Vidyasagar University Logo

VIDYASAGAR UNIVERSITY
FACULTY INFORMATION SYSTEM

Self Declared Document


Name Dr. Biswapati Jana
Designation Professor , Head
Department Name COMPUTER SCIENCE
Office Phone No +91 3222 298-274 / Centrex Extn. 274
Email ID biswapati.jana@mail.vidyasagar.ac.in
biswapatijana74@gmail.com
Fax
Mobile No 9126661253
Personal Website
Address Department of Computer Science Vidyasagar University
Educational Qualification
Degree NameInstituteYear of passing/awarded
Ph.D. in Computer ScienceVidyasagar University2017
M.Tech. in Computer Science & EngineeringCalcutta University2002
B.Tech. in Computer Science & EngineeringCalcutta University1999
B.Sc. in Physics [Hons] Calcutta University1996


Career Profile / Teaching Experience
Professor, Department of Computer Science, Vidyasagar University, P.O:-Vidyasagar University, Dist:- Paschim Medinipur, Pin:-721102. from March, 2021
Associate Professor, Department of Computer Science, Vidyasagar University, P.O:-Vidyasagar University, Dist:- Paschim Medinipur, Pin:-721102.from March 2018
Assistant Professor, Department of Computer Science, Vidyasagar University, P.O:-Vidyasagar University, Dist:- Paschim Medinipur, Pin:-721102. from 2004 to 2018
Lecturer, Department of Computer Science & Engineering , Haldia Institute of Technology (HIT), P.O. – HIT Campus, Dist:- Purba Medinipur. Pin:-721657. from 2001 to 2004.

Specialization/Research Area
Field of SpecializationResearch Area/ Areas of Interest
Data Hiding
Steganography
Watermarking
Image Processing
Computer Vision
Machine Learning
Social Networking

Course/ Subject Taught
Compiler Design
Image Processing
Cryptography and Steganography
Multimedia Security
Research Methodology

