default search action
Amit Phadikar
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j17]Baisakhi Sur Phadikar, Amit Phadikar, Subro S. Thakur:
A comprehensive assessment of content-based image retrieval using selected full reference image quality assessment algorithms. Multim. Tools Appl. 80(10): 15619-15646 (2021) - 2020
- [j16]Amit Phadikar, Himadri S. Mandal, Tien-Lung Chiu:
Parallel hardware implementation of data hiding scheme for quality access control of grayscale image based on FPGA. Multidimens. Syst. Signal Process. 31(1): 73-101 (2020) - [j15]Amit Phadikar, Himadri S. Mandal, Tien-Lung Chiu:
A novel QIM data hiding scheme and its hardware implementation using FPGA for quality access control of digital image. Multim. Tools Appl. 79(17-18): 12507-12532 (2020) - 2019
- [j14]Amit Phadikar, Poulami Jana, Himadri S. Mandal:
Reversible Data Hiding for DICOM Image Using Lifting and Companding. Cryptogr. 3(3): 21 (2019) - [j13]Amit Phadikar, Goutam Kumar Maity, Tien-Lung Chiu, Himadri S. Mandal:
FPGA Implementation of Lifting-Based Data Hiding Scheme for Efficient Quality Access Control of Images. Circuits Syst. Signal Process. 38(2): 847-873 (2019) - 2018
- [j12]Baisakhi Sur Phadikar, Amit Phadikar, Goutam Kumar Maity:
Content-based image retrieval in DCT compressed domain with MPEG-7 edge descriptor and genetic algorithm. Pattern Anal. Appl. 21(2): 469-489 (2018) - 2016
- [j11]Amit Phadikar, Poulami Jana, Baisakhi Sur Phadikar, Goutam Kumar Maity:
Reversible watermarking using channel coding and lifting for cultural heritage and medical image. Int. J. Inf. Comput. Secur. 8(1): 34-54 (2016) - [j10]Amlan Karmakar, Amit Phadikar, Baisakhi Sur Phadikar, Goutam Kr. Maity:
A blind video watermarking scheme resistant to rotation and collusion attacks. J. King Saud Univ. Comput. Inf. Sci. 28(2): 199-210 (2016) - 2013
- [j9]Amit Phadikar:
Multibit quantization index modulation: A high-rate robust data-hiding method. J. King Saud Univ. Comput. Inf. Sci. 25(2): 163-171 (2013) - 2012
- [j8]Amit Phadikar, Santi P. Maity:
On protection of compressed image in fading channel using data hiding. Comput. Electr. Eng. 38(5): 1278-1298 (2012) - [j7]Santi P. Maity, Amit Phadikar, Malay K. Kundu:
Image Error concealment Based on QIM Data Hiding in Dual-Tree Complex Wavelets. Int. J. Wavelets Multiresolution Inf. Process. 10(2) (2012) - [j6]Amit Phadikar, Santi P. Maity, Mrinal Mandal:
Novel wavelet-based QIM data hiding technique for tamper detection and correction of digital images. J. Vis. Commun. Image Represent. 23(3): 454-466 (2012) - [j5]Amit Phadikar, Santi P. Maity, Claude Delpha:
Image error concealment and quality access control based on data hiding and cryptography. Telecommun. Syst. 49(2): 239-254 (2012) - 2011
- [j4]Amit Phadikar, Santi P. Maity, Bhupendra Verma:
Region based QIM digital watermarking scheme for image database in DCT domain. Comput. Electr. Eng. 37(3): 339-355 (2011) - [j3]Amit Phadikar, Santi P. Maity:
On Security of Compressed Gray Scale Image Using Joint Encryption and Data Hiding. Inf. Secur. J. A Glob. Perspect. 20(6): 274-289 (2011) - [j2]Amit Phadikar, Santi P. Maity:
Data hiding based quality access control of digital images using adaptive QIM and lifting. Signal Process. Image Commun. 26(10): 646-661 (2011) - 2010
- [j1]Amit Phadikar, Santi Prasad Maity:
Roi based error concealment of compressed object based image using QIM data hiding and wavelet transform. IEEE Trans. Consumer Electron. 56(2): 971-979 (2010)
Conference and Workshop Papers
- 2017
- [c7]Himadri S. Mandal, Goutam Kr. Maity, Amit Phadikar, Tien-Lung Chiu:
FPGA Based Low Power Hardware Implementation for Quality Access Control of a Compressed Gray Scale Image. CICBA (1) 2017: 416-430 - 2011
- [c6]Amit Phadikar, Santi P. Maity, Claude Delpha:
Data hiding for quality access control and error concealment in digital images. ICME 2011: 1-6 - 2010
- [c5]Amit Phadikar, Santi Prasad Maity, Mrinal Mandal:
QIM data hiding for tamper detection and correction in digital images using wavelet transform. CCECE 2010: 1-5 - 2009
- [c4]Amit Phadikar, Santi P. Maity:
Image error concealment based on data hiding using M-ary QIM. ICDP 2009: 1-6 - [c3]Amit Phadikar, Santi P. Maity:
Image Error Concealment Based On Data Hiding Using Dual-Tree Complex Wavelets. IICAI 2009: 1764-1781 - 2008
- [c2]Amit Phadikar, Santi P. Maity:
A Cost Effective Scheme for Content Verification and Access Control of Quality of an Image. ICIIS 2008: 1-6 - [c1]Amit Phadikar, Santi P. Maity, Malay K. Kundu:
Quantization Based Data Hiding Scheme for Efficient Quality Access Control of Images Using DWT via Lifting. ICVGIP 2008: 265-272
Coauthor Index
aka: Santi Prasad Maity
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint