default search action
Samir Kumar Bandyopadhyay
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j18]Sunita Roy, Rikan Saha, Suvarthi Sarkar, Ranjan Mehera, Rajat Kumar Pal, Samir Kumar Bandyopadhyay:
Brain Tumour Segmentation Using S-Net and SA-Net. IEEE Access 11: 28658-28679 (2023) - 2021
- [j17]Sabyasachi Pramanik, Debabrata Samanta, Samir Kumar Bandyopadhyay, Ramkrishna Ghosh:
A New Combinational Technique in Image Steganography. Int. J. Inf. Secur. Priv. 15(3): 48-64 (2021) - 2020
- [j16]Shawni Dutta, Jyotsna Kumar Mandal, Tai-Hoon Kim, Samir Kumar Bandyopadhyay:
Breast Cancer Prediction Using Stacked GRU-LSTM-BRNN. Appl. Comput. Syst. 25(2): 163-171 (2020)
2010 – 2019
- 2019
- [j15]Biswajita Datta, Sudipta Roy, Subhranil Roy, Samir Kumar Bandyopadhyay:
Multi-bit robust image steganography based on modular arithmetic. Multim. Tools Appl. 78(2): 1511-1546 (2019) - [j14]Rajib Biswas, Imon Mukherjee, Samir Kumar Bandyopadhyay:
Image feature based high capacity steganographic algorithm. Multim. Tools Appl. 78(14): 20019-20036 (2019) - 2018
- [j13]Biswajita Datta, Prithwish Kumar Pal, Samir Kumar Bandyopadhyay:
Audio Transmission of Medical Reports for Visa Processing: A Solution for the Spread of Communicable Diseases by the Immigrant Population. IEEE Consumer Electron. Mag. 7(5): 27-33 (2018) - [j12]Barnali Gupta Banik, Samir Kumar Bandyopadhyay:
Blind Key Based Attack Resistant Audio Steganography Using Cocktail Party Effect. Secur. Commun. Networks 2018: 1781384:1-1781384:21 (2018) - [c23]Biswajita Datta, Akash Roy, Romit Dutta, Samir Kumar Bandyopadhyay:
Secure Communication through Double Layer Security with Efficient Key Transmission. ICIT 2018: 126-131 - 2017
- [j11]Raj R. Parmar, Sudipta Roy, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Large-Scale Encryption in the Hadoop Environment: Challenges and Solutions. IEEE Access 5: 7156-7163 (2017) - [j10]Sudipta Roy, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
An effective method for computerized prediction and segmentation of multiple sclerosis lesions in brain MRI. Comput. Methods Programs Biomed. 140: 307-320 (2017) - [j9]Sudipta Roy, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
An improved brain MR image binarization method as a preprocessing for abnormality detection and features extraction. Frontiers Comput. Sci. 11(4): 717-727 (2017) - 2016
- [c22]Biswajita Datta, Prithwish Kumar Pal, Samir Kumar Bandyopadhyay:
Multi-bit Data Hiding in Randomly Chosen LSB Layers of an Audio. ICIT 2016: 283-287 - 2014
- [c21]Sudipta Roy, Piue Ghosh, Samir Kumar Bandyopadhyay:
Contour Extraction and Segmentation of Cerebral Hemorrhage from MRI of Brain by Gamma Transformation Approach. FICTA (2) 2014: 383-394 - 2013
- [j8]Indra Kanta Maitra, Sanjay Nag, Samir Kumar Bandyopadhyay:
Mammographic density estimation and Classification using Segmentation and Progressive Elimination Method. Int. J. Image Graph. 13(3) (2013) - [i5]Saptarshi Bhattacharjee, S. Arunkumar, Samir Kumar Bandyopadhyay:
Personal Identification from Lip-Print Features using a Statistical Model. CoRR abs/1310.0036 (2013) - [i4]Samir Kumar Bandyopadhyay, S. Arunkumar, Saptarshi Bhattacharjee:
Feature Extraction of Human Lip Prints. CoRR abs/1312.0852 (2013) - [i3]Sudipta Roy, Sanjay Nag, Indra Kanta Maitra, Samir Kumar Bandyopadhyay:
A Review on Automated Brain Tumor Detection and Segmentation from MRI of Brain. CoRR abs/1312.6150 (2013) - 2012
- [j7]Indra Kanta Maitra, Sanjay Nag, Samir Kumar Bandyopadhyay:
Technique for preprocessing of digital mammogram. Comput. Methods Programs Biomed. 107(2): 175-188 (2012) - [i2]Samir Kumar Bandyopadhyay, Biswajita Datta, Sudipta Roy:
Identifications of concealed weapon in a Human Body. CoRR abs/1210.5653 (2012) - 2011
- [j6]Tai-Hoon Kim, Debnath Bhattacharyya, Samir Kumar Bandyopadhyay:
Supervised chromosome clustering and image classification. Future Gener. Comput. Syst. 27(4): 372-376 (2011) - 2010
- [j5]Samir Kumar Bandyopadhyay, Tuhin Utsab Paul, Avishek Raychoudhury:
A Novel Steganographic Technique Based on 3D-DCT Approach. Comput. Inf. Sci. 3(4): 229-235 (2010) - [c20]Debnath Bhattacharyya, Rosslin John Robles, Tai-Hoon Kim, Samir Kumar Bandyopadhyay:
Feature Extraction and Analysis of Breast Cancer Specimen. ACN 2010: 30-41 - [c19]Samir Kumar Bandyopadhyay, Indra Kanta Maitra, Souvik Banerjee:
Digital Imaging in Pathology towards Detection and Analysis of Human Breast Cancer. CICSyN 2010: 295-300 - [c18]Subhra Pramanik, Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Tai-Hoon Kim:
