default search action
Biswapati Jana
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j33]Kankana Datta, Biswapati Jana, Mamata Dalui Chakraborty:
A cellular automata based secured reversible data hiding scheme for dual images using bit-reversal permutation technique. Comput. Stand. Interfaces 92: 103919 (2025) - 2024
- [j32]Kankana Datta, Biswapati Jana, Prabhash Kumar Singh, Mamata Dalui Chakraborty:
Robust data hiding scheme for highly compressed image exploiting btc with hamming code. Multim. Tools Appl. 83(3): 8591-8628 (2024) - [j31]Sudipta Meikap, Biswapati Jana:
Reference pixel-based reversible data hiding scheme using multi-level pixel value ordering. Multim. Tools Appl. 83(6): 16895-16928 (2024) - [j30]Manasi Jana, Biswapati Jana, Subhankar Joardar:
Reversible data hiding strategy exploiting circular distance interpolation utilizing optimal pixel adjustment with error substitution. Multim. Tools Appl. 83(16): 48949-48986 (2024) - [j29]Sudipta Meikap, Biswapati Jana, Tzu-Chuen Lu:
Context pixel-based reversible data hiding scheme using pixel value ordering. Vis. Comput. 40(5): 3529-3552 (2024) - [c18]Kankana Datta, Som Banerjee, Biswapati Jana, Mamata Dalui:
A Dual-Image Based Secured Reversible Data Hiding Scheme Exploiting Weighted Matrix and Cellular Automata. ASCAT 2024: 123-136 - 2023
- [j28]Rakesh Dutta, Nilanjana Das, Mukta Majumder, Biswapati Jana:
Aspect based sentiment analysis using multi-criteria decision-making and deep learning under COVID-19 pandemic in India. CAAI Trans. Intell. Technol. 8(1): 219-234 (2023) - [j27]Prabhash Kumar Singh, Biswapati Jana, Kakali Datta:
Fuzzy proximity-based robust data hiding scheme with interval threshold. Soft Comput. 27(7): 4011-4028 (2023) - [c17]Manasi Jana, Biswapati Jana, Subhankar Joardar:
A Novel Approach of Fragile Watermarking for Authentication and Tamper Detection Exploiting Local Binary Pattern (LBP). CICBA (2) 2023: 3-16 - [c16]Tzu-Chuen Lu, Thanh Nhan Vo, Biswapati Jana:
Dual-image reversible data hiding based on encoding the numeral system of concealed information. ICACI 2023: 1-7 - [c15]Tzu-Chuen Lu, Shi-Yao Lin, Yu-Xuan Zhou, Biswapati Jana:
Serious games applied to the study of the "Substance Structure and Atom" units in chemistry. iCAST 2023: 124-128 - 2022
- [j26]Prabhas Kumar Singh, Biswapati Jana, Kakali Datta:
Robust data hiding scheme through distinct keypoint selection exploiting modified Bilateral-Laplacian SIFT with encoding pipeline. Displays 74: 102268 (2022) - [j25]Sharmistha Halder (Jana), Biswapati Jana:
Application of fuzzy logic based GA and PSO to solve 4D multi-item transportation problem for substitute and complementary items. Evol. Intell. 15(3): 2187-2206 (2022) - [j24]Manasi Jana, Biswapati Jana:
A new DCT based robust image watermarking scheme using cellular automata. Inf. Secur. J. A Glob. Perspect. 31(5): 527-543 (2022) - [j23]Sharmistha Jana, Biswapati Jana, Tzu-Chuen Lu, Thanh Nhan Vo:
Reversible data hiding scheme exploiting center folding with fuzzy weight strategy. J. Inf. Secur. Appl. 69: 103276 (2022) - [j22]Prabhash Kumar Singh, Biswapati Jana, Kakali Datta:
Superpixel based robust reversible data hiding scheme exploiting Arnold transform with DCT and CA. J. King Saud Univ. Comput. Inf. Sci. 34(7): 4402-4420 (2022) - [j21]Kankana Datta, Biswapati Jana, Mamata Dalui Chakraborty:
Two-layers robust data hiding scheme for highly compressed image exploiting AMBTC with difference expansion. J. King Saud Univ. Comput. Inf. Sci. 34(8 Part A): 5240-5260 (2022) - [j20]Manasi Jana, Biswapati Jana, Subhankar Joardar:
Local feature based self-embedding fragile watermarking scheme for tampered detection and recovery utilizing AMBTC with fuzzy logic. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 9822-9835 (2022) - [c14]Santa Singh, Partha Chowdhuri, Pabitra Pal, Prabhash Kumar Singh, Biswapati Jana:
A Secure Image Watermarking Technique Using Chinese Remainder Theorem in Integer Wavelet Transformation Domain. CICBA 2022: 67-75 - [c13]Sweta Midya, Partha Chowdhuri, Pabitra Pal, Prabhash Kumar Singh, Biswapati Jana:
A Dual Image Based Data Hiding Scheme Based on Difference of Pixel Values in Integer Wavelet Transform Domain. CICBA 2022: 76-84 - [c12]Ashis Dey, Pabitra Pal, Partha Chowdhuri, Prabhas Kumar Singh, Biswapati Jana:
An IWT Based Reversible Watermarking Scheme Using Lagrange Interpolation Polynomial. CICBA 2022: 85-99 - [c11]Debasish Patra, Biswapati Jana:
Fake News Identification Through Natural Language Processing and Machine Learning Approach. CICBA 2022: 269-279 - 2021
- [j19]Tzu-Chuen Lu, Ping-Chung Yang, Biswapati Jana:
Improving the Reversible LSB Matching Scheme Based on the Likelihood Re-Encoding Strategy. Entropy 23(5): 577 (2021) - [j18]Soamdeep Singha, Biswapati Jana, Niranjan Kumar Mandal:
Active Queue Management in RED Considering Critical Point on Target Queue. J. Interconnect. Networks 21(3): 2150017:1-2150017:21 (2021) - [j17]Sudipta Meikap, Biswapati Jana:
Improved center-folding based directional pixel value ordering for reversible data hiding scheme. Multim. Tools Appl. 80(4): 5617-5652 (2021) - [j16]Pabitra Pal, Biswapati Jana, Jaydeb Bhaumik:
A secure reversible color image watermarking scheme based on LBP, lagrange interpolation polynomial and weighted matrix. Multim. Tools Appl. 80(14): 21651-21678 (2021) - [j15]Pabitra Pal, Biswapati Jana, Jaydeb Bhaumik:
An Image Authentication and Tampered Detection Scheme Exploiting Local Binary Pattern Along with Hamming Error Correcting Code. Wirel. Pers. Commun. 121(1): 939-961 (2021) - [c10]Thanh Nhan Vo, Tzu-Chuen Lu, Somya Agrawal, Biswapati Jana:
Interpolation based reversible hiding scheme by using center folding strategy and adjusting hiding operator. TAAI 2021: 90-95 - [c9]Sharmistha Jana, Biswapati Jana, Tzu-Chuen Lu:
Secured Steganographic Scheme Utilizing Fuzzy Threshold with Weighted Matrix. TAAI 2021: 101-106 - 2020
- [j14]Sharmistha Halder (Jana), Biswapati Jana:
Application of random triangular and Gaussian type-2 fuzzy variable to solve fixed charge multi-item four dimensional transportation problem. Appl. Soft Comput. 96: 106589 (2020) - [j13]Partha Chowdhuri, Biswapati Jana:
Hiding data in dual color images reversibly via weighted matrix. J. Inf. Secur. Appl. 50 (2020) - [j12]Sharmistha Halder (Jana), Biswapati Jana:
Application of fuzzy programming techniques to solve solid transportation problem with additional constraints. Oper. Res. Decis. 30(1) (2020) - [c8]Prabhash Kumar Singh, Biswapati Jana, Kakali Datta:
