Suvamoy Changder

Orcid: 0000-0002-4733-2323

According to our database1, Suvamoy Changder authored at least 29 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A novel approach using deep convolutional neural network to classify the photographs based on leading-line by fine-tuning the pre-trained VGG16 neural network.
Multim. Tools Appl., January, 2024

2023
A unique database synthesis technique for coverless data hiding.
J. Vis. Commun. Image Represent., October, 2023

A Two Fold Secure Cover Synthesis Based Data Hiding Approach by Generating Sequences.
Wirel. Pers. Commun., September, 2023

Sensor-based continuous user authentication on smartphone through machine learning.
Microprocess. Microsystems, February, 2023

Continuous user authentication on smartphone via behavioral biometrics: a survey.
Multim. Tools Appl., 2023

An improved location mapping and cover synthesis based data hiding by model SSSP problem generation.
Multim. Tools Appl., 2023

Quantum Image Teleportation Based on Probabilistic Bit-Encoding Strategy.
Proceedings of the Pattern Recognition and Machine Intelligence, 2023

2022
Photo classification based on the presence of diagonal line using pre-trained DCNN VGG16.
Multim. Tools Appl., 2022

2021
A novel and efficient amino acid codon based medical image encryption scheme colligating multiple chaotic maps.
Multim. Tools Appl., 2021

Deep Photo Classification Based on Geometrical Shape of Principal Object Presents in Photographs via VGG16 DCNN.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021

2020
Perceptual accessible image encryption scheme conjugating multiple chaotic maps.
IET Image Process., 2020

2019
A New Bi-Level Encoding and Decoding Scheme for Pixel Expansion Based Visual Cryptography.
Int. J. Rough Sets Data Anal., 2019

2018
Watermarking through image geometry change tracking.
Vis. Informatics, 2018

Performance analysis of image steganalysis techniques and future research directives.
Int. J. Inf. Comput. Secur., 2018

A novel smooth texture-based visual cryptography approach for secure communication.
Int. J. Electron. Secur. Digit. Forensics, 2018

2017
Handling workload skew in a consistent hashing based partitioning implementation.
Proceedings of the 2017 International Conference on Advances in Computing, 2017

2015
A map-based image steganography scheme for RGB images.
Int. J. Inf. Comput. Secur., 2015

2014
Architecting Software as a Service for Data Centric Cloud Applications.
Int. J. Grid High Perform. Comput., 2014

Image realization steganography with LCS based mapping.
Proceedings of the Seventh International Conference on Contemporary Computing, 2014

2013
Web service execution model for cloud environment.
ACM SIGSOFT Softw. Eng. Notes, 2013

Trust Management Model for Cloud Computing Environment
CoRR, 2013

Selection of Services for Data-Centric Cloud Applications: A QoS Based Approach.
Proceedings of the 2013 2nd International Conference on Advanced Computing, 2013

2011
A Greedy Approach to Text Steganography Using Properties of Sentences.
Proceedings of the Eighth International Conference on Information Technology: New Generations, 2011

2010
Hindi text steganography - An approach to information hiding.
J. Comput. Methods Sci. Eng., 2010

Text Steganography in Indian Scripts using Compound Characters.
Proceedings of the ISCA 25th International Conference on Computers and Their Applications, 2010

2009
A new approach for steganography in Bengali text.
J. Comput. Methods Sci. Eng., 2009

New Techniques and Algorithms for Text Steganography through Hindi Text.
Proceedings of the 18th International Conference on Software Engineering and Data Engineering (SEDE-2009), 2009

A New Approach to Hindi Text Steganography by Shifting Matra.
Proceedings of the ARTCom 2009, 2009

2008
An Approach to Bengali Text Steganography.
Proceedings of the 17th International Conference on Software Engineering and Data Engineering (SEDE-2008), June 30, 2008


  Loading...