A novel technique for image steganography based on Block-DCT and Huffman Encoding A Nag, S Biswas, D Sarkar, PP Sarkar arXiv preprint arXiv:1006.1186, 2010 | 209 | 2010 |
Image encryption using affine transform and XOR operation A Nag, JP Singh, S Khan, S Ghosh, S Biswas, D Sarkar, PP Sarkar 2011 International conference on signal processing, communication, computing …, 2011 | 127 | 2011 |
An image steganography technique using X-box mapping A Nag, S Ghosh, S Biswas, D Sarkar, PP Sarkar IEEE-International Conference On Advances In Engineering, Science and …, 2012 | 63 | 2012 |
Sentiment analysis in the light of LSTM recurrent neural networks S Pal, S Ghosh, A Nag International Journal of Synthetic Emotions (IJSE) 9 (1), 33-39, 2018 | 48 | 2018 |
HDDS: Hierarchical Data Dissemination Strategy for energy optimization in dynamic wireless sensor network under harsh environments N Mazumdar, A Nag, S Nandi Ad Hoc Networks 111, 102348, 2021 | 35 | 2021 |
A novel framework for COVID-19 case prediction through piecewise regression in India A Senapati, A Nag, A Mondal, S Maji International Journal of Information Technology 13 (1), 41-48, 2021 | 34 | 2021 |
Secret image sharing scheme based on a boolean operation A Nag, S Biswas, D Sarkar, PP Sarka Cybernetics and Information Technologies 14 (2), 98-113, 2014 | 27 | 2014 |
A weighted location based lsb image steganography technique A Nag, JP Singh, S Khan, S Ghosh, S Biswas, D Sarkar, PP Sarkar Advances in Computing and Communications: First International Conference …, 2011 | 25 | 2011 |
A secure framework for IoT-based healthcare system AK Chattopadhyay, A Nag, D Ghosh, K Chanda Proceedings of International Ethical Hacking Conference 2018: eHaCON 2018 …, 2019 | 23 | 2019 |
Trust-based load-offloading protocol to reduce service delays in fog-computing-empowered IoT N Mazumdar, A Nag, JP Singh Computers & Electrical Engineering 93, 107223, 2021 | 22 | 2021 |
An efficient Boolean based multi-secret image sharing scheme A Nag, JP Singh, AK Singh Multimedia tools and applications 79, 16219-16243, 2020 | 21 | 2020 |
A Huffman code based image steganography technique A Nag, JP Singh, S Biswas, D Sarkar, PP Sarkar Applied Algorithms: First International Conference, ICAA 2014, Kolkata …, 2014 | 21 | 2014 |
A new audio steganography scheme based on location selection with enhanced security P Pathak, AK Chattopadhyay, A Nag 2014 first international conference on automation, control, energy and …, 2014 | 18 | 2014 |
Weather data mining using artificial neural network S Ghosh, A Nag, D Biswas, JP Singh, S Biswas, D Sarkar, PP Sarkar 2011 IEEE Recent Advances in Intelligent Computational Systems, 192-195, 2011 | 18 | 2011 |
An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network N Mazumdar, S Roy, A Nag, S Nandi Journal of Network and Computer Applications 186, 103097, 2021 | 17 | 2021 |
Finding active expert users for question routing in community question answering sites PK Roy, JP Singh, A Nag Machine Learning and Data Mining in Pattern Recognition: 14th International …, 2018 | 17 | 2018 |
A verifiable multi-secret image sharing scheme using XOR operation and hash function AK Chattopadhyay, A Nag, JP Singh, AK Singh Multimedia Tools and Applications 80, 35051-35080, 2021 | 16 | 2021 |
Secure data outsourcing on cloud using secret sharing scheme. AK Chattopadhyay, A Nag, K Majumder Int. J. Netw. Secur. 19 (6), 912-921, 2017 | 15 | 2017 |
Network anomaly detection using a fuzzy rule-based classifier S Ghosh, A Pal, A Nag, S Sadhu, R Pati Computer, Communication and Electrical Technology, 61-65, 2017 | 14 | 2017 |
A novel technique for image steganography based on DWT and Huffman encoding D Sarkar, A Nag, S Biswas, PP Sarkar International Journal of Computer Science and Security (IJCSS) 4 (6), 561, 2011 | 12 | 2011 |