| Context Pixel-based Reversible Data Hiding Scheme using
Pixel Value Ordering | International | The Visual Computer | Jul, 2023 | Springer | Co-Author,Corresponding Author | Impact Factor: 3.50000Indexing: SCOPUS, SCIEArticle's Web Link: |
| Reference Pixel-Based Reversible Data Hiding Scheme Using Multi-Level Pixel Value Ordering | International | Multimedia Tools and Applications, Springer | Jul, 2023 | Springer | Co-Author,Corresponding Author | Impact Factor: 3.60000Indexing: SCOPUS, SCIEArticle's Web Link: |
| Robust Data Hiding Scheme for Highly Compressed Image Exploiting BTC with Hamming Code | International | Multimedia Tools and Applications
10.1007/s11042-023-15727-w | Apr, 2023 | Springer | Co-Author,Corresponding Author | Impact Factor: 3.60000Indexing: SCOPUS, SCIEArticle's Web Link: |
| Fuzzy Proximity based Robust Data Hiding
Scheme with Interval Threshold | International | Soft Computing | Oct, 2022 | Springer | Corresponding Author | Impact Factor: 3.73200Indexing: SCIArticle's Web Link: https://doi.org/10.1007/s00500-022-07552-4 |
| Aspect based sentiment analysis using multi-criteria decision-making and deep learning under COVID-19 pandemic in India | International | CAAI Transactions on Intelligence Technology | Oct, 2022 | The Institute of Engineering and Technology | Co-Author | Impact Factor: 7.98500Indexing: SCOPUSArticle's Web Link: https://doi.org/10.1049/cit2.12144 |
| Reversible Data Hiding Scheme
Exploiting Center Folding with Fuzzy Weight Strategy | International | Journal of Information Security and Applications (JISA) , Volume 69, September 2022, 103276 | Jul, 2022 | Elsevier | Corresponding Author | Impact Factor: 4.96000Indexing: SCIArticle's Web Link: https://doi.org/10.1016/j.jisa.2022.103276 |
| A Dual Image Based Data Hiding Scheme Based on Difference of Pixel Values in Integer Wavelet Transform Domain | International | CICBA | Jul, 2022 | Springer | | Impact Factor: 0.00000Indexing: Article's Web Link: |
| Robust data hiding scheme through distinct keypoint selection exploiting modified Bilateral-Laplacian SIFT with encoding pipeline | International | Displays 74(1):102268 | Jul, 2022 | Elsevier | Corresponding Author | Impact Factor: 3.07400Indexing: SCOPUS, SCIArticle's Web Link: 10.1016/j.displa.2022.102268 |
| Application of type-2 defuzzification method to solve profit
maximization solid transportation problem considering carbon emission | International | International
Journal of Information and Management Sciences (IJIMS) | Jun, 2022 | International
Journal of Information and Management Sciences (IJIMS) | Corresponding Author | Impact Factor: 0.00000Indexing: SCOPUSArticle's Web Link: |
| Fuzzy Logic with Superpixel-Based Block Similarity Measures for Secured Data Hiding Scheme | International | https://doi.org/10.1007/978-981-19-0105-8_44 | Jun, 2022 | Lecture Notes in Networks and Systems, vol 404. Springer, Singapore. https://doi.org/10.1007/978-981-19-0105-8_44 | Corresponding Author | Impact Factor: 0.00000Indexing: SCOPUSArticle's Web Link: https://doi.org/10.1080/19393555.2021.1956023 |
| Two-layers robust data hiding
scheme for highly compressed image exploiting AMBTC with difference expansion | International | Journal of King Saud University - Computer and Information Sciences
Volume 34, Issue 8, Part A, September 2022, Pages 5240-5260 | May, 2022 | Elsevier | Corresponding Author | Impact Factor: 9.00600Indexing: SCOPUS, SCIArticle's Web Link: https://doi.org/10.1016/j.jksuci.2022.05.013 |
| Active Queue Management in RED Considering
Critical Point on Target Queue | International | Journal of Interconnection Networks, Vol. 21, No. 03, 2150017 (2021) | Sep, 2021 | World Scientific Publishing Co Pte Ltd | Co-Author | Impact Factor: 0.00000Indexing: SCOPUSArticle's Web Link: https://doi.org/10.1142/S0219265921500171 |