Conference/ Symposium /Journal Paper / Books Published
International Publication
TitlePublished inPublished onPublished byRoleDetails
Context Pixel-based Reversible Data Hiding Scheme using Pixel Value OrderingThe Visual ComputerJul, 2023SpringerCo-Author,Corresponding Author Impact Factor: 3.50000
Indexing: SCOPUS, SCIE
Article's Web Link:
Reference Pixel-Based Reversible Data Hiding Scheme Using Multi-Level Pixel Value OrderingMultimedia Tools and Applications, SpringerJul, 2023SpringerCo-Author,Corresponding Author Impact Factor: 3.60000
Indexing: SCOPUS, SCIE
Article's Web Link:
Robust Data Hiding Scheme for Highly Compressed Image Exploiting BTC with Hamming CodeMultimedia Tools and Applications 10.1007/s11042-023-15727-wApr, 2023SpringerCo-Author,Corresponding Author Impact Factor: 3.60000
Indexing: SCOPUS, SCIE
Article's Web Link:
Aspect based sentiment analysis using multi-criteria decision-making and deep learning under COVID-19 pandemic in IndiaCAAI Transactions on Intelligence TechnologyOct, 2022The Institute of Engineering and TechnologyCo-Author Impact Factor: 7.98500
Indexing: SCOPUS
Article's Web Link: https://doi.org/10.1049/cit2.12144
Fuzzy Proximity based Robust Data Hiding Scheme with Interval ThresholdSoft ComputingOct, 2022SpringerCorresponding Author Impact Factor: 3.73200
Indexing: SCI
Article's Web Link: https://doi.org/10.1007/s00500-022-07552-4
Reversible Data Hiding Scheme Exploiting Center Folding with Fuzzy Weight StrategyJournal of Information Security and Applications (JISA) , Volume 69, September 2022, 103276Jul, 2022ElsevierCorresponding Author Impact Factor: 4.96000
Indexing: SCI
Article's Web Link: https://doi.org/10.1016/j.jisa.2022.103276
A Dual Image Based Data Hiding Scheme Based on Difference of Pixel Values in Integer Wavelet Transform DomainCICBAJul, 2022Springer  Impact Factor: 0.00000
Indexing:
Article's Web Link:
Robust data hiding scheme through distinct keypoint selection exploiting modified Bilateral-Laplacian SIFT with encoding pipelineDisplays 74(1):102268Jul, 2022ElsevierCorresponding Author Impact Factor: 3.07400
Indexing: SCOPUS, SCI
Article's Web Link: 10.1016/j.displa.2022.102268
Application of type-2 defuzzification method to solve profit maximization solid transportation problem considering carbon emissionInternational Journal of Information and Management Sciences (IJIMS)Jun, 2022International Journal of Information and Management Sciences (IJIMS)Corresponding Author Impact Factor: 0.00000
Indexing: SCOPUS
Article's Web Link:
Fuzzy Logic with Superpixel-Based Block Similarity Measures for Secured Data Hiding Schemehttps://doi.org/10.1007/978-981-19-0105-8_44Jun, 2022Lecture Notes in Networks and Systems, vol 404. Springer, Singapore. https://doi.org/10.1007/978-981-19-0105-8_44Corresponding Author Impact Factor: 0.00000
Indexing: SCOPUS
Article's Web Link: https://doi.org/10.1080/19393555.2021.1956023
Two-layers robust data hiding scheme for highly compressed image exploiting AMBTC with difference expansionJournal of King Saud University - Computer and Information Sciences Volume 34, Issue 8, Part A, September 2022, Pages 5240-5260May, 2022ElsevierCorresponding Author Impact Factor: 9.00600
Indexing: SCOPUS, SCI
Article's Web Link: https://doi.org/10.1016/j.jksuci.2022.05.013
Active Queue Management in RED Considering Critical Point on Target QueueJournal of Interconnection Networks, Vol. 21, No. 03, 2150017 (2021)2021World Scientific Publishing Co Pte LtdCo-Author Impact Factor: 0.00000
Indexing: SCOPUS
Article's Web Link: https://doi.org/10.1142/S0219265921500171
A new DCT based robust image watermarking scheme using cellular automataInformation Security Journal: A Global Perspective Volume 31, 2022 - Issue 52021Taylor and FrancisCorresponding Author Impact Factor: 0.00000
Indexing: SCOPUS
Article's Web Link: https://doi.org/10.1080/19393555.2021.1956023
FCSTP with possibility and expected value approaches in hybrid uncertain environmentsTWMSJournal Of Applied And Engineering Mathematics, 11(4), 998-1011.2021TWMS Journal Of Applied And Engineering MathematicsCo-Author Impact Factor: 0.00000
Indexing: SCOPUS
Article's Web Link: https://hdl.handle.net/11729/3249 http://jaem.isikun.edu.tr/web/index.php/archive/113-vol11-no4/759
An Image Authentication and Tampered Detection Scheme Exploiting Local Binary Pattern Along with Hamming Error Correcting CodeWireless Personal Communications | Issue 1/20212021SpringerCorresponding Author Impact Factor: 0.00000
Indexing: SCOPUS
Article's Web Link: https://www.springerprofessional.de/en/an-image-authentication-and-tampered-detection-scheme-exploiting/19291660
Application of fuzzy logic based GA and PSO to solve 4D multi-item transportation problem for substitute and complementary itemsEvolutionary Intelligence volume 15, pages 2187–2206 (2022)2021Springer NatureCo-Author,Corresponding Author Impact Factor: 2.60000
Indexing: SCOPUS, SCIE
Article's Web Link: https://doi.org/10.1007/s12065-021-00630-w
Application of Fuzzy Logic based GA and PSO to solve 4D Multi-item transportation problem for substitute and complementary itemsEvolutionary Intelligence , 15, pages 2187–2206 (2022)2021SpringerCorresponding Author Impact Factor: 2.57700
Indexing: SCOPUS, SCI
Article's Web Link: https://doi.org/10.1007/s12065-021-00630-w
Improving the Reversible LSB MatchingScheme Based on the Likelihood Re-encoding StrategyEntropy, 23(5), 577.2021EntropyCo-Author Impact Factor: 2.52400
Indexing: SCOPUS
Article's Web Link: https://doi.org/10.3390/e23050577
A secure reversible color image watermarking scheme based on LBP, lagrange interpolation polynomial and weighted matrixMultimedia Tools and Applications2021SpringerCorresponding Author Impact Factor: 2.57700
Indexing: SCOPUS, SCI
Article's Web Link: https://doi.org/10.1007/s11042-021-10651-3
Application of Dynamic Weight with Distance to Reduce Packet Loss in RED based AlgorithmEAIT-20202021Springer  Impact Factor:
Indexing:
Article's Web Link:
Comparative analysis of bio- inspired dragonfly and honeybee algorithm-based routing protocols with the ant colony algorithm for MANETEAIT-20202021Springer  Impact Factor:
Indexing:
Article's Web Link:
A Nobel Congestion Control Algorithm Using Buffer Occupancy REDCIPR-20212021Springer  Impact Factor:
Indexing:
Article's Web Link:
A Novel Data Hiding Technique Based on QR Code Decomposition in Transform DomainCIPR-20212021Springer  Impact Factor:
Indexing:
Article's Web Link:
A Predictable Active Queue Management to Reduce Sensitivity of RED ParameterInternational Journal of Engineering &Technology 2020Science Publishing Corporation, Dubai, UAE  Impact Factor: 0.00000
Indexing:
Article's Web Link:
Superpixel based Robust Reversible Data Hiding Scheme Exploiting Arnold Transform with DCT and CAJournal of King Saud University - Computer and Information Sciences2020Elsevier  Impact Factor:
Indexing:
Article's Web Link:
Improved center-folding based directional pixel value ordering for reversible data hiding schemeMultimedia Tools and Applications2020Springer  Impact Factor:
Indexing:
Article's Web Link:
Improved center folding based directional pixel value ordering for reversible data hiding schemeMultimedia Tools and Applications2020Springer  Impact Factor:
Indexing:
Article's Web Link:
Application of random triangular and Gaussian type-2 fuzzy variable to solve fixed charge multi-item four-dimensional transportation problemApplied Soft Computing2020Elsevier  Impact Factor:
Indexing:
Article's Web Link:
A Survey to Analyse Routing Algorithms for Opportunistic NetworkProcedia Computer Science2020Elsevier  Impact Factor:
Indexing:
Article's Web Link:
A New Efficient Swarm-based Routing Protocol for MANET Exploiting DRAGONFLY with HONEY BEEVCIPECH-20202020KIET Group of Institutions Ghaziabad  Impact Factor:
Indexing:
Article's Web Link:
Hiding data in dual color images reversibly via weighted matrixJournal of Information Security and Applications,50,20202020Elsevier  Impact Factor:
Indexing:
Article's Web Link:
Robust Watermarking scheme for compressed image through DCT exploiting Superpixel and Arnold transformConference Proceeding2020Springer  Impact Factor:
Indexing:
Article's Web Link:
Multi-Sensor Tracking Simulator Design and its ChallengesConference Proceeding2020Springer  Impact Factor:
Indexing:
Article's Web Link:
Weighted matrix based random data hiding scheme within a pair of interpolated imageConference Proceeding2020Springer  Impact Factor:
Indexing:
Article's Web Link:
Multiple Radar Data Fusion to Improve the Accuracy in Position Measurement Basedon K-means AlgorithmConference Proceeding2020Springer  Impact Factor:
Indexing:
Article's Web Link:
High Payload RDH Through Directional PVO Exploiting Center- Folding Strategy.Conference Proceeding2020Springer  Impact Factor:
Indexing:
Article's Web Link:
A Robust Audio Authentication Scheme Using (11,7) Hamming Error Correcting Code.Conference Proceeding2020Springer  Impact Factor:
Indexing:
Article's Web Link:
Authentication on Interpolated Sub-Sampled based Image Steganography Exploiting Secret Sharing.Conference Proceeding2020Springer  Impact Factor:
Indexing:
Article's Web Link:
Center-Symmetric Local Binary Pattern-Based Image Authentication Using Local and Global Features Vector.Advances in Intelligent Systems and Computing2020Springer  Impact Factor:
Indexing:
Article's Web Link:
Data Hiding Based on Decagon-Shaped ShellAdvances in Intelligent Systems and Computing2020Springer  Impact Factor:
Indexing:
Article's Web Link:
A New Repeated Pixel Value Difference-Based Steganographic Scheme with Overlapped PixelIntelligent Computing: Image Processing Based Applications,2020Springer  Impact Factor:
Indexing:
Article's Web Link:
Application of fuzzy programming techniques to solve solid transportation problem with additional constraintsOperations Research And Decisions2020Operations Research And Decisions  Impact Factor:
Indexing:
Article's Web Link:
Fake Image and News Detection on Social Media ThroughTrust-ware Based Community PortalConference Proceeding2019YSC-2019  Impact Factor:
Indexing:
Article's Web Link:
FC 4D MITPs in Crisp and Rough Environments for Substitutable and Complementary Items with Budget ConstraintsMDPI-mathematics. Mathematics 7, no. 3 (2019): 281, IF-1.105 (SCI Journal)2019MDPI  Impact Factor:
Indexing:
Article's Web Link:
A Novel Method for High Capacity Reversible Data Hiding Scheme Using Difference ExpansionInternational Journal of Natural Computing Research (IJNCR), IGI Global.2019IGI Global.  Impact Factor:
Indexing:
Article's Web Link:
Robust Watermarking Scheme for Tamper Detection and Authentication Exploiting Cellular AutomataIET Image Processing, IEEE, DOI: 10.1049/iet-ipr.2018.66382019IEEE  Impact Factor:
Indexing:
Article's Web Link:
Directional Pixel Value Ordering Based Secret Sharing Using Sub-Sampled Image Exploiting Lagrange PolynomialDOI :10.1007/s42452-019-0659-1, SN Applied Sciences, Springer2019Springer  Impact Factor:
Indexing:
Article's Web Link:
A Method of Building Ontology Based Information knowledgebaseInternational Journal of Computer Sciences and Engineering (IJCSE), 7(1), Jan 20192019IJCSE, (UGC Approved)  Impact Factor:
Indexing:
Article's Web Link:
Pixel Value Ordering with Prediction Error Expansion Based High Fidelity Reversible Data Hiding SchemeInternational Journal of Applied Engineering Research (IJAER), 14(4), (2019) pp. 998-10062019IJAER, (UGC Approved)  Impact Factor:
Indexing:
Article's Web Link:
Watermarking Scheme using LBP for Image Authentication and Tamper Detection through dual imageSecurity and Privacy, Wiley Online Library2019Wiley Online Library  Impact Factor:
Indexing:
Article's Web Link:
A robust reversible data hiding scheme for Color Image using Reed-Solomon CodeMultimedia Tools and Application (MTA), Springer, 20192019Springer, (IF-1.541)  Impact Factor:
Indexing:
Article's Web Link:
LFSR-based Multi-ant Cellular Automation and Chaotic Map based Image EncryptionSecurity and Privacy, Wiley Online Library, 1(6), e522019Wiley Online Library.  Impact Factor:
Indexing:
Article's Web Link:
Copy Move Forgery Detection through Graph Neighborhood DegreeInternational Journal of Applied Engineering Research (IJAER), 13(18), pp. 13421-134272018IJAER, (UGC Approved)  Impact Factor:
Indexing:
Article's Web Link:
Improved data hiding capacity through repeated embedding using modified weighted matrix for color imageInternational Journal of Computers and Applications (IJCA)2018Taylor and Francis  Impact Factor:
Indexing:
Article's Web Link:
Weighted matrix based reversible watermarking scheme using color imageMultimedia Tools and Application (MTA), Springer2018Springer (IF-1.530)  Impact Factor:
Indexing:
Article's Web Link:
Directional PVO for Reversible Data Hiding Scheme withImage InterpolationMultimedia Tools and Application (MTA), Springer2018Springer (IF-1.530)  Impact Factor:
Indexing:
Article's Web Link:
Secured Steganographic Scheme For Highly Compressed Color Image Using Weighted Matrix Through DCTInternational Journal of Computers and Applications (IJCA)2018Taylor & Francis  Impact Factor:
Indexing:
Article's Web Link:
Analysis of Factors and their Impacts in Measurement Accuracy and Prioritization of RadarsInternational Journal of Research and Analytical Reviews (IJRAR), 5(4), December 20182018IJRAR, (UGC Approved)  Impact Factor:
Indexing:
Article's Web Link:
Analysis of Factors and their Impacts in Measurement Accuracy and Prioritization of RadarsInternational Journal of Research and Analytical Reviews (IJRAR),, Vol-5, Issue-4, December 2018, pp- 548-554. (UGC Approved).2018IJRAR  Impact Factor:
Indexing:
Article's Web Link:
Reversible Data Hiding Scheme Using Sub-Sampled ImageExploiting Lagrange’s Interpolating PolynomialMultimedia Tools and Application (MTA), Springer. 2017Springer (IF-1.530)  Impact Factor:
Indexing:
Article's Web Link:
Reversible Watermarking Scheme Using PVD-DEProceedings of the International Conference at Calcutta Business School, Kolkata on March 24-25, 20172017Springer  Impact Factor:
Indexing:
Article's Web Link:
Extended Directional IPVO for Reversible Data Hiding SchemeProceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) was held in Haldia, India during November 2-3, 2017 2017Springer  Impact Factor:
Indexing:
Article's Web Link:
Representation and Exploring the Semantic Organization of Bangla Word in theMental Lexicon: Evidence from Cross-modal Priming Experiments and VectorSpace ModelProceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) was held in Haldia, India during November 2-3, 2017 2017Springer  Impact Factor:
Indexing:
Article's Web Link:
High Capacity Reversible Data Hiding Scheme Using Dual Color Image through(7, 4) Hamming CodeProceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) was held in Haldia, India during November 2-3, 2017 2017Springer  Impact Factor:
Indexing:
Article's Web Link:
Hamming code based watermarking scheme for Image Authentication andTampered detectionProceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) will be held in Haldia, India during November 2-3, 2017 2017Springer  Impact Factor:
Indexing:
Article's Web Link:
Exploring the semantic organization of Bangla words in the mental lexiconProcedia Computer Science 115 (2017) 556–5622017Procedia Computer Science , Elsevier  Impact Factor:
Indexing:
Article's Web Link:
Partial reversible data hiding scheme using (7, 4) hamming codeMultimedia Tools and Application, Springer, 1-162016Springer (IF-1.530)  Impact Factor:
Indexing:
Article's Web Link:
Dual Image Based Reversible Data Hiding Scheme Using (7,4) Hamming CodeMultimedia Tools and Application, Springer. 1-232016Springer (IF-1.530)  Impact Factor:
Indexing:
Article's Web Link:
Dual Image based Reversible Data Hiding Scheme Using Pixel Value Difference With Exploiting Modification DirectionProceedings of the First International Conference on Intelligent Computing and Communication Volume 458 of the series Advances in Intelligent Systems and Computing, Pages 549-5572016Springer  Impact Factor:
Indexing:
Article's Web Link:
Dual Image based Reversible Data Hiding Scheme using Weighted MatrixInt. J. of Electronics and Information Engineering, Vol.5, No.1, PP.6-19, Sept. 2016, DOI: 10.6636/IJEIE.201609.5(1).02) 2016IJEIE   Impact Factor:
Indexing:
Article's Web Link:
High payload reversible data hiding scheme using weighted matrixOptik -International Journal for Light and Electron Optics, 127(6), 3347-3358, http://dx.doi.org/10.1016/j.ijleo.2015.12.0552016Elsevier (Impact Factor: 0.677)  Impact Factor:
Indexing:
Article's Web Link:
Dual-Image Based Reversible Data Hiding Scheme Using Pixel Value Difference ExpansionInternational Journal of Network Security, 18(04),633-643, DOI: 10.6633/IJNS.201607.18(4).042016IJNS   Impact Factor:
Indexing:
Article's Web Link:
An Efficient Weight Matrix based Reversible DataHiding SchemeInternational Conference on Computers and Management (ICCM-2015), Jaipur (Rajasthan), India2015ACM  Impact Factor:
Indexing:
Article's Web Link:
An Efficient Data Hiding Scheme Using Hamming Error Correcting CodeProceedings of the Sixth International Conference on Computer and Communication Technology (ICCCT '15), 2015, Pages 360-365.2015ACM digital library  Impact Factor:
Indexing:
Article's Web Link:
Reversible Data Hiding Through Hamming Code Using Dual ImageProceedings of the International Congress on Information and Communication Technology, Volume 439 of the series Advances in Intelligent Systems and Computing, Pages 495-5042015Springer (AISC).  Impact Factor:
Indexing:
Article's Web Link:
Dual Image Based Reversible Data Hiding Scheme Using Three Pixel Value DifferenceInformation Systems Design and Intelligent Applications Volume 434 of the series Advances in Intelligent Systems and Computing, Pages 403-4122015AISC-Springer.  Impact Factor:
Indexing:
Article's Web Link:
Hierarchical Visual Secret Sharing Scheme Using SteganographyMathematics and Computing,Springer Proceedings in Mathematics & Statistics, Volume 139, pp 363-389, 20152015Springer  Impact Factor:
Indexing:
Article's Web Link:
Weighted Matrix Based Reversible Data Hiding Scheme Using Image InterpolationComputational Intelligence in Data Mining—Volume 2 Volume 411 of the series Advances in Intelligent Systems and Computing pp 239-2482015Springer  Impact Factor:
Indexing:
Article's Web Link:
Cheating Prevention in Hierarchical Visual Secret Sharing Scheme Using Weight Matrix-Based SteganographyMathematical Sciences International Research Journal, Volume 3, No 2, ISSN-22788697, pp 796-799, 20142014International Multidisciplinary Research Foundation  Impact Factor:
Indexing:
Article's Web Link:
Survey on Size Invariant Visual CryptographyInternational Journal of Computer Science and Information Technologies, Volume 5, No. 3, pp 3985-3990, ISSN-0975-9646, 20142014Tech Science Publications  Impact Factor:
Indexing:
Article's Web Link:
Survey on Cheating and Prevention Techniques in Visual CryptographyMathematical Sciences International Research Journal, 3(Special Issue), 961-9762014IMRF  Impact Factor:
Indexing:
Article's Web Link:
Cheating Prevention in Hierarchical Visual Secret Sharing Scheme using weight matrix-based SteganographyMathematical Sciences International Research Journal, 3(2), 796-7992014IMRF  Impact Factor:
Indexing:
Article's Web Link:
Survey on Size Invariant Visual CryptographyInternational Journal of Computer Science and Information Technologies, 5(3), 3985-39902014IJCST  Impact Factor:
Indexing:
Article's Web Link:
Cheating Prevention In Visual Cryptographic Schemes Using Message Embedding: A Hardware Based Practical ApproachProceedings of International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT-2014), pp 319 – 324, DOI: 10.1109/ICICICT.2014.6781300, 20142014IEEE  Impact Factor:
Indexing:
Article's Web Link:
Key Distribution in Wireless Sensor Networks using Quantum CryptographyInternational Journal of Mobile & Adhoc Network, 3(4), 250-256.2013IJMAN  Impact Factor:
Indexing:
Article's Web Link:
Key Distribution In Wireless Sensor Networks Using Quantum CryptographyInternational Journal of Mobile & Adhoc Network, Volume 3 Issue- 4, pp 250-256, ISSN 2231–6825, 20132013International forum of researchers Students and Academician (IFRSA)  Impact Factor:
Indexing:
Article's Web Link:
Image Steganography based on Cellular AutomataInternational Journal of Pure and Applied Mathematics, Volume 83, No 5, pp 701-715, ISSN-1311-8080, 20132013Academic Publications  Impact Factor:
Indexing:
Article's Web Link:
New Image Noise Reduction Schemes Based on Cellular AutomataInternational Journal of Soft Computing and Engineering, Volume-2, Issue-2, pp 98-103, ISSN 2231-2707, 20122012Blue Eyes Intelligence Engineering & Sciences Publication  Impact Factor:
Indexing:
Article's Web Link:
A Cryptosystem For Encryption and Decryption of Long Confidential MessageInformation Security and Assurance Communications in Computer and Information Science, Springer, Volume 76, pp 86-96, 20102010Springer  Impact Factor:
Indexing:
Article's Web Link:
Object Extraction Using Novel Region Merging and Multidimensional FeaturesFourth Pacific-Rim Symposium on Image and Video Technology (PSIVT), pp 356 – 361, Print ISBN: 978-1-4244-8890-2 , DOI: 10.1109/PSIVT.2010.66, 20102010IEEE  Impact Factor:
Indexing:
Article's Web Link:
Recognition Of Partially Occluded, Expression Variant Faces Using Elastic Bunch Graph MatchingProceedings of 1st IEEE-International Conference on Signal and Image Processing (IEEE-ICSIP-06), 20062006IEEE  Impact Factor:
Indexing:
Article's Web Link:


