Sudipta Kumar Ghosal

Orcid: 0000-0002-8697-0803

According to our database1, Sudipta Kumar Ghosal authored at least 18 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
emapDiffP: A novel learning algorithm for convolutional neural network optimization.
Neural Comput. Appl., July, 2024

2023
Image steganography based on difference of Gaussians edge detection.
Multim. Tools Appl., November, 2023

DiffMoment: an adaptive optimization technique for convolutional neural network.
Appl. Intell., July, 2023

2022
A secured image steganography method based on ballot transform and genetic algorithm.
Multim. Tools Appl., November, 2022

Stego-chain: A framework to mine encoded stego-block in a decentralized network.
J. King Saud Univ. Comput. Inf. Sci., 2022

2021
Image steganography using deep learning based edge detection.
Multim. Tools Appl., 2021

Secured image steganography based on Catalan transform.
Multim. Tools Appl., 2021

Image steganography based on Kirsch edge detection.
Multim. Syst., 2021

A two-phase gradient based feature embedding approach.
J. Inf. Secur. Appl., 2021

Application of Lah transform for security and privacy of data through information hiding in telecommunication.
Trans. Emerg. Telecommun. Technol., 2021

Exploiting Laguerre transform in image steganography.
Comput. Electr. Eng., 2021

2020
Extended exploiting modification direction based steganography using hashed-weightage Array.
Multim. Tools Appl., 2020

LSB based steganography with OCR: an intelligent amalgamation.
Multim. Tools Appl., 2020

2019
Fuzzy edge detection based steganography using modified Gaussian distribution.
Multim. Tools Appl., 2019

On the use of the Stirling Transform in image steganography.
J. Inf. Secur. Appl., 2019

2018
High payload image steganography based on Laplacian of Gaussian (LoG) edge detector.
Multim. Tools Appl., 2018

2014
Binomial transform based fragile watermarking for image authentication.
J. Inf. Secur. Appl., 2014

2012
Separable Discrete Hartley Transform Based Invisible Watermarking for Color Image Authentication (SDHTIWCIA).
Proceedings of the Advances in Computing and Information Technology - Proceedings of the Second International Conference on Advances in Computing and Information Technology (ACITY) July 13-15, 2012, Chennai, India, 2012


  Loading...