280 results on '"Jana, Biswapati"'
Search Results
52. Generalization of Multi-bit Encoding Function Based Data Hiding Scheme
53. An Image Authentication and Tampered Detection Scheme Exploiting Local Binary Pattern Along with Hamming Error Correcting Code
54. A New Reversible Data Hiding Scheme by Altering Interpolated Pixels Exploiting Neighbor Mean Interpolation (NMI)
55. Single Image Fog Removal Using WLS Smoothing Filter Combining CLAHE with DWT
56. Enhancing DSR Routing Protocol to Predict Optimal Path Using Dragonfly and Artificial Bee Colony Algorithm in MANET
57. An Innovative Active Queue Management Model Through Threshold Adjustment Using Queue Size
58. A secure reversible color image watermarking scheme based on LBP, lagrange interpolation polynomial and weighted matrix
59. A New Dual Image-Based Steganographic Scheme for Authentication and Tampered Detection Using (7, 4) Hamming Code
60. Application of random triangular and Gaussian type-2 fuzzy variable to solve fixed charge multi-item four dimensional transportation problem
61. Hiding data in dual color images reversibly via weighted matrix
62. A Survey to Analyse Routing Algorithms for Opportunistic Network
63. Improved center-folding based directional pixel value ordering for reversible data hiding scheme
64. A Novel Congestion Control Algorithm Using Buffer Occupancy RED
65. Comparative Analysis of Bio-inspired Dragonfly and Honeybee Algorithm-Based Routing Protocols with the Ant Colony Algorithm for MANET
66. Application of Dynamic Weight with Distance to Reduce Packet Loss in RED Based Algorithm
67. Dual Image Based Watermarking Scheme Using Quorum Function
68. A Novel Steganographic Scheme Using Weighted Matrix in Transform Domain
69. A Secure High-Capacity Video Steganography Using Bit Plane Slicing Through (7, 4) Hamming Code
70. Improving Data Hiding Capacity Using Bit-Plane Slicing of Color Image Through (7, 4) Hamming Code
71. A Solid Transportation Problem with Additional Constraints Using Gaussian Type-2 Fuzzy Environments
72. Serious games applied to the study of the "Substance Structure and Atom" units in chemistry
73. Weighted Matrix-Based Random Data Hiding Scheme Within a Pair of Interpolated Image
74. Multi-Sensor Tracking Simulator Design and Its Challenges
75. Robust Watermarking Scheme for Compressed Image Through DCT Exploiting Superpixel and Arnold Transform
76. Multiple Radar Data Fusion to Improve the Accuracy in Position Measurement Based on K-Means Algorithm
77. Center-Symmetric Local Binary Pattern-Based Image Authentication Using Local and Global Features Vector
78. Data Hiding Based on Decagon-Shaped Shell
79. Reversible Watermarking Scheme Using PVD-DE
80. Extended Directional IPVO for Reversible Data Hiding Scheme
81. Hamming Code-Based Watermarking Scheme for Image Authentication and Tampered Detection
82. Representation and Exploring the Semantic Organization of Bangla Word in the Mental Lexicon: Evidence from Cross-Modal Priming Experiments and Vector Space Model
83. High-Capacity Reversible Data Hiding Scheme Using Dual Color Image Through (7, 4) Hamming Code
84. Dual-Image Based Reversible Data Hiding Scheme Through Pixel Value Differencing with Exploiting Modification Direction
85. A robust reversible data hiding scheme for color image using reed-solomon code
86. Context pixel-based reversible data hiding scheme using pixel value ordering
87. Reference pixel-based reversible data hiding scheme using multi-level pixel value ordering
88. Reversible Data Hiding Through Hamming Code Using Dual Image
89. An Improved Data Hiding Scheme Through Image Interpolation
90. Generalization of Multi-bit Encoding Function Based Data Hiding Scheme
91. Hierarchical Visual Secret Sharing Scheme Using Steganography
92. Directional PVO for reversible data hiding scheme with image interpolation
93. Weighted matrix based reversible watermarking scheme using color image
94. Reversible data hiding scheme using sub-sampled image exploiting Lagrange’s interpolating polynomial
95. High payload reversible data hiding scheme using weighted matrix
96. A New Dual Image-Based Steganographic Scheme for Authentication and Tampered Detection Using (7, 4) Hamming Code
97. Directional pixel value ordering based secret sharing using sub-sampled image exploiting Lagrange polynomial
98. Multi-Sensor Data Fusion Using Triangulation Method and K-Means Algorithm
99. Dual image based reversible data hiding scheme using (7,4) hamming code
100. Reversible Data Hiding Scheme using Interpolation for Ownership Authentication
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.