National Publication
TitlePublished inPublished onPublished byRoleDetails
Parity based Image Steganography using Cellular AutomataProceedings of National Seminar on Emerging Trends in Mathematics2012Vidyasagar University In collaboration with Calcutta Mathematical Society, Midnapore-721102, West Bengal  Impact Factor:
Indexing:
Article's Web Link:
Automatic Pitman Shorthand Script Recognition Using Fuzzy Rule Based Technique” National Seminar On Recent Trends in Advanced Computing Organized by the Department of Computer Science Vidyasagar University.2012Department of Computer Science Vidyasagar University.  Impact Factor:
Indexing:
Article's Web Link:
Cellular Automata for Image noise reduction using Neighbor pixelAdvanced Communication Systems and Design Techniques (NCACD-2011), pp. 130-137.2011Conference Proceeding, Department of ECE, Haldia Institute of Technology, Haldia  Impact Factor:
Indexing:
Article's Web Link:
Text Classifiers and Performance IssuesConference Proceeding of National Seminar on Data Mining & Decision Support, pp.51-59,Computer Centre, Vidyasagar University, Midnapore-721102.2010Computer Centre, Vidyasagar University.  Impact Factor:
Indexing:
Article's Web Link:
An Extension of Nave Bayes Classifier using Frequent Closed Item setsTwo days National Conference on “Ubiquitous Computing 2009”, Organized by R&D Cell of Guru Nanak Institute of Technology, 157/F, Nilgunj Road, Panihati, Sodpur, Kolkata-7001142009GNIT, Sodpur, Kolkata  Impact Factor:
Indexing:
Article's Web Link:
Expression and Pose Variant Face Image Identification Under Different Illumination Condition Using EBGMTwo days National Conference on “Ubiquitous Computing 2009”, Organized by R&D Cell of Guru Nanak Institute of Technology, 157/F, Nilgunj Road, Panihati, Sodpur, Kolkata-7001142009GNIT, Sodpur, Kolkata  Impact Factor:
Indexing:
Article's Web Link:
A Scheme To Improve The Security Using Diffie-Helmann’s Key Distribution Scheme Coupling With RSA AlgorithmNational Conference on Broad Band Integrated Digital Systems And Networks -2005, NIEC, Shatri Park, New Delhi-1100532005NIEC, New Delhi.  Impact Factor:
Indexing:
Article's Web Link:


