default search action
Sudipta Kumar Ghosal
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Shubhankar Bhakta, Utpal Nandi, Chiranjit Changdar, Sudipta Kumar Ghosal, Rajat Kumar Pal:
emapDiffP: A novel learning algorithm for convolutional neural network optimization. Neural Comput. Appl. 36(20): 11987-12010 (2024) - 2023
- [j16]Shubhankar Bhakta, Utpal Nandi, Tapas Si, Sudipta Kumar Ghosal, Chiranjit Changdar, Rajat Kumar Pal:
DiffMoment: an adaptive optimization technique for convolutional neural network. Appl. Intell. 53(13): 16844-16858 (2023) - [j15]Biswajit Patwari, Utpal Nandi, Sudipta Kumar Ghosal:
Image steganography based on difference of Gaussians edge detection. Multim. Tools Appl. 82(28): 43759-43779 (2023) - 2022
- [j14]Proton Sarkar, Sudipta Kumar Ghosal, Madhulina Sarkar:
Stego-chain: A framework to mine encoded stego-block in a decentralized network. J. King Saud Univ. Comput. Inf. Sci. 34(8 Part A): 5349-5365 (2022) - [j13]S. K. Sabbir Hossain, Souradeep Mukhopadhyay, Biswarup Ray, Sudipta Kumar Ghosal, Ram Sarkar:
A secured image steganography method based on ballot transform and genetic algorithm. Multim. Tools Appl. 81(27): 38429-38458 (2022) - 2021
- [j12]Sudipta Kumar Ghosal, Souradeep Mukhopadhyay, S. K. Sabbir Hossain, Ram Sarkar:
Exploiting Laguerre transform in image steganography. Comput. Electr. Eng. 89: 106964 (2021) - [j11]Sudipta Kumar Ghosal, Souradeep Mukhopadhyay, S. K. Sabbir Hossain, Ram Sarkar:
Application of Lah transform for security and privacy of data through information hiding in telecommunication. Trans. Emerg. Telecommun. Technol. 32(2) (2021) - [j10]Agneet Chatterjee, Soulib Ghosh, Anuran Chakraborty, Sudipta Kumar Ghosal, Ram Sarkar:
A two-phase gradient based feature embedding approach. J. Inf. Secur. Appl. 61: 102898 (2021) - [j9]Sudipta Kumar Ghosal, Agneet Chatterjee, Ram Sarkar:
Image steganography based on Kirsch edge detection. Multim. Syst. 27(1): 73-87 (2021) - [j8]Souradeep Mukhopadhyay, S. K. Sabbir Hossain, Sudipta Kumar Ghosal, Ram Sarkar:
Secured image steganography based on Catalan transform. Multim. Tools Appl. 80(9): 14495-14520 (2021) - [j7]Biswarup Ray, Souradeep Mukhopadhyay, S. K. Sabbir Hossain, Sudipta Kumar Ghosal, Ram Sarkar:
Image steganography using deep learning based edge detection. Multim. Tools Appl. 80(24): 33475-33503 (2021) - 2020
- [j6]Agneet Chatterjee, Sudipta Kumar Ghosal, Ram Sarkar:
LSB based steganography with OCR: an intelligent amalgamation. Multim. Tools Appl. 79(17-18): 11747-11765 (2020) - [j5]Shaswata Saha, Anuran Chakraborty, Agneet Chatterjee, Souvik Dhargupta, Sudipta Kumar Ghosal, Ram Sarkar:
Extended exploiting modification direction based steganography using hashed-weightage Array. Multim. Tools Appl. 79(29-30): 20973-20993 (2020)
2010 – 2019
- 2019
- [j4]Sudipta Kumar Ghosal, Jyotsna Kumar Mandal:
On the use of the Stirling Transform in image steganography. J. Inf. Secur. Appl. 46: 320-330 (2019) - [j3]Souvik Dhargupta, Anuran Chakraborty, Sudipta Kumar Ghosal, Shaswata Saha, Ram Sarkar:
Fuzzy edge detection based steganography using modified Gaussian distribution. Multim. Tools Appl. 78(13): 17589-17606 (2019) - 2018
- [j2]Sudipta Kumar Ghosal, Jyotsna Kumar Mandal, Ram Sarkar:
High payload image steganography based on Laplacian of Gaussian (LoG) edge detector. Multim. Tools Appl. 77(23): 30403-30418 (2018) - 2014
- [j1]Sudipta Kumar Ghosal, Jyotsna Kumar Mandal:
Binomial transform based fragile watermarking for image authentication. J. Inf. Secur. Appl. 19(4-5): 272-281 (2014) - 2012
- [c1]Jyotsna Kumar Mandal, Sudipta Kumar Ghosal:
Separable Discrete Hartley Transform Based Invisible Watermarking for Color Image Authentication (SDHTIWCIA). ACITY (2) 2012: 767-776
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint