P
Partha Pratim Sarkar
Researcher at Kalyani Government Engineering College
Publications - 208
Citations - 1828
Partha Pratim Sarkar is an academic researcher from Kalyani Government Engineering College. The author has contributed to research in topics: Microstrip antenna & Patch antenna. The author has an hindex of 20, co-authored 200 publications receiving 1493 citations. Previous affiliations of Partha Pratim Sarkar include West Bengal University of Technology.
Papers
More filters
Journal ArticleDOI
A novel technique for image steganography based on Block-DCT and Huffman Encoding
TL;DR: A novel technique for Image steganography based on Block-DCT, where DCT is used to transform original image (cover image) blocks from spatial domain to frequency domain, which shows that the algorithm has a high capacity and a good invisibility.
Proceedings ArticleDOI
Image encryption using affine transform and XOR operation
Amitava Nag,Jyoti Prakash Singh,Srabani Khan,Saswati Ghosh,Sushanta Biswas,D. Sarkar,Partha Pratim Sarkar +6 more
TL;DR: The experimental results proved that after the affine transform the correlation between pixel values was significantly decreased and the total key size used in the algorithm is 64 bit which proves to be strong enough.
Journal ArticleDOI
A novel Neuro-fuzzy classification technique for data mining
TL;DR: The proposed Neuro-fuzzy classification technique, which utilized a fuzzification matrix, proved to be superior to RBFNN and ANFIS algorithms in every aspect.
Posted ContentDOI
Analysis of a Nature Inspired Firefly Algorithm based Back-propagation Neural Network Training
TL;DR: The proposed work using meta-heuristic Nature Inspired algorithm is applied with back-propagation method to train a feed-forward neural network and it is observed that proposed method consumes less time to converge and providing improved convergence rate with minimum feed- forward neural network design.
Proceedings Article
An image steganography technique using X-box mapping
TL;DR: A novel technique for Image steganography based on LSB using X-box mapping where several X-boxes having unique data are used where this provides sufficient security to the payload because without knowing the mapping rules no one can extract the secret data.