Other Publication
TitlePublished inPublished onPublished byRoleDetails
A Hybrid System for Mood Recognition of Face Images using DS Theory and Fuzzy LogicProceedings of the Workshop on Multimedia System & Communication, ISM, Dhanbad.2004ISM, Dhanbad  Impact Factor:
Indexing:
Article's Web Link:


Book Published



Book Chapter Published

Ph. D. Thesis Guidence
Ongoing / Submitted Ph. D. Thesis
Scholar NameThesis TitleCo SupervisorStatusComplete in Year
Debasish PatraLearning Based Approach for Detectionof Fake News and ImagesNAOngoing0
Sudip MeikapDevelopment of Pixel Value Ordering (PVO) Based Data Hiding TechniquesNAOngoing0
Debkumar BeraDesign and Analysis of Data Hiding Techniques for Encrypted ImagesNAOngoing0
Alok HalderDevelopment of Data Hiding Techniquesfor Intellectual Property Rights (IPR)NAOngoing0
Prasenjit BeraAnalysis and Measures of Fake News Detection for Social MediaNAOngoing0


Awarded Ph. D. Thesis
Scholar NameThesis TitleCo SupervisorStatusComplete in Year
Partha ChowdhuriDesign and Analysis of Image Steganographic ProtocolDr. Debasis Giri, MAKAUTAwarded2021
Sourav KaityPrioritization of Multi-Sensor Tracked DataDr. P K Das Gupta, DRDOAwarded2021
Soamdeep SinghaDesign of An Effective Congestion Control Routing Protocol forMobile-Ad-Hoc NetworkDr. Niranjan Kumar MandalAwarded2021
Pabitra PalDesign of Reversible Watermarking Techniques in Spatial DomainDr. Jaydeb Bhaumik, JUAwarded2020
Prabhash Kumar SinghDesign and Analysis of Robust Data Hiding Protocols for Multimedia SecurityDr. Kakali DattaAwarded0

Project Work



Completed Project Works
Project titleWorked asFunding AgencyAmount in Rs.Duration in yearsPeriod
Year to Year
Status
Fake Image and News Detection on Social Media Through Trustware Based Community PortalPISERB20240203 year20192022
Prospects of Growth of IT/ITes in an Urban periphery: A Sociological studyCo- InvestigatorUGC620002 year20152017
Some Security Solutions based on Image Steganographic TechniquesPrincipal InvestigatorUGC1250002 year20152017

Invited Lectures 
TitleOrganized byVenueYear
Dual Image AuthenticationOne Week FDP on Image Authentication, WSN & IoT organised by JIS College of Engineering, West BengalWebinar2020
Steganography: an art of hidden communicationDepartment of Mathematics and Computer Science, Mahishadal Raj College.Mahishadal Raj College, Purba Midnapore2020
Watermarking SchemesEgra SSB College, Paschim MedinipurEgra SSB College, Paschim Medinipur2020
Reversible Data Hiding SchemesDepartment of Computer Applications, Sikkim University, Gangtok, Sikkim, IndiaSikkim University, Gangtok, Sikkim, India2020
MATLAB and its ApplicationsDepartment of Mathematics, Kharagpur College, WB, IndiaKharagpur College, WB, India2020
Machine Learning and Its Trending ApplicationsDepartment of Computer Science and Application, Hijli College, Kharagpur, Paschim Medinipur WBKharagpur, Paschim Medinipur WB2020
Machine Learning and SteganographyDepartment of Computer Science and BCA Kharagpur College, WB, IndiaKharagpur College, WB, India2020
Changing Times and New ClassroomsOrganized by the WBCUPA, South 24 PGSWBCUPA, South 24 PGS2020
Emerging Need of Digital Education in the Context of Covid -19 PandemicOrganized by the Department of BCA, Garhbeta College, WBGarhbeta College, WB2020
Multimedia SecuritySikkim University, Gangtok, Sikkim, IndiaSikkim University, Gangtok, Sikkim, India2020
Steganography -An Art of Hidden CommunicationGuru Nanak Institute Of Technology (GNIT) KolkataKolkata2020
Cyber Security used in Asian BusinessBIBS, Kolkata with Vidyasagar University at Dubai, United Arab EmiratesDubai, United Arab Emirates2019
Data Hiding SchemesSilda Chandra Sekhar Colleg, Silda, Jhargram, West BengalSilda, Jhargram, West Bengal2019
Fake Image and News Detection on Social Media Through Trust-ware Based Community PortalBiswa Bangla Convention Center, KolkataBiswa Bangla Convention Center, Kolkata2019
Steganography: an art of hidden communicationDepartment of Computer Science and BCA, Belda College, Paschim MedinipurBelda College, Paschim Medinipur2019
Secure Reversible Data Hiding ApproachThe Department of Computer Science, Belda College, Midnapore, West Bengal, IndiaBelda College, Midnapore, West Bengal, India2019
Image Steganography- An art of hidden communicationDepartment of Computer and Information Science (DCIS), Raiganj University, West Bengal, RaiganjRaiganj University, West Bengal, Raiganj2019
Steganography-an art of Hidden CommunicationDepartment of BCA, Silda Chandra Sekhar College, Silda, West Bengal, India.Silda Chandra Sekhar College, Silda.2019
Special lecture on “Steganography –An art of hidden communication”Bangabasi Morning College, 19, Rajkumar Chakraborty Sarani, Kolkata- 700009 on 19th November 2016.Bangabasi Morning College2016
Steganography-an art of hidden communicationDepartment of Computer Science and Application, Hijli College, Midnapore-721306Hijli College2015
Emerging Trend on Computer ScienceDepartment of Computer Science, Belda College, Belda, Paschim Midnapore, West BengalBelda College2014
C Language and its ApplicationsDepartment of Mathematics, Kharagpur College, Inda, Kharagpur, Paschim Medinipur, West Bengal, IndiaKharagpur College2012
Call Admission Control in Mobile Cellular NetworkDepartment of Computer Science, Vivekananda Mission Mahavidyalaya , Chaitanyapur, Purba Medinipur, Pin-721645 West BengalVivekananda Mission Mahavidyalaya2009

