Showing
1 - 10
results of
10
Skip to content
VuFind
Log in
Library Catalogue Plus
Library
Subject guides
Databases
Referencing
Catalogue
Articles Plus
Keyword
Title
Author
Subject
Find
Advanced Search
Search Results - Ghosal, Sudipta Kr
Search Results - Ghosal, Sudipta Kr
Showing
1 - 10
results of
10
Refine Results
Sort
Relevance
Date Descending
Author
Title
1
Loading…
Exploiting Laguerre transform in image steganography
by
Ghosal, Sudipta Kr
,
Mukhopadhyay, Souradeep
,
Hossain, Sabbir
,
Sarkar, Ram
Published in
Computers & electrical engineering
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
2
Loading…
Image steganography based on difference of Gaussians edge detection
by
Patwari, Biswajit
,
Nandi, Utpal
,
Ghosal, Sudipta Kr
Published in
Multimedia tools and applications
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
3
Loading…
A secured image steganography method based on ballot transform and genetic algorithm
by
Hossain, Sabbir
,
Mukhopadhyay, Souradeep
,
Ray, Biswarup
,
Ghosal, Sudipta Kr
,
Sarkar, Ram
Published in
Multimedia tools and applications
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
4
Loading…
Application of Lah transform for security and privacy of data through information hiding in telecommunication
by
Ghosal, Sudipta Kr
,
Mukhopadhyay, Souradeep
,
Hossain, Sabbir
,
Sarkar, Ram
Published in
Transactions on emerging telecommunications technologies
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
5
Loading…
Secured image steganography based on Catalan transform
by
Mukhopadhyay, Souradeep
,
Hossain, Sabbir
,
Ghosal, Sudipta Kr
,
Sarkar, Ram
Published in
Multimedia tools and applications
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
6
Loading…
DiffMoment: an adaptive optimization technique for convolutional neural network
by
Bhakta, Shubhankar
,
Nandi, Utpal
,
Si, Tapas
,
Ghosal, Sudipta Kr
,
Changdar, Chiranjit
,
Pal, Rajat Kumar
Published in
Applied intelligence (Dordrecht, Netherlands)
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
7
Loading…
Image steganography using deep learning based edge detection
by
Ray, Biswarup
,
Mukhopadhyay, Souradeep
,
Hossain, Sabbir
,
Ghosal, Sudipta Kr
,
Sarkar, Ram
Published in
Multimedia tools and applications
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
8
Loading…
emapDiffP: A novel learning algorithm for convolutional neural network optimization
by
Bhakta, Shubhankar
,
Nandi, Utpal
,
Changdar, Chiranjit
,
Ghosal, Sudipta Kr
,
Pal, Rajat Kumar
Published in
Neural computing & applications
Get full text
Items that this one cites
Article
Save to List
Saved in:
9
Loading…
Extended exploiting modification direction based steganography using hashed-weightage Array
by
Saha, Shaswata
,
Chakraborty, Anuran
,
Chatterjee, Agneet
,
Dhargupta, Souvik
,
Ghosal, Sudipta Kr
,
Sarkar, Ram
Published in
Multimedia tools and applications
Get full text
Items that this one cites
Items that cite this one
Article
Save to List
Saved in:
10
Loading…
A two-phase gradient based feature embedding approach
by
Chatterjee, Agneet
,
Ghosh, Soulib
,
Chakraborty, Anuran
,
Ghosal, Sudipta Kr
,
Sarkar, Ram
Published in
Journal of information security and applications
Get full text
Items that this one cites
Article
Save to List
Saved in:
Search Tools:
RSS Feed
Email Search
Save Search
Back
Refine Results
Page will reload when a filter is selected or excluded.
Limit To
Peer Reviewed
10 results
10
Full Text
10 results
10
Format
Articles
10 results
10
Journal Title
Multimedia Tools And Applications
5 results
5
Applied Intelligence
1 results
1
Computers & Electrical Engineering
1 results
1
Journal Of Information Security And Applications
1 results
1
Neural Computing & Applications
1 results
1
Transactions On Emerging Telecommunications Technologies
1 results
1
Subjects
Computer Science
9 results
9
Science & Technology
9 results
9
Technology
9 results
9
Steganography
7 results
7
Computer Science, Information Systems
6 results
6
Engineering
6 results
6
Engineering, Electrical & Electronic
6 results
6
Computer Communication Networks
5 results
5
Computer Science, Software Engineering
5 results
5
Computer Science, Theory & Methods
5 results
5
Data Structures And Information Theory
5 results
5
Multimedia Information Systems
5 results
5
Pixels
5 results
5
Special Purpose And Application-Based Systems
5 results
5
Payload
4 results
4
Algorithms
3 results
3
Artificial Neural Networks
3 results
3
Embedding
3 results
3
Machine Learning
3 results
3
Acceptable Noise Levels
2 results
2
Year of Publication
From:
To:
Source
Springer Nature
7 results
7
Springer Online Journal Archives (Through 1996)
7 results
7
Springerlink Contemporary 1997-Present
7 results
7
Abi/Inform Global
6 results
6
Sciencedirect®
2 results
2
Elsevier
2 results
2
Wiley-Blackwell Journals (Backfile Content)
1 results
1
Wiley-Blackwell Journals
1 results
1
Wiley
1 results
1
Backfile Package - Computer Science (Legacy) [Ycs]
1 results
1
Backfile Package - Engineering And Technology [Yen]
1 results
1