| A new DCT based robust image watermarking scheme using cellular automata | International | Information Security Journal: A Global Perspective
Volume 31, 2022 - Issue 5 | Aug, 2021 | Taylor and Francis | Corresponding Author | Impact Factor: 0.00000Indexing: SCOPUSArticle's Web Link: https://doi.org/10.1080/19393555.2021.1956023 |
| FCSTP with possibility and expected value approaches in hybrid uncertain environments | International | TWMSJournal Of Applied And Engineering Mathematics, 11(4), 998-1011. | Jul, 2021 | TWMS Journal Of Applied And Engineering Mathematics | Co-Author | Impact Factor: 0.00000Indexing: SCOPUSArticle's Web Link: https://hdl.handle.net/11729/3249 http://jaem.isikun.edu.tr/web/index.php/archive/113-vol11-no4/759 |
| Application of Fuzzy Logic based GA and PSO to solve 4D Multi-item transportation problem for substitute and complementary items | International | Evolutionary Intelligence , 15, pages 2187–2206 (2022) | Jun, 2021 | Springer | Corresponding Author | Impact Factor: 2.57700Indexing: SCOPUS, SCIArticle's Web Link: https://doi.org/10.1007/s12065-021-00630-w |
| An Image Authentication and Tampered Detection Scheme Exploiting Local Binary Pattern Along with Hamming Error Correcting Code | International | Wireless Personal Communications | Issue 1/2021 | Jun, 2021 | Springer | Corresponding Author | Impact Factor: 0.00000Indexing: SCOPUSArticle's Web Link: https://www.springerprofessional.de/en/an-image-authentication-and-tampered-detection-scheme-exploiting/19291660 |
| Application of fuzzy logic based GA and PSO to solve 4D multi-item transportation problem for substitute and complementary items | International | Evolutionary Intelligence volume 15, pages 2187–2206 (2022) | Jun, 2021 | Springer Nature | Co-Author,Corresponding Author | Impact Factor: 2.60000Indexing: SCOPUS, SCIEArticle's Web Link: https://doi.org/10.1007/s12065-021-00630-w |
| Improving the Reversible LSB MatchingScheme Based on the Likelihood Re-encoding Strategy | International | Entropy, 23(5), 577. | May, 2021 | Entropy | Co-Author | Impact Factor: 2.52400Indexing: SCOPUSArticle's Web Link: https://doi.org/10.3390/e23050577 |
| A secure reversible color image watermarking scheme based on LBP, lagrange interpolation polynomial and weighted matrix | International | Multimedia Tools and Applications | Mar, 2021 | Springer | Corresponding Author | Impact Factor: 2.57700Indexing: SCOPUS, SCIArticle's Web Link: https://doi.org/10.1007/s11042-021-10651-3 |
| A Novel Data Hiding Technique Based on
QR Code Decomposition in Transform Domain | International | CIPR-2021 | Jan, 2021 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| A Nobel Congestion Control Algorithm Using Buffer
Occupancy RED | International | CIPR-2021 | Jan, 2021 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| Application of Dynamic Weight
with Distance to Reduce Packet Loss in RED based Algorithm | International | EAIT-2020 | Jan, 2021 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| Comparative analysis of bio-
inspired dragonfly and honeybee algorithm-based routing protocols with the ant colony
algorithm for MANET | International | EAIT-2020 | Jan, 2021 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| A Predictable Active Queue Management to Reduce Sensitivity of RED Parameter | International | International Journal of Engineering &Technology | Dec, 2020 | Science Publishing Corporation, Dubai, UAE | | Impact Factor: 0.00000Indexing: Article's Web Link: |
| Multi-Sensor Tracking Simulator Design and its
Challenges | International | Conference Proceeding | Jan, 2020 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| A New Repeated Pixel Value Difference-Based Steganographic Scheme with Overlapped Pixel | International | Intelligent Computing: Image Processing Based Applications, | Jan, 2020 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| Robust