Membership of Learned Society 
Computer Society of India (CSI), Membership No. I1510360

Association with Professional Bodies
Type of Professional ActivityPeriod
Reviewer of the International Journal of Security and Communication Networks, Hindawi Publishing Corporation.2016 to 2016
Reviewer of the International Journal of Network Security (IJNS),ISSN 1816-353X (Print), ISSN 1816-3548 (Online), Impact Factor: 1.39212015 to 2015
Technical Committee Member, International Symposium on Advanced Computing and Communication(ISACC)-2015 which was held on 14-15 September,2015 in the Department of Computer Science and Engineering,Assam University, Silchar, Assam, India.2015 to 2015
Reviewer of the International Conference on Intelligent Computing and Communication (ICIC2-2016), February 18-19, 2016, Organized by the Faculty of Engineering, Management and Technology, University of Kalyani, West Bengal, India2016 to 2016
Reviewer of the International Journal , IETE Technical Review2018 to 2019
Reviewer of Engineering Science and Technology, an International Journal, Elsevier,2018 to 2019
Reviewer of “2nd International Conference on Information Technology and Applied Mathematics (ICITAM 2019)” is going to be a premier conference which is being organized during March 07-09, 2019 at Haldia Institute of Technology, India. ICITAM 2019”2018 to 2019
Reviewer of “CICBA 2018” Kalyani Government Engineering College, Kalyani, West Bengal, India on July 27-28, 2018”2018 to 2018
Reviewer of “Optik- International Journal for Light and Electron Optics”- Elsevier, IF- 1.1912018 to 2018
Reviewer of “IEEE Access -Multidisciplinary Open Access Journal” IEEE, IF- 3.5572018 to 2019
Reviewer of “1st International Conference on Contemporary Advances in Innovative & Applicable Information Technology (ICCAIAIT-2018)” Organized by Kingston Educational Institute, Berunanpukuria, Barasat, Kolkata-7000126, March 24-25, 20182018 to 2018
11. Reviewer of “CSI2017 (International Conference on Social Transformation - Digital Way)” – 19-21 January, 2018, Kolkata.2017 to 2017
Reviewer of The Visual Computer, International Journal of Computer Graphics, Springer (IF-1.036)2018 to 2019
Reviewer of Future Generation Computer Systems, The International Journal, Elsevier, (IF-4.639)2018 to 2019
Technical Program Committee Member of the “Online Conference on Green Communication, Network and Systems (OGCNS-2018)”, July 7, 2018, India.2017 to 2017
Technical Program Committee Member of the “International Conference on Information Technology and Applied Mathematics (ICITAM 2017)” October 30-Nvember 01, 2017 at Haldia Institute of Technology, India.2017 to 2017
Reviewer of “International Conference on Computer, Electrical & Communication Engineering (ICCECE-2017)” 16-17, December-2106, Techno India University, Kolkata, West Bengal India.2016 to 2017

