Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image P Pal, B Jana, J Bhaumik Security and Privacy 2 (2), e59, 2019 | 33 | 2019 |
Weighted matrix based reversible watermarking scheme using color image P Pal, P Chowdhuri, B Jana Multimedia Tools and Applications 77, 23073-23098, 2018 | 26 | 2018 |
A secure reversible color image watermarking scheme based on LBP, lagrange interpolation polynomial and weighted matrix P Pal, B Jana, J Bhaumik Multimedia Tools and Applications 80 (14), 21651-21678, 2021 | 24 | 2021 |
Robust watermarking scheme for tamper detection and authentication exploiting CA P Pal, B Jana, J Bhaumik IET Image Processing 13 (12), 2116-2129, 2019 | 14 | 2019 |
New Image Noise Reduction Schemes Based on Cellular Automata B Jana, P Pal, J Bhoumik International Journal of Soft Computing and Engineering (IJSCE) 2 (2), 98-103, 2012 | 13 | 2012 |
An image authentication and tampered detection scheme exploiting local binary pattern along with hamming error correcting code P Pal, B Jana, J Bhaumik Wireless Personal Communications 121 (1), 939-961, 2021 | 10 | 2021 |
Improved data hiding capacity through repeated embedding using modified weighted matrix for color image P Chowdhuri, P Pal, B Jana International Journal of Computers and Applications 41 (3), 218-232, 2019 | 10 | 2019 |
A new dual image-based steganographic scheme for authentication and tampered detection using (7, 4) hamming code P Chowdhuri, P Pal, B Jana Information Technology and Applied Mathematics: ICITAM 2017, 163-174, 2018 | 8 | 2018 |
A novel steganographic technique for medical image using SVM and IWT P Chowdhuri, P Pal, T Si Multimedia Tools and Applications 82 (13), 20497-20516, 2023 | 6 | 2023 |
Reversible watermarking scheme using PVD-DE P Pal, P Chowdhuri, B Jana Computational Intelligence, Communications, and Business Analytics: First …, 2017 | 6 | 2017 |
Image steganography based on cellular automata B Jana, D Giri, SK Mondal, P Pal International Journal of Pure and Applied Mathematics 83 (5), 701-715, 2013 | 5 | 2013 |
Center-symmetric local binary pattern-based image authentication using local and global features vector A Dey, P Pal, P Chowdhuri, PK Singh, B Jana Computational Intelligence in Pattern Recognition: Proceedings of CIPR 2020 …, 2020 | 4 | 2020 |
Effect of soybean lecithin extender on post-thaw semen quality of Bengal buck A Akourki, M Mondal, M Karunakaran, P Pal Indian J. Anim. Health 57 (2), 153-164, 2018 | 4 | 2018 |
An iwt based reversible watermarking scheme using lagrange interpolation polynomial A Dey, P Pal, P Chowdhuri, PK Singh, B Jana International Conference on Computational Intelligence in Communications and …, 2022 | 2 | 2022 |
Dual image based watermarking scheme using quorum function A Dey, P Pal, P Chowdhuri, B Jana, S Jana, A Singha Advanced Techniques for IoT Applications: Proceedings of EAIT 2020, 114-123, 2022 | 2 | 2022 |
A new repeated pixel value difference-based steganographic scheme with overlapped pixel P Chowdhuri, P Pal, B Jana, D Giri Intelligent Computing: Image Processing Based Applications, 103-118, 2020 | 2 | 2020 |
Hamming Code-Based Watermarking Scheme for Image Authentication and Tampered Detection P Pal, P Chowdhuri, B Jana, J Bhaumik International Conference on Communication, Devices and Computing, 59-67, 2017 | 2 | 2017 |
Integer wavelet transform based watermarking scheme for medical image authentication A Dey, P Chowdhuri, P Pal Multimedia Tools and Applications, 1-22, 2024 | 1 | 2024 |
SVD-Based Watermarking Scheme for Medical Image Authentication A Dey, P Chowdhuri, P Pal, L Tzu-Chuen International Conference on Network Security and Blockchain Technology, 135-146, 2023 | 1 | 2023 |
A Secured Reversible Data Hiding Technique for Multiple Secrets using Image Interpolation with Bit Reversal Permutation M Jana, B Jana, TC Lu, P Pal, S Jana, S Joardar | 1 | 2022 |