Debnath Bhattacharyya

According to our database1, Debnath Bhattacharyya
  • authored at least 35 papers between 2006 and 2017.
  • has a "Dijkstra number"2 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
An improved brain MR image binarization method as a preprocessing for abnormality detection and features extraction.
Frontiers of Computer Science, 2017

An effective method for computerized prediction and segmentation of multiple sclerosis lesions in brain MRI.
Computer Methods and Programs in Biomedicine, 2017

Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions.
IEEE Access, 2017

2015
A Novel Prototype Decision Tree Method Using Sampling Strategy.
Proceedings of the Computational Science and Its Applications - ICCSA 2015, 2015

2013
A GA based audio steganography with enhanced security.
Telecommunication Systems, 2013

Cell-graph coloring for cancerous tissue modelling and classification.
Multimedia Tools Appl., 2013

2011
Supervised chromosome clustering and image classification.
Future Generation Comp. Syst., 2011

Context Based Speech Analysis of Bengali Language as a Part of TTS Conversion.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

New Algorithm for Skewing Detection of Handwritten Bangla Words.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

Use of Artificial Neural Network in Bengali Character Recognition.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

Watermarking Using Multiresolution Cosine Transformation: A Review.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

Leaf Image Analysis towards Plant Identification.
Proceedings of the Signal Processing, Image Processing and Pattern Recognition, 2011

2010
A Comparative Study of Wireless Sensor Networks and Their Routing Protocols.
Sensors, 2010

Biometric Authentication Using Infrared Imaging of Hand Vein Patterns.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Lane Design for Speed Optimization.
Proceedings of the Information Security and Assurance - 4th International Conference, 2010

Directed Graph Pattern Synthesis in LSB Technique on Video Steganography.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Hierarchical Data Structures for Accessing Spatial Data.
Proceedings of the Signal Processing and Multimedia, 2010

OSI Layer Wise Security Analysis of Wireless Sensor Network.
Proceedings of the Signal Processing and Multimedia, 2010

Identification of Plant Using Leaf Image Analysis.
Proceedings of the Signal Processing and Multimedia, 2010

2009
Vascular Pattern Analysis towards Pervasive Palm Vein Authentication.
J. UCS, 2009

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation.
IJCNS, 2009

Grayscale Image Classification Using Supervised Chromosome Clustering.
Proceedings of the Security Technology, 2009

Analysis of Handwritten Signature Image.
Proceedings of the Security Technology, 2009

Effective GIS Mobile Query System.
Proceedings of the Future Generation Information Technology, 2009

Refine Crude Corpus for Opinion Mining.
Proceedings of the First International Conference on Computational Intelligence, 2009

Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission Scheme.
Proceedings of the First International Conference on Computational Intelligence, 2009

Discrete Fourier Transformation based Image Authentication technique.
Proceedings of the 8th IEEE International Conference on Cognitive Informatics, 2009

2008
A Secure Scheme for Image Transformation.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

Handwritten Signature Authentication Using Statistical Estimation.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

2007
Handwritten Signature Extraction from Watermarked Images using Genetic Crossover.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

A Flexible ANN System for Handwritten Signature Identification.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Handwritten Signature Authentication Scheme using Integrated Statistical Analysis of Bi-Color Images.
Proceedings of the Selected Papers of the Fifth International Conference on, 2007

Handwritten Signature Verification System using Morphological Image Analysis.
Proceedings of the 22nd International Conference on Computers and Their Applications, 2007

2006
Secure delivery of handwritten signature.
Ubiquity, 2006

Mosquito attack optimization.
Ubiquity, 2006


  Loading...