scispace - formally typeset
P

Partha Pratim Sarkar

Researcher at Kalyani Government Engineering College

Publications -  208
Citations -  1828

Partha Pratim Sarkar is an academic researcher from Kalyani Government Engineering College. The author has contributed to research in topics: Microstrip antenna & Patch antenna. The author has an hindex of 20, co-authored 200 publications receiving 1493 citations. Previous affiliations of Partha Pratim Sarkar include West Bengal University of Technology.

Papers
More filters
Journal ArticleDOI

A novel technique for image steganography based on Block-DCT and Huffman Encoding

TL;DR: A novel technique for Image steganography based on Block-DCT, where DCT is used to transform original image (cover image) blocks from spatial domain to frequency domain, which shows that the algorithm has a high capacity and a good invisibility.
Proceedings ArticleDOI

Image encryption using affine transform and XOR operation

TL;DR: The experimental results proved that after the affine transform the correlation between pixel values was significantly decreased and the total key size used in the algorithm is 64 bit which proves to be strong enough.
Journal ArticleDOI

A novel Neuro-fuzzy classification technique for data mining

TL;DR: The proposed Neuro-fuzzy classification technique, which utilized a fuzzification matrix, proved to be superior to RBFNN and ANFIS algorithms in every aspect.
Posted ContentDOI

Analysis of a Nature Inspired Firefly Algorithm based Back-propagation Neural Network Training

TL;DR: The proposed work using meta-heuristic Nature Inspired algorithm is applied with back-propagation method to train a feed-forward neural network and it is observed that proposed method consumes less time to converge and providing improved convergence rate with minimum feed- forward neural network design.
Proceedings Article

An image steganography technique using X-box mapping

TL;DR: A novel technique for Image steganography based on LSB using X-box mapping where several X-boxes having unique data are used where this provides sufficient security to the payload because without knowing the mapping rules no one can extract the secret data.