Papers published on a yearly basis
Papers
More filters
••
TL;DR: This paper presents a method for watermarking Handwritten Signature that achieves robustness by responding to three specific weaknesses: complexity of copy detection, vulnerability to mark removal after revelation for ownership verification, and mark integrity issues due to partial mark removal.
Abstract: A number of researchers have proposed using digital marks to provide ownership (watermarking) identification for the property. One way of data hiding is digital signature, copyright label or digital watermark that completely characterizes the person who applies it and, therefore, marks it as being his property. Digital Watermarking is the process that embeds data called a watermark into an object such that watermark can be detected and extracted later to make an assertion about the object. Watermarking is either "visible" or "invisible". Although visible and invisible are visual terms watermarking is not limited to images, it can also be used to protect other types of multimedia object. Our research work is on watermarking techniques in particular.Many of these proposed techniques share three specific weaknesses: complexity of copy detection, vulnerability to mark removal after revelation for ownership verification, and mark integrity issues due to partial mark removal. This paper presents a method for watermarking Handwritten Signature that achieves robustness by responding to these three weaknesses. The key techniques involve using secure functions to generate and embed image marks that is more detectable, verifiable, and secure than existing protection and detection techniques.
18 citations
••
TL;DR: In this paper, a non-uniformly excited linear arrays are optimized using Taylor distribution and classical particle swarm optimisation (CPSO) algorithm for obtaining desired equal side lobe level (SLL).
Abstract: In this article, non-uniformly excited linear arrays are optimised using Taylor distribution and classical particle swarm optimisation (CPSO) algorithm for obtaining desired equal side lobe level (SLL). Elements of the array are considered to be isotropic in nature with uniform interelement spacing. Excitation amplitudes of each element are taken as optimisation parameters. Taylor distribution defines the range of excitation amplitude in which CPSO algorithm searches for the optimum value of excitation amplitude, with the objective of obtaining desired equal SLL. The proposed method eliminates the initial randomness of defining search space for CPSO algorithm. Comparison with other methods has been made whenever possible. The results reveal that the proposed method can be used to obtain the desired SLL.
18 citations
••
13 Dec 2008TL;DR: A new technique for hiding the data of images is proposed to hide an image file entirely with in another image file keeping two considerations in mind which are Size and Degree of Security.
Abstract: In this paper, a new technique for hiding the data of images has been proposed This method is invented to hide an image file entirely with in another image file keeping two considerations in mind which are Size and Degree of Security At the source, the image which is to be hidden (target image) is encoded at the end of another image (cover image) Double layer security of the hidden image can be achieved (over the untrusted network) by; firstly, the starting point of encoding the image data is depended on the size of the images and it is stored within the encoded image at the end of its header information as a cipher text; secondly, the target image is hidden behind the cover image by following our encrypted image hiding technique
18 citations
••
TL;DR: In this article, a hybrid electrocoagulation and electroflotation enhanced membrane module (ECEFMM) was proposed to expect the benefits of electro-corrosion and electro-flotation with the membrane separation.
Abstract: The present study discusses the simultaneous application of electric field during membrane separation of oil from oily wastewater on eliminating the fouling propensity over the membrane. A novel hybrid electrocoagulation and electroflotation enhanced membrane module (ECEFMM) was proposed here to expect the benefits of electrocoagulation and electroflotation with the membrane separation. The synergistic effect of applied voltage and membrane operation facilitates demulsification for emulsified oily wastewater along with substantial turbulence creation over the membrane surface through hydrogen bubbling. Such turbulence reduces the deposition over the membrane surface that eventually restricts the permeate flux decrease by 43–72 %. Voltage was applied both continuously and periodically, along with a gradual voltage increment in each mode. Further with both the mode of applied voltage, polyethersulfone (PES) and polysulfone (PSf) membrane were employed with each of the modes. It was observed that the permeation of the PES membrane is not substantially affected by the mode of the applied voltage. On the contrary, with relatively low hydrophilic PSf membrane, the permeation is highly dependent on the applied voltage and its mode of application. The minimum flux decline for PSf membrane can be achieved with periodical voltage application at 10 V with substantial oil rejection of 94–96 %.
18 citations
••
01 Dec 2015TL;DR: In this paper it is possible to detect whether a person is wearing a mask or not and the proposed system is also capable of counting the number of people present inside the ATM kiosk and generate a warning signal, thereby removing a constant human supervision.
Abstract: This paper presents an automated system to increase the security and surveillance of ATM kiosks. Due to the increase of robbery in ATM kiosks, it is important to employ an automated surveillance system to protect and secure the ATM machine from threats. Currently, a camera attached with the ATM unit, records and transmits the video feed to the main server of the bank. Around the clock, this manual surveillance utilizes a lot of bandwidth for transmission. There is waste of memory and late response to emergency situation. Consequently, early detection of the situation is necessary to take preventive measures against an ongoing burglary. In this paper it is possible to detect whether a person is wearing a mask or not. The proposed system is also capable of counting the number of people present inside the ATM kiosk and generate a warning signal, thereby removes a constant human supervision, reducing the storage of unnecessary video feed and transmitting only an anomalous situation, a faster response to a threat by shutting down the ATM machine as soon the system detects the threat.
18 citations
Authors
Showing all 581 results
Name | H-index | Papers | Citations |
---|---|---|---|
Debnath Bhattacharyya | 39 | 578 | 6867 |
Samiran Mitra | 38 | 198 | 5108 |
Dipankar Chakravorty | 35 | 369 | 5288 |
S. Saha Ray | 34 | 217 | 3888 |
Tai-hoon Kim | 33 | 526 | 4974 |
Anindya Sen | 29 | 109 | 3472 |
Ujjal Debnath | 29 | 335 | 3828 |
Anirban Mukhopadhyay | 29 | 169 | 3200 |
Avijit Ghosh | 28 | 121 | 2639 |
Mrinal K. Ghosh | 26 | 64 | 2243 |
Biswanath Bhunia | 23 | 75 | 1466 |
Jayati Datta | 23 | 55 | 1520 |
Nabarun Bhattacharyya | 23 | 136 | 1960 |
Pinaki Bhattacharya | 19 | 114 | 1193 |
Dwaipayan Sen | 18 | 71 | 1086 |