G
Goutam Ghosh
Researcher at University of Calcutta
Publications - 13
Citations - 228
Goutam Ghosh is an academic researcher from University of Calcutta. The author has contributed to research in topics: Digital watermarking & Encryption. The author has an hindex of 6, co-authored 13 publications receiving 222 citations.
Papers
More filters
Journal ArticleDOI
Polyaniline-poly(vinyl alcohol) conducting composite : material with easy processability and novel application potential
TL;DR: In this paper, an easy route for synthesis of polyaniline (PAn) in stable aqueous solution/dispersion form, using poly(vinyl alcohol) (PVA) as an efficient steric stabilizer.
Journal ArticleDOI
Biomedical Image Watermarking in Wavelet Domain for Data Integrity Using Bit Majority Algorithm and Multiple Copies of Hidden Information
TL;DR: Experimental results of the proposed watermarking technique show much enhancement in the visual and statistical invisibility of hidden information after data recovery that supports the improvement in performance.
Book ChapterDOI
A Novel Digital Image Watermarking Scheme for Data Security Using Bit Replacement and Majority Algorithm Technique
TL;DR: Digital Watermarking is a technique which allows an individual to add hidden copyright notices or other verification messages or even classified information to digital media.
Journal ArticleDOI
Reversible Digital Image Watermarking Scheme Using Bit Replacement and Majority Algorithm Technique
TL;DR: In this paper an indigenous approach is described for recovering the data from the damaged copies of the data under attack by applying a majority algorithm to find the closest twin of the embedded information.
Journal ArticleDOI
A Comparative Study between LSB and Modified Bit Replacement (MBR) Watermarking Technique in Spatial Domain for Biomedical Image Security
TL;DR: The superiority of the proposed modified bit replacement scheme over the LSB technique is indicated through evaluation of image quality metrics that shows much enhancement in the visual and statistical invisibility of hidden data.