Robust Watermarking Scheme for Compressed Image Through DCT Exploiting Superpixel and Arnold Transform. ICMC 2020: 43-54 - [c7]Debkumar Bera, Biswapati Jana, Partha Chowdhuri, Debasis Giri:
Weighted Matrix-Based Random Data Hiding Scheme Within a Pair of Interpolated Image. ICMC 2020: 89-102 - [c6]Sourav Kaity, Biswapati Jana, P. K. Das Gupta, Rakesh Barua, Lalatendu Das:
Multi-Sensor Tracking Simulator Design and Its Challenges. ICMC 2020: 227-247
2010 – 2019
- 2019
- [j11]Pabitra Pal, Biswapati Jana, Jaydeb Bhaumik:
Robust watermarking scheme for tamper detection and authentication exploiting CA. IET Image Process. 13(12): 2116-2129 (2019) - [j10]Subhadip Mukherjee, Biswapati Jana:
A Novel Method for High Capacity Reversible Data Hiding Scheme Using Difference Expansion. Int. J. Nat. Comput. Res. 8(4): 13-27 (2019) - [j9]Ananya Banerjee, Biswapati Jana:
A robust reversible data hiding scheme for color image using reed-solomon code. Multim. Tools Appl. 78(17): 24903-24922 (2019) - [j8]Pabitra Pal, Biswapati Jana, Jaydeb Bhaumik:
Watermarking scheme using local binary pattern for image authentication and tamper detection through dual image. Secur. Priv. 2(2) (2019) - 2018
- [j7]Biswapati Jana, Debasis Giri, Shyamal Kumar Mondal:
Dual image based reversible data hiding scheme using (7, 4) hamming code. Multim. Tools Appl. 77(1): 763-785 (2018) - [j6]Biswapati Jana:
Reversible data hiding scheme using sub-sampled image exploiting Lagrange's interpolating polynomial. Multim. Tools Appl. 77(7): 8805-8821 (2018) - [j5]Pabitra Pal, Partha Chowdhuri, Biswapati Jana:
Weighted matrix based reversible watermarking scheme using color image. Multim. Tools Appl. 77(18): 23073-23098 (2018) - [j4]Sudipta Meikap, Biswapati Jana:
Directional PVO for reversible data hiding scheme with image interpolation. Multim. Tools Appl. 77(23): 31281-31311 (2018) - [j3]Dipankar Dey, Debasis Giri, Biswapati Jana, Tanmoy Maitra, Ram N. Mohapatra:
Linear-feedback shift register-based multi-ant cellular automation and chaotic map-based image encryption. Secur. Priv. 1(6) (2018) - [c5]Partha Chowdhuri, Biswapati Jana, Debasis Giri:
A Novel Steganographic Scheme Using Weighted Matrix in Transform Domain. ICMC 2018: 27-35 - 2017
- [j2]Biswapati Jana, Debasis Giri, Shyamal Kumar Mondal:
Partial reversible data hiding scheme using (7, 4) hamming code. Multim. Tools Appl. 76(20): 21691-21706 (2017) - [c4]Pabitra Pal, Partha Chowdhuri, Biswapati Jana:
Reversible Watermarking Scheme Using PVD-DE. CICBA (1) 2017: 511-524 - [c3]Partha Chowdhuri, Pabitra Pal, Biswapati Jana:
A New Dual Image-Based Steganographic Scheme for Authentication and Tampered Detection Using (7, 4) Hamming Code. ICITAM 2017: 163-174 - 2016
- [j1]Biswapati Jana, Debasis Giri, Shyamal Kumar Mondal:
Dual-Image Based Reversible Data Hiding Scheme Using Pixel Value Difference Expansion. Int. J. Netw. Secur. 18(4): 633-643 (2016) - 2015
- [c2]Biswapati Jana, Debasis Giri, Shyamal Kumar Mondal:
An Efficient Data Hiding Scheme using Hamming Error Correcting Code. ICCCT 2015: 360-365 - 2010
- [c1]Debasis Giri, Prithayan Barua, P. D. Srivastava, Biswapati Jana:
A Cryptosystem for Encryption and Decryption of Long Confidential Messages. ISA 2010: 86-96
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 00:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint