Samir Kumar Bandyopadhyay

Orcid: 0000-0002-4868-3459

According to our database1, Samir Kumar Bandyopadhyay authored at least 46 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Brain Tumour Segmentation Using S-Net and SA-Net.
IEEE Access, 2023

2021
A New Combinational Technique in Image Steganography.
Int. J. Inf. Secur. Priv., 2021

2020
Breast Cancer Prediction Using Stacked GRU-LSTM-BRNN.
Appl. Comput. Syst., 2020

2019
Multi-bit robust image steganography based on modular arithmetic.
Multim. Tools Appl., 2019

Image feature based high capacity steganographic algorithm.
Multim. Tools Appl., 2019

2018
Blind Key Based Attack Resistant Audio Steganography Using Cocktail Party Effect.
Secur. Commun. Networks, 2018

Audio Transmission of Medical Reports for Visa Processing: A Solution for the Spread of Communicable Diseases by the Immigrant Population.
IEEE Consumer Electron. Mag., 2018

Secure Communication through Double Layer Security with Efficient Key Transmission.
Proceedings of the International Conference on Information Technology, 2018

2017
An improved brain MR image binarization method as a preprocessing for abnormality detection and features extraction.
Frontiers Comput. Sci., 2017

An effective method for computerized prediction and segmentation of multiple sclerosis lesions in brain MRI.
Comput. Methods Programs Biomed., 2017

Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions.
IEEE Access, 2017

2016
Multi-bit Data Hiding in Randomly Chosen LSB Layers of an Audio.
Proceedings of the 2016 International Conference on Information Technology, 2016

2014
Contour Extraction and Segmentation of Cerebral Hemorrhage from MRI of Brain by Gamma Transformation Approach.
Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2014

2013
Mammographic density estimation and Classification using Segmentation and Progressive Elimination Method.
Int. J. Image Graph., 2013

A Review on Automated Brain Tumor Detection and Segmentation from MRI of Brain.
CoRR, 2013

Personal Identification from Lip-Print Features using a Statistical Model.
CoRR, 2013

Feature Extraction of Human Lip Prints.
CoRR, 2013

2012
Identifications of concealed weapon in a Human Body
CoRR, 2012

Technique for preprocessing of digital mammogram.
Comput. Methods Programs Biomed., 2012

2011
Supervised chromosome clustering and image classification.
Future Gener. Comput. Syst., 2011

2010
An Alternative Approach of Steganography using Reference Image
CoRR, 2010

A Novel Steganographic Technique Based on 3D-DCT Approach.
Comput. Inf. Sci., 2010

Model Based User's Access Requirement Analysis of E-Governance Systems.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Extraction of Features from Signature Image and Signature Verification Using Clustering Techniques.
Proceedings of the Security-Enriched Urban Computing and Smart Grid, 2010

Identification of Plant Using Leaf Image Analysis.
Proceedings of the Signal Processing and Multimedia, 2010

Digital Imaging in Pathology towards Detection and Analysis of Human Breast Cancer.
Proceedings of the Second International Conference on Computational Intelligence, 2010

Feature Extraction and Analysis of Breast Cancer Specimen.
Proceedings of the Advanced Communication and Networking - Second International Conference, 2010

2009
Vascular Pattern Analysis towards Pervasive Palm Vein Authentication.
J. Univers. Comput. Sci., 2009

Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation.
Int. J. Commun. Netw. Syst. Sci., 2009

Image Based Analysis of Tomato Leaves to Determine the Number of Petioles.
Proceedings of the First International Conference of Soft Computing and Pattern Recognition, 2009

Grayscale Image Classification Using Supervised Chromosome Clustering.
Proceedings of the Security Technology, 2009

Analysis of Handwritten Signature Image.
Proceedings of the Security Technology, 2009

Refine Crude Corpus for Opinion Mining.
Proceedings of the First International Conference on Computational Intelligence, 2009

Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission Scheme.
Proceedings of the First International Conference on Computational Intelligence, 2009

Discrete Fourier Transformation based Image Authentication technique.
Proceedings of the 8th IEEE International Conference on Cognitive Informatics, 2009

2008
A Secure Scheme for Image Transformation.
Proceedings of the Ninth ACIS International Conference on Software Engineering, 2008

Handwritten Signature Authentication Using Statistical Estimation.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Analysis of SEM Images of Stomata of Different Tomato Cultivars Based on Morphological Features.
Proceedings of the Second Asia International Conference on Modelling and Simulation, 2008

2007
Handwritten Signature Extraction from Watermarked Images using Genetic Crossover.
Proceedings of the 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 2007

A Flexible ANN System for Handwritten Signature Identification.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Handwritten Signature Authentication Scheme using Integrated Statistical Analysis of Bi-Color Images.
Proceedings of the Selected Papers of the Fifth International Conference on, 2007

Color Texture Analysis of Rice Leaves Diagnosing Deficiency in the Balance of Mineral Levels towards Improvement of Crop Productivity.
Proceedings of the 10th International Conference on Information Technology, 2007

Application of Non Compact Trie Structure in Plant Taxonomy.
Proceedings of the 22nd International Conference on Computers and Their Applications, 2007

Handwritten Signature Verification System using Morphological Image Analysis.
Proceedings of the 22nd International Conference on Computers and Their Applications, 2007

2006
Secure delivery of handwritten signature.
Ubiquity, 2006

Mosquito attack optimization.
Ubiquity, 2006


  Loading...