scispace - formally typeset
Search or ask a question
Institution

Heritage Institute of Technology

About: Heritage Institute of Technology is a based out in . It is known for research contribution in the topics: Steganography & Support vector machine. The organization has 581 authors who have published 1045 publications receiving 8345 citations.


Papers
More filters
Book ChapterDOI
01 Jan 2021
TL;DR: In this paper, the existence of a post-disaster opportunistic network framework is discussed, which comprises two entities, such as opportunistic networks architecture and energy-efficient routing protocols.
Abstract: In order to offer the post-disaster management services discussed in the last two chapters, the existence of a post-disaster opportunistic network framework becomes crucial. A post-disaster opportunistic network framework comprises two entities, such as opportunistic network architecture and energy-efficient post-disaster routing protocols. The post-disaster opportunistic network architecture typically includes suitable network architecture and node deployment plans which are elaborated in this chapter.

1 citations

Proceedings ArticleDOI
17 Mar 2021
TL;DR: In this paper, a deep neural network based architecture is proposed to identify the source of Facebook and whatsApp images using InceptionV3 model, which is a 48-layers deep.
Abstract: Source Identification is the forensic problem of source device detection of digital images/videos/audio. In this paper, we deal with the problem of Source Camera Identification (SCI) of digital images. The existing forensic techniques of image source identification fail in source identification of images taken from Social Networking platforms, mainly due to the inherent compression characteristics induced in to those images. In this work, deep neural network based architecture is proposed to identify the source of Facebook and whatsApp images. We used InceptionV3 model, which is a 48-layers deep. It surpasses the state-of-the-art performance in terms of online source networks (OSN) image source identification accuracy. We considered smart phone devices in this work for our experiments, and present our results on the recently published VISION dataset.

1 citations

Book ChapterDOI
01 Jan 2014
TL;DR: A deft method for image– secret data – keyword (steg key) based sampling, encryption and embedding the former with a variable bit retrieval function is proposed, resulting in a highly secure, reliable L.B.S. substitution.
Abstract: We have explored a new dimension in image steganography and propose a deft method for image– secret data – keyword (steg key) based sampling, encryption and embedding the former with a variable bit retrieval function. The keen association of the image, secret data and steg key, varied with a pixel dependant embedding results in a highly secure, reliable L.S.B. substitution. Meticulous statistical analyses have been provided to emphasize the strong immunity of the algorithm to the various steganalysis methods in the later sections of the paper.

1 citations

Book ChapterDOI
01 Jan 2015
TL;DR: This chapter presents some emerging purification and isolation techniques, such as, magnetic fishing, aqueous two-phase system, and ion-exchange membrane chromatography, which are described in detail in this chapter.
Abstract: Being the fourth step of the 5-Stage Universal Recovery Process, isolation and purification of target compounds become more compact, environmental friendly, and cost effective, producing pure end-products. This chapter presents some emerging purification and isolation techniques, such as, magnetic fishing, aqueous two-phase system, and ion-exchange membrane chromatography. In the presence of magnetic particles, solutes are separated due to their selective affinity and recovered by suitable buffer. On the other hand, the aqueous two-phase system is a liquid/liquid partitioning technique, comprising two types of phase-forming components. Finally, Ion-exchange membrane chromatography is a technique where biomolecules (mostly protein) are separated due to their ionic charge (adsorbtion and elusion by pH of buffer). The features of these technologies are dsecribed in detail in this chapter.

1 citations

Proceedings ArticleDOI
01 Dec 2012
TL;DR: In this paper, electrical impedance tomography (EIT) is applied to determine the shape, size and position of unwanted growth within a specified area, which is used to identify the presence of such objects within a particular area and also figure out the shape of the same.
Abstract: In this paper, electrical impedance tomography (EIT), a method of imaging the interior permittivity distribution of an object by measuring current and voltage at the surface is applied for determining the shape, size and position of unwanted growth within a specified area. The model, we have developed, is used to identify the presence of such objects within the particular area and can also figure out the shape of the same. Here, small objects having different shapes and with different material permittivity are designed inside a closed region. Then a potential difference on the boundaries of the box gives rise to a surface charge density that varies depending on the permittivity distribution inside the box. By investigating at the surface charge density the shape of the different materials inside the box is determined. The overall designing and study was carried out using FEM based simulation platform.

1 citations


Authors

Showing all 581 results

NameH-indexPapersCitations
Debnath Bhattacharyya395786867
Samiran Mitra381985108
Dipankar Chakravorty353695288
S. Saha Ray342173888
Tai-hoon Kim335264974
Anindya Sen291093472
Ujjal Debnath293353828
Anirban Mukhopadhyay291693200
Avijit Ghosh281212639
Mrinal K. Ghosh26642243
Biswanath Bhunia23751466
Jayati Datta23551520
Nabarun Bhattacharyya231361960
Pinaki Bhattacharya191141193
Dwaipayan Sen18711086
Network Information
Related Institutions (5)
National Institute of Technology, Rourkela
10.7K papers, 150.1K citations

87% related

Jadavpur University
27.6K papers, 422K citations

86% related

Indian Institute of Technology Guwahati
17.1K papers, 257.3K citations

86% related

Indian Institutes of Technology
40.1K papers, 652.9K citations

85% related

Indian Institute of Technology Roorkee
21.4K papers, 419.9K citations

85% related

Performance
Metrics
No. of papers from the Institution in previous years
YearPapers
20227
2021110
202087
201992
201883
2017103