious games applied to the study of the "Substance Structure and Atom" units in chemistry.
Proceedings of the 12th International Conference on Awareness Science and Technology, 2023
Dual-image reversible data hiding based on encoding the numeral system of concealed information.
Proceedings of the 15th International Conference on Advanced Computational Intelligence, 2023
A Novel Approach of Fragile Watermarking for Authentication and Tamper Detection Exploiting Local Binary Pattern (LBP).
Proceedings of the Computational Intelligence in Communications and Business Analytics, 2023
2022
Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic.
J. King Saud Univ. Comput. Inf. Sci., November, 2022
Superpixel based robust reversible data hiding scheme exploiting Arnold transform with DCT and CA.
J. King Saud Univ. Comput. Inf. Sci., 2022
Two-layers robust data hiding scheme for highly compressed image exploiting AMBTC with difference expansion.
J. King Saud Univ. Comput. Inf. Sci., 2022
J. Inf. Secur. Appl., 2022
Inf. Secur. J. A Glob. Perspect., 2022
Application of fuzzy logic based GA and PSO to solve 4D multi-item transportation problem for substitute and complementary items.
Evol. Intell., 2022
Robust data hiding scheme through distinct keypoint selection exploiting modified Bilateral-Laplacian SIFT with encoding pipeline.
Displays, 2022
A Secure Image Watermarking Technique Using Chinese Remainder Theorem in Integer Wavelet Transformation Domain.
Proceedings of the Computational Intelligence in Communications and Business Analytics, 2022
Fake News Identification Through Natural Language Processing and Machine Learning Approach.
Proceedings of the Computational Intelligence in Communications and Business Analytics, 2022
A Dual Image Based Data Hiding Scheme Based on Difference of Pixel Values in Integer Wavelet Transform Domain.
Proceedings of the Computational Intelligence in Communications and Business Analytics, 2022
Proceedings of the Computational Intelligence in Communications and Business Analytics, 2022
2021
An Image Authentication and Tampered Detection Scheme Exploiting Local Binary Pattern Along with Hamming Error Correcting Code.
Wirel. Pers. Commun., 2021
A secure reversible color image watermarking scheme based on LBP, lagrange interpolation polynomial and weighted matrix.
Multim. Tools Appl., 2021
Improved center-folding based directional pixel value ordering for reversible data hiding scheme.
Multim. Tools Appl., 2021
J. Interconnect. Networks, 2021
Improving the Reversible LSB Matching Scheme Based on the Likelihood Re-Encoding Strategy.
Entropy, 2021
Interpolation based reversible hiding scheme by using center folding strategy and adjusting hiding operator.
Proceedings of the 2021 International Conference on Technologies and Applications of Artificial Intelligence, 2021
Proceedings of the 2021 International Conference on Technologies and Applications of Artificial Intelligence, 2021
2020
Application of fuzzy programming techniques to solve solid transportation problem with additional constraints.
Oper. Res. Decis., 2020
J. Inf. Secur. Appl., 2020
Application of random triangular and Gaussian type-2 fuzzy variable to solve fixed charge multi-item four dimensional transportation problem.
Appl. Soft Comput., 2020
Robust Watermarking Scheme for Compressed Image Through DCT Exploiting Superpixel and Arnold Transform.
Proceedings of the Sixth International Conference on Mathematics and Computing, 2020
Proceedings of the Sixth International Conference on Mathematics and Computing, 2020
Proceedings of the Sixth International Conference on Mathematics and Computing, 2020
2019
Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image.
Secur. Priv., 2019
Multim. Tools Appl., 2019
A Novel Method for High Capacity Reversible Data Hiding Scheme Using Difference Expansion.
Int. J. Nat. Comput. Res., 2019
IET Image Process., 2019
2018
Linear-feedback shift register-based multi-ant cellular automation and chaotic map-based image encryption.
Secur. Priv., 2018
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
Multim. Tools Appl., 2018
Reversible data hiding scheme using sub-sampled image exploiting Lagrange's interpolating polynomial.
Multim. Tools Appl., 2018
Proceedings of the Mathematics and Computing - 4th International Conference, 2018
2017
Multim. Tools Appl., 2017
A New Dual Image-Based Steganographic Scheme for Authentication and Tampered Detection Using (7, 4) Hamming Code.
Proceedings of the Information Technology and Applied Mathematics - ICITAM 2017, Haldia, Purba Medinipur, West Bengal, India, October 30, 2017
Proceedings of the Computational Intelligence, Communications, and Business Analytics, 2017
2016
Dual-Image Based Reversible Data Hiding Scheme Using Pixel Value Difference Expansion.
Int. J. Netw. Secur., 2016
2015
Proceedings of the Sixth International Conference on Computer and Communication Technology 2015, 2015
2010
Proceedings of the Information Security and Assurance - 4th International Conference, 2010