348 results on '"Mandal, J.K."'
Search Results
2. On the use of the Stirling Transform in image steganography
3. Binomial transform based fragile watermarking for image authentication
4. A GIS Anchored Technique for Social Utility Hotspot Detection
5. Preservation of IPR of Songs through Embedding Secret Song (IPRSESS)
6. Securing Message Using Recursive Modulo-2 and Key Rotation Operation (RMRO)
7. A GIS Anchored System for Selection of Utility Service Stations through Hierarchical Clustering
8. Wavelet based Denoising of Medical Images Using Sub-band Adaptive Thresholding through Genetic Algorithm
9. A Novel Selective Scale Space based Fuzzy C-means Model for Spatial Clustering
10. Time Efficient Optimal Tunning through Various Learning Rules in Unify Computing (TEOTLRUC)
11. Computational Intelligence based Triple Layer Perceptron Model Coordinated PSO Guided Metamorphosed based Application in Cryptographic Technique for Secured Communication (TLPPSO)
12. Authentication Through Hough Transformation Generated Signature on G-Let D3 Domain (AHSG)
13. Stirling Transform based Color Image Authentication
14. A Genetic Algorithm based Steganography Using Discrete Cosine Transformation (GASDCT)
15. A Novel Spatial Fuzzy Clustering using Delaunay Triangulation for Large Scale GIS Data (NSFCDT)
16. Watermarking in Transform Domains (WTD)
17. Recursively Paired Arithmetic Technique (RPAT)
18. Design of Cryptographic model for End-to-End Encryption in FPGA based systems
19. Improved exploiting modification direction‐based steganography using dynamic weightage array
20. A Systematic Approach to Authenticate Song Signal Without Distortion of Granularity of Audible Information (ASSDGAI)
21. A Fragile Watermarking Based on Legendre Transform for Color Images (Fwltci)
22. Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014 : Volume 1 / edited by Suresh Chandra Satapathy, Bhabendra Narayan Biswal, Siba K. Udgata, J.K. Mandal.
23. A GIS Anchored Technique to Obtain Optimal Path Through Minimal Alteration of Land Type
24. An Analytical Approach to Generate Unique Song Signal ( AUSS )
25. Image denoising based on sub-image restoration through threshold optimisation
26. A fuzzy Markovian model for graph-based clustering
27. Adaptive Partial Image Encryption Technique Based on Chaotic Map
28. Soft Computing Based Cryptographic Technique Using Kohonen's Selforganizing Map Synchronization for Wireless Communication (KSOMSCT)
29. A genetic-algorithm-based steganography on colour images (GASCI)
30. Double Layer Perceptron Synchronized Computational Intelligence Guided Fractal Triangle Based Cryptographic Technique for Secured Communication (DLPFT)
31. G-Let Based Authentication/Secret Message Transmission (GASMT)
32. A Two Dimensional Discrete Fourier Transform Based Secret Data Embedding for Color Image Authentication (2D-DFTSDECIA)
33. A Delaunay Triangulation Preprocessing Based Fuzzy-Encroachment Graph Clustering for Large Scale GIS Data
34. An Image Authentication Technique in Frequency Domain using Genetic Algorithm (IAFDGA)
35. A Median based Directional Cascaded with Mask Filter for Removal of RVIN
36. Colour Image Steganography based on Pixel Value Differencing in Spatial Domain
37. Secret code embedded authentication of songs (SEAS)
38. Image Filtering Using all Neighbor Directional Weighted Pixels: Optimization Using Particle Swarm Optimization
39. A Data-Hiding Scheme for Digital Image Using Pixel Value Differencing (DHPVD)
40. A Message Embedded Authentication of Songs to Verify Intellectual Property Right (MEAS)
41. A Novel Variable Mask Median Filter for Removal of Random Valued Impulses in Digital Images (VMM)
42. A Novel Technique for Secret Communication through Optimal Shares Using Visual Cryptography (SCOSVC)
43. Image Authentication Using Hough Transform Generated Self Signature in DCT Based Frequency Domain (IAHTSSDCT)
44. A Novel Fuzzy-GIS Model Based on Delaunay Triangulation to Forecast Facility Locations (FGISFFL)
45. Steganographic Technique Based on Minimum Deviation of Fidelity (STMDF)
46. A Modified Weighted Based Filter for Removal of Random Impulse Noise (MWB)
47. Controlled Data Hiding Technique for Color Image Authentication in Frequency Domain (CDHTCIAFD)
48. Key based bit level genetic cryptographic technique (KBGCT).
49. Discrete Fourier Transform based multimedia colour image authentication for wireless communication (DFTMCIAWC).
50. An Adaptive Neural Network guided Random Block Length based Cryptosystem for online wireless communication (ANNRBLC).
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.