Conference /Seminar/Workshop Attended/Organised

Conference /Seminar/Workshop Attended

Title of the Seminar/Conference/WorkshopYearRoleHeld at and Organiser
International Conference on Politics, Trade and Business in Asia-The 21st Century2019Paper PresenterDubai, United Arab Emirates
International Conference On Computational Intelligence In Pattern Recognition (CIPR 2019)2019Paper PresenterIndian Institute Of Engineering Science And Technology, Shibpur, 19th-20th January 2019.
Young Scientists’ Conference, A part of India International Science Festival -2019.2019Paper PresenterBiswa Bangla Convention Centre, Kolkata, West Bengal, India.
International Conference on Innovations in Computer Science, (ICICS-2018)2018AuthorThe Department of Computer Science, The University of Burdwan, West Bengal, India
International Conference on Communication, Devices, and Computing (ICCDC 2017)2017AuthorHaldia, India during November 2-3, 2017.
First International Conference on “Intelligent Computing and Communication (ICIC2-2016)”, February 18-19, 20162016Paper PresenterUniversity of Kalyani, West Bengal, India
Third International Conference on Computing and Systems (ICCS - 2016), January 21-22, 20162016Paper PresenterDepartment of Computer Science, The University of Burdwan, Burdwan, West Bengal, India
International Conference on Computer and Management (ICCM - 2015), December 16-17, 20152015Paper PresenterOrganized by the Center for Global Management, California State University, USA and International Association of Academicians (IAASSE), Jaipur, Rajasthan, India
International Conference on Mathematics and Computing (ICMC – 2015)2015Paper PresenterHaldia Institute of Technology ICARE Complex, HIT Campus, Hatiberia, Haldia Purba Medinipur, West Bengal – 721657, India, January 05-10, 2015
National Seminar on Information Technology-20152015Resource PersonDepartment of Computer Science and Application, Hijli College, Midnapore-721306 on 7/10/2015
Use of ICT in Teaching –Learning process2014ParticipatedNational Institute of Technical Teacher’s Training and Research (NITTTR) Kolkata-700106 from 04th August 2014 to 08th August 2014
International Conference on Mathematical Sciences – 20142014Paper PresenterSchool of Mathematics, Madurai Kamaraj University, Madurai, Tamil Nadu, India
International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT-2014)2014Paper PresenterKrishna Institute of Engineering & Technology, Ghaziabad, India
IMRF Overseas Conference2014Paper PresenterIMRF at Thailand, Hotel DVaree, Jomtien Beach Road, Pattya City, Chonburi,Thailand-20260
Workshop on Algorithms2014ParticipatedDepartment of Information Technology, National Institute of Technology Durgapur, during 22nd -26th January, 2014.
International Conference on Mathematics and Computing(ICMC – 2013)2013ParticipatedHaldia Institute of Technology ICARE Complex, HIT Campus, Hatiberia, Haldia Purba Medinipur, West Bengal – 721657, India
Two days Zonal Seminar on “ ICT in Present Wireless Revolution: Challenges and Issues”2013Paper PresenterThe IETE, Kolkata Centre, Saltlake, Kolkata, west Bengal, India
National Conference on Recent Trends in Mathematical Sciences and Their Applications( NCRTMSA-2012)2012Paper PresenterFaculty of Engineering & Technology, Mody Institute of Technology & Science, Lakshmangarh-332311, Sikar, Rajasthan, India
Three days State Level Work Shop on” C Language and its Applications”2012Invited SpeakerDepartment of Mathematics, Kharagpur College, Inda, Kharagpur, Paschim Medinipur, West Bengal, India
National Seminar on Emerging Trends in Mathematics2012ParticipantVidyasagar University In collaboration with Calcutta Mathematical Society, Midnapore-721102, West Bengal
National Conference on Advanced Communication Systems and Design Techniques (NCACD) , November 5-6, 2011.2011ParticipantDepartment of Electronics and Communication Engineering HALDIA INSTITUTE OF TECHNOLOGY, Haldia, Purba Medinipur, West Bengal PIN: 721657, India
The International Conference on Information Security and Assurance [ISA-2010] , June 23 - 25, 2010.2010Paper PresenterSheraton Grande Ocean Resort, Miyazaki, Japan
State Level Seminar on “ Call Admission Control in Mobile Cellular Network” , 15th January, 2009.2009Invited Speaker.Deaprtment of Computer Science, Vivekananda Mission Mahavidyalaya , Chaitanyapur, Purba Medinipur, Pin-721645 West Bengal.
Workshop on “ Researching Distance and Online Learning “ October 03-05, 2007.2007ParticipantIGNOU Regional Centre, Bhubaneswar & STRIDE, IGNOU, New Delhi. At IGNOU Regional Centre, Bhubaneswar.
1st IEEE-International Conference on Signal and Image Processing (IEEE-ICSIP-06),2006Paper Presenter B V Bhoomaraddi College of Engineering and Technology, Hubli, Karnataka, India
Eastern Regional Students Convention , CSI-2002.2002ParticipantComputer Society of India (CSI), Kolkata Chapter
International Workshop on Distributed Computing2001ParticipantDepartment of Computer Science & Engineering , Calcutta University


Conference /Seminar/Workshop Organised

Title of the Conference/Seminar/WorkshopYearRole in the EventFunding Agency
3rd National Seminar on Advanced Computation, Algorithm and Security (ACAS-2K18), 29th March, 2018, Organized by the Department of Computer Science, Vidyasagar University2018Member of Organizing CommitteUGC
2nd National Seminar on Advanced Computation, Algorithm and Security (ACAS-2K17), 30th March, 2017, Organized by the Department of Computer Science, Vidyasagar University2017Member of Organizing CommitteUGC
National Seminar on Advanced Computation, Algorithm and Security (ACAS-2K16), 29th – 30th March, 2016, Organized by the Department of Computer Science, Vidyasagar University2016Joint Organizing SecretaryUGC
UGC Sponsored National Seminar on Emerging Trends in Mathematics Organised by Vidyasagar University In collaboration with Calcutta Mathematical Society, Midnapore-721102, West Bengal2012Member of Organizing CommitteeUGC
National Seminar On Recent Trends in Advanced Computing Organized by Department of Computer Science, Vidyasagar University2012Organizing SecretaryUGC
Workshop on .(DOT) Net Technology Organized by Department of Computer Science, Vidyasagar University, February 15-19, 2010.2010Joint SecretaryUGC
National Seminar on Data Mining & Decision Support Organized by Computer Centre, Vidyasagar University, March 4-5, 2010.2010Member of Organizing CommitteeUGC
National Seminar On Next Generation Computing Organized by Department of Computer Science, Vidyasagar University, March 30-31st , 2010.2010Joint SecretaryUGC
National Seminar on Image Classification & Pattern Recognition Organized by Department of Computer Science, Vidyasagar University, 26-27th March, 2009.2009Organizing SecretaryUGC

Awards
Award NameAwarded ByYear
Best Paper Award, in The International Conference at Calcutta Business School, Kolkata on March 24-25, 2017Springer2017

Disclaimer : The information on this website has been prepared with the greatest possible care and the aim is to keep all information up-to-date. The University cannot gurantee the correctness, completeness, topicality or quality of the information presented. In the event of doubt concerning the content of the website, please contact the relevant faculty.