Watermarking scheme for compressed image through DCT exploiting Superpixel and
Arnold transform | International | Conference Proceeding | Jan, 2020 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| Data Hiding Based on
Decagon-Shaped Shell | International | Advances in Intelligent Systems and Computing | Jan, 2020 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| A New Efficient Swarm-based
Routing Protocol for MANET Exploiting DRAGONFLY with HONEY BEE | International | VCIPECH-2020 | Jan, 2020 | KIET Group of Institutions Ghaziabad | | Impact Factor: Indexing: Article's Web Link: |
| Authentication
on Interpolated Sub-Sampled based Image Steganography Exploiting Secret Sharing. | International | Conference Proceeding | Jan, 2020 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| Application of random triangular and Gaussian
type-2 fuzzy variable to solve fixed charge multi-item four-dimensional transportation
problem | International | Applied Soft Computing | Jan, 2020 | Elsevier | | Impact Factor: Indexing: Article's Web Link: |
| High Payload RDH Through Directional PVO Exploiting Center-
Folding Strategy. | International | Conference Proceeding | Jan, 2020 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| Improved center-folding based directional pixel value
ordering for reversible data hiding scheme | International | Multimedia Tools and Applications | Jan, 2020 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| A
Robust Audio Authentication Scheme Using (11,7) Hamming Error Correcting Code. | International | Conference Proceeding | Jan, 2020 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| Improved center folding based directional pixel value
ordering for reversible data hiding scheme | International | Multimedia Tools and Applications | Jan, 2020 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| Multiple Radar Data Fusion to Improve the Accuracy in Position Measurement Basedon K-means Algorithm | International | Conference Proceeding | Jan, 2020 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| Superpixel based Robust Reversible
Data Hiding Scheme Exploiting Arnold Transform with DCT and CA | International | Journal
of King Saud University - Computer and Information Sciences | Jan, 2020 | Elsevier | | Impact Factor: Indexing: Article's Web Link: |
| Hiding data in dual color images reversibly via weighted matrix | International | Journal of Information Security and Applications,50,2020 | Jan, 2020 | Elsevier | | Impact Factor: Indexing: Article's Web Link: |
| Center-Symmetric
Local Binary Pattern-Based Image Authentication Using Local and Global Features
Vector. | International | Advances in Intelligent Systems and Computing | Jan, 2020 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| A Survey to Analyse
Routing Algorithms for Opportunistic Network | International | Procedia Computer Science | Jan, 2020 | Elsevier | | Impact Factor: Indexing: Article's Web Link: |
| Weighted matrix based random data hiding scheme within a pair of interpolated image | International | Conference Proceeding | Jan, 2020 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| Application of fuzzy programming techniques to solve solid transportation problem with additional constraints | International | Operations Research And Decisions | Jan, 2020 | Operations Research And Decisions | | Impact Factor: Indexing: Article's Web Link: |
| Pixel Value Ordering with Prediction Error Expansion Based High Fidelity Reversible Data Hiding Scheme | International | International Journal of Applied Engineering Research (IJAER), 14(4), (2019) pp. 998-1006 | Jan, 2019 | IJAER, (UGC Approved) | | Impact Factor: Indexing: Article's Web Link: |
| Fake Image and News Detection on Social Media ThroughTrust-ware Based Community Portal | International | Conference Proceeding | Jan, 2019 | YSC-2019 | | Impact Factor: Indexing: Article's Web Link: |
| Robust Watermarking Scheme for Tamper
Detection and Authentication Exploiting Cellular Automata | International | IET Image Processing, IEEE, DOI: 10.1049/iet-ipr.2018.6638 | Jan, 2019 | IEEE | | Impact Factor: Indexing: Article's Web Link: |
| Watermarking Scheme using LBP for Image Authentication and Tamper Detection through dual image | International | Security and Privacy, Wiley Online Library | Jan, 2019 | Wiley Online Library | | Impact Factor: Indexing: Article's Web Link: |
| LFSR-based Multi-ant Cellular Automation and Chaotic Map based Image Encryption | International | Security and Privacy, Wiley Online Library, 1(6), e52 | Jan, 2019 | Wiley Online Library. | | Impact Factor: Indexing: Article's Web Link: |
| A robust reversible data hiding scheme for Color Image using Reed-Solomon Code | International | Multimedia Tools and Application (MTA), Springer, 2019 | Jan, 2019 | Springer, (IF-1.541) | | Impact Factor: Indexing: Article's Web Link: |
| A Novel Method for High Capacity Reversible Data Hiding Scheme Using Difference Expansion | International | International Journal of Natural Computing Research (IJNCR), IGI Global. | Jan, 2019 | IGI Global. | | Impact Factor: Indexing: Article's Web Link: |
| Directional Pixel Value Ordering Based Secret Sharing Using Sub-Sampled Image Exploiting Lagrange Polynomial | International | DOI :10.1007/s42452-019-0659-1, SN Applied Sciences, Springer | Jan, 2019 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| A Method of Building Ontology Based Information knowledgebase | International | International Journal of Computer Sciences and Engineering (IJCSE), 7(1), Jan 2019 | Jan, 2019 | IJCSE, (UGC Approved) | | Impact Factor: Indexing: Article's Web Link: |
| FC 4D MITPs in Crisp and Rough Environments for Substitutable and Complementary Items with Budget Constraints | International | MDPI-mathematics. Mathematics 7, no. 3 (2019): 281, IF-1.105 (SCI Journal) | Jan, 2019 | MDPI | | Impact Factor: Indexing: Article's Web Link: |
| Analysis of Factors and their Impacts in Measurement Accuracy and Prioritization of Radars | International | International Journal of Research and Analytical Reviews (IJRAR),, Vol-5, Issue-4, December 2018, pp- 548-554. (UGC Approved). | Jan, 2018 | IJRAR | | Impact Factor: Indexing: Article's Web Link: |
| Copy Move Forgery Detection through Graph Neighborhood Degree | International | International Journal of Applied Engineering Research (IJAER), 13(18), pp. 13421-13427 | Jan, 2018 | IJAER, (UGC Approved) | | Impact Factor: Indexing: Article's Web Link: |
| Secured Steganographic Scheme For Highly Compressed Color Image Using Weighted Matrix Through DCT | International | International Journal of Computers and Applications (IJCA) | Jan, 2018 | Taylor & Francis | | Impact Factor: Indexing: Article's Web Link: |
| Weighted matrix based reversible watermarking scheme using color image | International | Multimedia Tools and Application (MTA), Springer | Jan, 2018 | Springer (IF-1.530) | | Impact Factor: Indexing: Article's Web Link: |
| Directional PVO for Reversible Data Hiding Scheme withImage Interpolation | International | Multimedia Tools and Application (MTA), Springer | Jan, 2018 | Springer (IF-1.530) | | Impact Factor: Indexing: Article's Web Link: |
| Improved data hiding capacity through repeated embedding using modified weighted matrix for color image | International | International Journal of Computers and Applications (IJCA) | Jan, 2018 | Taylor and Francis | | Impact Factor: Indexing: Article's Web Link: |
| Analysis of Factors and their Impacts in Measurement Accuracy and Prioritization of Radars | International | International Journal of Research and Analytical Reviews (IJRAR), 5(4), December 2018 | Jan, 2018 | IJRAR, (UGC Approved) | | Impact Factor: Indexing: Article's Web Link: |
| Hamming code based watermarking scheme for Image Authentication andTampered detection | International | Proceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) will be held in Haldia, India during November 2-3, 2017 | Jan, 2017 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| Reversible Watermarking Scheme Using PVD-DE | International | Proceedings of the International Conference at Calcutta Business School, Kolkata on March 24-25, 2017 | Jan, 2017 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| Representation and Exploring the Semantic Organization of Bangla Word in theMental Lexicon: Evidence from Cross-modal Priming Experiments and VectorSpace Model | International | Proceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) was held in Haldia, India during November 2-3, 2017 | Jan, 2017 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| Extended Directional IPVO for Reversible Data Hiding Scheme | International | Proceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) was held in Haldia, India during November 2-3, 2017 | Jan, 2017 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| High Capacity Reversible Data Hiding Scheme Using Dual Color Image through(7, 4) Hamming Code | International | Proceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) was held in Haldia, India during November 2-3, 2017 | Jan, 2017 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| Exploring the semantic organization of Bangla words in the mental
lexicon | International | Procedia Computer Science 115 (2017) 556–562 | Jan, 2017 | Procedia Computer Science , Elsevier | | Impact Factor: Indexing: Article's Web Link: |
| Reversible Data Hiding Scheme Using Sub-Sampled ImageExploiting Lagrange’s Interpolating Polynomial | International | Multimedia Tools and Application (MTA), Springer. | Jan, 2017 | Springer (IF-1.530) | | Impact Factor: Indexing: Article's Web Link: |
| Dual-Image Based Reversible Data Hiding Scheme Using Pixel Value Difference Expansion | International | International Journal of Network Security, 18(04),633-643, DOI: 10.6633/IJNS.201607.18(4).04 | Jan, 2016 | IJNS | | Impact Factor: Indexing: Article's Web Link: |
| Dual Image based Reversible Data Hiding Scheme using Weighted Matrix | International | Int. J. of Electronics and Information Engineering, Vol.5, No.1, PP.6-19, Sept. 2016, DOI: 10.6636/IJEIE.201609.5(1).02) | Jan, 2016 | IJEIE | | Impact Factor: Indexing: Article's Web Link: |
| High payload reversible data hiding scheme using weighted matrix | International | Optik -International Journal for Light and Electron Optics, 127(6), 3347-3358, http://dx.doi.org/10.1016/j.ijleo.2015.12.055 | Jan, 2016 | Elsevier (Impact Factor: 0.677) | | Impact Factor: Indexing: Article's Web Link: |
| Dual Image Based Reversible Data Hiding Scheme Using (7,4) Hamming Code | International | Multimedia Tools and Application, Springer. 1-23 | Jan, 2016 | Springer (IF-1.530) | | Impact Factor: Indexing: Article's Web Link: |
| Dual Image based Reversible Data Hiding Scheme Using Pixel Value Difference With Exploiting Modification Direction | International | Proceedings of the First International Conference on Intelligent Computing and Communication Volume 458 of the series Advances in Intelligent Systems and Computing, Pages 549-557 | Jan, 2016 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| Partial reversible data hiding scheme using (7, 4) hamming code | International | Multimedia Tools and Application, Springer, 1-16 | Jan, 2016 | Springer (IF-1.530) | | Impact Factor: Indexing: Article's Web Link: |
| Dual Image Based Reversible Data Hiding Scheme Using Three Pixel Value Difference | International | Information Systems Design and Intelligent Applications Volume 434 of the series Advances in Intelligent Systems and Computing, Pages 403-412 | Jan, 2015 | AISC-Springer. | | Impact Factor: Indexing: Article's Web Link: |
| Hierarchical Visual Secret Sharing Scheme Using Steganography | International | Mathematics and Computing,Springer Proceedings in Mathematics & Statistics, Volume 139, pp 363-389, 2015 | Jan, 2015 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| Weighted Matrix Based Reversible Data Hiding Scheme Using Image Interpolation | International | Computational Intelligence in Data Mining—Volume 2
Volume 411 of the series Advances in Intelligent Systems and Computing pp 239-248 | Jan, 2015 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| An Efficient Data Hiding Scheme Using Hamming Error Correcting Code | International | Proceedings of the Sixth International Conference on Computer and Communication Technology (ICCCT '15), 2015, Pages 360-365. | Jan, 2015 | ACM digital library | | Impact Factor: Indexing: Article's Web Link: |
| An Efficient Weight Matrix based Reversible DataHiding Scheme | International | International Conference on Computers and Management (ICCM-2015), Jaipur (Rajasthan), India | Jan, 2015 | ACM | | Impact Factor: Indexing: Article's Web Link: |
| Reversible Data Hiding Through Hamming Code Using Dual Image | International | Proceedings of the International Congress on Information and Communication Technology, Volume 439 of the series Advances in Intelligent Systems and Computing, Pages 495-504 | Jan, 2015 | Springer (AISC). | | Impact Factor: Indexing: Article's Web Link: |
| Survey on Size Invariant Visual Cryptography | International | International Journal of Computer Science and Information Technologies, 5(3), 3985-3990 | Jan, 2014 | IJCST | | Impact Factor: Indexing: Article's Web Link: |
| Survey on Cheating and Prevention Techniques in Visual Cryptography | International | Mathematical Sciences International Research Journal, 3(Special Issue), 961-976 | Jan, 2014 | IMRF | | Impact Factor: Indexing: Article's Web Link: |
| Survey on Size Invariant Visual Cryptography | International | International Journal of Computer Science and Information Technologies, Volume 5, No. 3, pp 3985-3990, ISSN-0975-9646, 2014 | Jan, 2014 | Tech Science Publications | | Impact Factor: Indexing: Article's Web Link: |
| Cheating Prevention in Hierarchical Visual Secret Sharing Scheme using weight matrix-based Steganography | International | Mathematical Sciences International Research Journal, 3(2), 796-799 | Jan, 2014 | IMRF | | Impact Factor: Indexing: Article's Web Link: |
| Cheating Prevention in Hierarchical Visual Secret Sharing Scheme Using Weight Matrix-Based Steganography | International | Mathematical Sciences International Research Journal, Volume 3, No 2, ISSN-22788697, pp 796-799, 2014 | Jan, 2014 | International Multidisciplinary Research Foundation | | Impact Factor: Indexing: Article's Web Link: |
| Cheating Prevention In Visual Cryptographic Schemes Using Message Embedding: A Hardware Based Practical Approach | International | Proceedings of International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT-2014), pp 319 – 324, DOI: 10.1109/ICICICT.2014.6781300, 2014 | Jan, 2014 | IEEE | | Impact Factor: Indexing: Article's Web Link: |
| Key Distribution In Wireless Sensor Networks Using Quantum Cryptography | International | International Journal of Mobile
& Adhoc Network, Volume 3 Issue- 4, pp 250-256, ISSN 2231–6825, 2013 | Jan, 2013 | International forum of researchers Students and Academician (IFRSA) | | Impact Factor: Indexing: Article's Web Link: |
| Key Distribution in Wireless Sensor Networks using Quantum Cryptography | International | International Journal of Mobile & Adhoc Network, 3(4), 250-256. | Jan, 2013 | IJMAN | | Impact Factor: Indexing: Article's Web Link: |
| Image Steganography based on Cellular Automata | International | International Journal of Pure and Applied Mathematics, Volume 83, No 5, pp 701-715, ISSN-1311-8080, 2013 | Jan, 2013 | Academic Publications | | Impact Factor: Indexing: Article's Web Link: |
| Automatic Pitman Shorthand Script Recognition Using Fuzzy Rule Based Technique | National | ” National Seminar On Recent Trends in Advanced Computing Organized by the Department of Computer Science Vidyasagar University. | Jan, 2012 | Department of Computer Science Vidyasagar University. | | Impact Factor: Indexing: Article's Web Link: |
| New Image Noise Reduction Schemes Based on Cellular Automata | International | International Journal of Soft Computing and Engineering, Volume-2, Issue-2, pp 98-103, ISSN 2231-2707, 2012 | Jan, 2012 | Blue Eyes Intelligence Engineering & Sciences Publication | | Impact Factor: Indexing: Article's Web Link: |
| Parity based Image Steganography using Cellular Automata | National | Proceedings of National Seminar on Emerging Trends in Mathematics | Jan, 2012 | Vidyasagar University In collaboration with Calcutta Mathematical Society, Midnapore-721102, West Bengal | | Impact Factor: Indexing: Article's Web Link: |
| Cellular Automata for Image noise reduction using Neighbor pixel | National | Advanced Communication Systems and Design Techniques (NCACD-2011), pp. 130-137. | Jan, 2011 | Conference Proceeding, Department of ECE, Haldia Institute of Technology, Haldia | | Impact Factor: Indexing: Article's Web Link: |
| Text Classifiers and Performance Issues | National | Conference Proceeding of National Seminar on Data Mining & Decision Support, pp.51-59,Computer Centre, Vidyasagar University, Midnapore-721102. | Jan, 2010 | Computer Centre, Vidyasagar University. | | Impact Factor: Indexing: Article's Web Link: |
| A Cryptosystem For Encryption and Decryption of Long Confidential Message | International | Information Security and Assurance Communications in Computer and Information Science, Springer, Volume 76, pp 86-96, 2010 | Jan, 2010 | Springer | | Impact Factor: Indexing: Article's Web Link: |
| Object Extraction Using Novel Region Merging and Multidimensional Features | International | Fourth Pacific-Rim Symposium on Image and Video Technology (PSIVT), pp 356 – 361, Print ISBN: 978-1-4244-8890-2 , DOI: 10.1109/PSIVT.2010.66, 2010 | Jan, 2010 | IEEE | | Impact Factor: Indexing: Article's Web Link: |
| An Extension of Nave Bayes Classifier using Frequent Closed Item sets | National | Two days National Conference on “Ubiquitous Computing 2009”, Organized by R&D Cell of Guru Nanak Institute of Technology, 157/F, Nilgunj Road, Panihati, Sodpur, Kolkata-700114 | Jan, 2009 | GNIT, Sodpur, Kolkata | | Impact Factor: Indexing: Article's Web Link: |
| Expression and Pose Variant Face Image Identification Under Different Illumination Condition Using EBGM | National | Two days National Conference on “Ubiquitous Computing 2009”, Organized by R&D Cell of Guru Nanak Institute of Technology, 157/F, Nilgunj Road, Panihati, Sodpur, Kolkata-700114 | Jan, 2009 | GNIT, Sodpur, Kolkata | | Impact Factor: Indexing: Article's Web Link: |
| Recognition Of Partially Occluded, Expression Variant Faces Using Elastic Bunch Graph Matching | International | Proceedings of 1st IEEE-International Conference on Signal and Image Processing (IEEE-ICSIP-06), 2006 | Jan, 2006 | IEEE | | Impact Factor: Indexing: Article's Web Link: |
| A Scheme To Improve The Security Using Diffie-Helmann’s Key Distribution Scheme Coupling With RSA Algorithm | National | National Conference on Broad Band Integrated Digital Systems And Networks -2005, NIEC, Shatri Park, New Delhi-110053 | Jan, 2005 | NIEC, New Delhi. | | Impact Factor: Indexing: Article's Web Link: |
| A Hybrid System for Mood Recognition of Face Images using DS Theory and Fuzzy Logic | Other | Proceedings of the Workshop on Multimedia System & Communication, ISM, Dhanbad. | Jan, 2004 | ISM, Dhanbad | | Impact Factor: Indexing: Article's Web Link: |