A comparative survey of symmetric and asymmetric key cryptography S Chandra, S Paira, SS Alam, G Sanyal 2014 international conference on electronics, communication and …, 2014 | 276 | 2014 |
Hand gesture recognition systems: a survey AR Sarkar, G Sanyal, S Majumder International Journal of Computer Applications 71 (15), 2013 | 109 | 2013 |
A robust image steganography using DWT difference modulation (DWTDM) S Bhattacharyya, G Sanyal International Journal of Computer Network and Information Security 4 (7), 27, 2012 | 73 | 2012 |
Facial emotion analysis using deep convolution neural network GAR Kumar, RK Kumar, G Sanyal 2017 International Conference on Signal Processing and Communication (ICSPC …, 2017 | 67 | 2017 |
Dynamic job scheduling in cloud computing based on horizontal load balancing M Paul, D Samanta, G Sanyal International Journal of Computer Technology and Applications (IJCTA) 2 (5 …, 2011 | 60 | 2011 |
An ensemble approach to stabilize the features for multi-domain sentiment analysis using supervised machine learning M Ghosh, G Sanyal Journal of Big Data 5 (1), 44, 2018 | 58 | 2018 |
HMM based offline handwritten writer independent english character recognition using global and local feature extraction RL Das, BK Prasad, G Sanyal International Journal of Computer Applications 46 (10), 45-50, 2012 | 56 | 2012 |
Novel text steganography through special code generation I Banerjee, S Bhattacharyya, G Sanyal Proceedings of International Conference on Systemics, Cybernetics and …, 2011 | 53 | 2011 |
A novel approach of secure text based steganography model using word mapping method (WMM) S Bhattacharyya, I Banerjee, G Sanyal International Journal of Computer and Information Engineering 4 (2), 96-103, 2010 | 53 | 2010 |
Improved model for the stability analysis of wireless sensor network against malware attacks RP Ojha, PK Srivastava, G Sanyal, N Gupta Wireless Personal Communications 116 (3), 2525-2548, 2021 | 43 | 2021 |
Real time human action recognition using triggered frame extraction and a typical CNN heuristic SR Mishra, TK Mishra, G Sanyal, A Sarkar, SC Satapathy Pattern recognition letters 135, 329-336, 2020 | 40 | 2020 |
Data hiding in images in discrete wavelet domain using PMM S Bhattacharyya, G Sanyal International Journal of Electrical and Computer Engineering 5 (6), 359-367, 2010 | 40 | 2010 |
A real time text steganalysis by using statistical method S Samanta, S Dutta, G Sanyal 2016 IEEE international conference on engineering and technology (ICETECH …, 2016 | 37 | 2016 |
Image steganography using mid position value technique S Mukherjee, S Roy, G Sanyal Procedia computer science 132, 461-468, 2018 | 36 | 2018 |
Improving wireless sensor networks performance through epidemic model RP Ojha, PK Srivastava, G Sanyal International Journal of Electronics 106 (6), 862-879, 2019 | 31 | 2019 |
Pixel mapping method (PMM) based bit plane complexity segmentation (BPCS) steganography S Bhattacharyya, A Khan, A Nandi, A Dasmalakar, S Roy, G Sanyal 2011 World congress on information and communication technologies, 36-41, 2011 | 31 | 2011 |
An efficient face recognition approach using PCA and minimum distance classifier S Bag, G Sanyal 2011 International Conference on Image Information Processing, 1-6, 2011 | 31 | 2011 |
Task-scheduling in cloud computing using credit based assignment problem M Paul, G Sanyal International Journal on Computer Science and Engineering (IJCSE) 3 (10 …, 2011 | 31 | 2011 |
Survey and analysis of optimal scheduling strategies in cloud environment M Paul, G Sanyal 2011 World Congress on Information and Communication Technologies, 789-792, 2011 | 30 | 2011 |
Indel-K2P: a modified Kimura 2 Parameters (K2P) model to incorporate insertion and deletion (Indel) information in phylogenetic analysis AK Mahadani, S Awasthi, G Sanyal, P Bhattacharjee, S Pippal Cyber-Physical Systems 8 (1), 32-44, 2022 | 29 | 2022 |