Sushanta Biswas

Learn More
Image encryption is a suitable method to protect image data. Image and text data has their unique features. The available encryption algorithms are good for text data. They may not be suitable for multimedia data. In fact the pixels of natural images are highly correlated to their neighboring pixels. Due to this strong correlation any pixel can be(More)
Image steganography is the art of hiding information into a cover image. This paper presents a novel technique for Image steganography based on DWT, where DWT is used to transform original image (cover image) from spatial domain to frequency domain. Firstly two dimensional Discrete Wavelet Transform (2-D DWT) is performed on a gray level cover image of size(More)
In general frequent itemsets are generated from large data sets by applying association rule mining algorithms like Apriori, Partition, Pincer-Search, Incremental, Border algorithm etc., which take too much computer time to compute all the frequent itemsets. By using Genetic Algorithm (GA) we can improve the scenario. The major advantage of using GA in the(More)
Image steganography is the art of hiding information into a cover image. This paper presents a novel technique for Image steganography based on Block-DCT, where DCT is used to transform original image (cover image) blocks from spatial domain to frequency domain. Firstly a gray level image of size M × N is divided into no joint 8 × 8 blocks and a two(More)
Visual cryptography scheme is a cryptographic technique which allows visual information to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. In this article, we propose a novel scheme for copyright protection for digital images based on visual cryptography. The proposed method employs(More)
Steganography and Watermarking are main parts of the fast developing area of information hiding. Steganography involves hiding of information in a cover media to obtain the stego media, in such a way that the cover media is supposed not to have any embedded image for its unintended recipients. This paper is based on Steganography, Watermarking and(More)
Steganography is the most used technique for data hiding. We can implement it using any cover media like text, images, and videos. In this paper we devised a new algorithm to hide our text in any colored image of any size using wavelet transform. It improves the image quality and imperceptibility. Our method sustains the security attacks. Extensive testing(More)
Weather Data Mining is a form of Data mining concerned with finding hidden patterns inside largely available meteorological data, so that the information retrieved can be transformed into usable knowledge. A variety of data mining tools and techniques are available in the industry, but they have been used in a very limited way for meteorological data. In(More)
Index Terms Computer Science [1] Komal D Patel, S. b. , "image Encryption Using Different Techniques": A Review International Journal Of Emerging Technology And Advanced Engineering, 2011. 1(1): P. 30-34. [2] H. El-din. H. Ahmed, H. m. k. , O. S. Farag Allah, "encryption Quality Analysis Of The Rc5 Block Cipher Algorithm For Digital(More)