Souvik Roy

Learn More
A rapid growth in E-Commerce market is seen in recent time throughout the world. With ever increasing popularity of online shopping, Debit or Credit card fraud and personal information security are major concerns for customers, merchants and banks specifically in the case of CNP (Card Not Present). This paper presents a new approach for providing limited(More)
We present an efficient and novel numerical algorithm for inversion of transforms arising in imaging modalities such as ultrasound imaging, thermoacoustic and photoacoustic tomography, intravascular imaging, non-destructive testing, and radar imaging with circular acquisition geometry. Our algorithm is based on recently discovered explicit inversion(More)
Steganography is method of data hiding behind multimedia file such as text, image, audio and video. For enhancing the security of data hiding and transmission over network, this paper proposed system which uses genetic algorithm along with Visual Cryptography. Plain text is converted into cipher text by using any cipher then it is hidden in LSB of image.(More)
Cellular automata (CAs) are dynamic frameworks which exhibit complex global behavior from simple local interaction and computation. Since the inception of CA by von Neumann in 1950s, it has attracted the attention of several researchers over various backgrounds and fields for modeling different physical, natural as well as real-life phenomena. Classically,(More)
Number Plate Recognition technique is widely used in identifying vehicle identity across the world where a standard plate size and font are maintained which makes recognition easy. For implementing number plate recognition specifically in India a lot number of issue comes up like hundreds of different forms of fonts being used, size of plate not maintained,(More)
We consider implementation of a deterministic allocation rule using transfers in quasi-linear private values environments. We show that in multidimensional single peaked type spaces, an allocation rule is implementable if and only if it satisfies a familiar and simple condition called 2-cycle monotonicity. * We are grateful to an editor and two anonymous(More)
The paper presents a new approach to interact with real world objects from a distance. This approach is guided with a purpose to modify the attributes of the real world objects and establish communication between multiple such objects using gesture control. The user is required to point the camera of a smartphone at the physical object, the object gets(More)