Identification of Plant Using Leaf Image Analysis. FGIT-SIP/MulGraB 2010: 291-303 - [c17]Shilpi Saha, Seung-Hwan Jeon, Rosslin John Robles, Tai-Hoon Kim, Samir Kumar Bandyopadhyay:
Model Based User's Access Requirement Analysis of E-Governance Systems. SUComS 2010: 466-471 - [c16]Samit Biswas, Debnath Bhattacharyya, Tai-Hoon Kim, Samir Kumar Bandyopadhyay:
Extraction of Features from Signature Image and Signature Verification Using Clustering Techniques. SUComS 2010: 493-503 - [e1]Samir Kumar Bandyopadhyay, Wael Adi, Tai-Hoon Kim, Yang Xiao:
Information Security and Assurance - 4th International Conference, ISA 2010, Miyazaki, Japan, June 23-25, 2010. Proceedings. Communications in Computer and Information Science 76, Springer 2010, ISBN 978-3-642-13364-0 [contents] - [i1]Samir Kumar Bandyopadhyay, Indra Kanta Maitra:
An Alternative Approach of Steganography using Reference Image. CoRR abs/1007.1233 (2010)
2000 – 2009
- 2009
- [j4]Debnath Bhattacharyya, Jhuma Dutta, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation. Int. J. Commun. Netw. Syst. Sci. 2(5): 363-370 (2009) - [j3]Debnath Bhattacharyya, Poulami Das, Tai-Hoon Kim, Samir Kumar Bandyopadhyay:
Vascular Pattern Analysis towards Pervasive Palm Vein Authentication. J. Univers. Comput. Sci. 15(5): 1081-1089 (2009) - [c15]Debnath Bhattacharyya, Jhuma Dutta, Poulami Das, Rathit Bandyopadhyay, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Discrete Fourier Transformation based Image Authentication technique. IEEE ICCI 2009: 196-200 - [c14]Debnath Bhattacharyya, Poulami Das, Kheyali Mitra, Swarnendu Mukherjee, Debashis Ganguly, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Refine Crude Corpus for Opinion Mining. CICSyN 2009: 17-22 - [c13]Debnath Bhattacharyya, Jhuma Dutta, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Discrete Cosine Transformation Based Image Authentication and Secret Message Transmission Scheme. CICSyN 2009: 374-379 - [c12]Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Analysis of Handwritten Signature Image. FGIT-SecTech 2009: 43-50 - [c11]Debnath Bhattacharyya, Poulami Das, Samir Kumar Bandyopadhyay, Tai-Hoon Kim:
Grayscale Image Classification Using Supervised Chromosome Clustering. FGIT-SecTech 2009: 64-71 - [c10]A. K. Chakraborty, Pritimoy Sanyal, Swarnendu Mukherjee, S. Chatterjee, Pranab Hazra, Samir Kumar Bandyopadhyay:
Image Based Analysis of Tomato Leaves to Determine the Number of Petioles. SoCPaR 2009: 312-317 - 2008
- [c9]Pritimoy Sanyal, Ujjwal Bhattacharya, Samir Kumar Bandyopadhyay:
Analysis of SEM Images of Stomata of Different Tomato Cultivars Based on Morphological Features. Asia International Conference on Modelling and Simulation 2008: 890-894 - [c8]Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das, Deepsikha Debnath:
Handwritten Signature Authentication Using Statistical Estimation. MUE 2008: 77-82 - [c7]Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Debashis Ganguly, Swarnendu Mukherjee, Poulami Das:
A Secure Scheme for Image Transformation. SNPD 2008: 490-493 - 2007
- [c6]Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das:
Handwritten Signature Verification System using Morphological Image Analysis. CATA 2007: 112-117 - [c5]Pritimoy Sanyal, Samir Kumar Bandyopadhyay:
Application of Non Compact Trie Structure in Plant Taxonomy. CATA 2007: 145-150 - [c4]Pritimoy Sanyal, Ujjwal Bhattacharya, Swapan K. Parui, Samir Kumar Bandyopadhyay, Sandip C. Patel:
Color Texture Analysis of Rice Leaves Diagnosing Deficiency in the Balance of Mineral Levels towards Improvement of Crop Productivity. ICIT 2007: 85-90 - [c3]Debnath Bhattacharyya, Samir Kumar Bandyopadhyay, Deepsikha Choudhury:
Handwritten Signature Authentication Scheme using Integrated Statistical Analysis of Bi-Color Images. ICCSA Workshops 2007: 72-77 - [c2]Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das:
A Flexible ANN System for Handwritten Signature Identification. IMECS 2007: 1883-1887 - [c1]Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das:
Handwritten Signature Extraction from Watermarked Images using Genetic Crossover. MUE 2007: 987-991 - 2006
- [j2]Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Poulami Das:
Mosquito attack optimization. Ubiquity 2006(August): 9:1-9:14 (2006) - [j1]Samir Kumar Bandyopadhyay, Debnath Bhattacharyya, Anindya Jyoti Pal:
Secure delivery of handwritten signature. Ubiquity 2006(October) (2006)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-21 20:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint