Jyotsna Kumar Mandal
Jyotsna Kumar Mandal
Professor of Computer Science & Engineering, Kalyani University
Verified email at - Homepage
Cited by
Cited by
A genetic algorithm (ga) based load balancing strategy for cloud computing
K Dasgupta, B Mandal, P Dutta, JK Mandal, S Dam
Procedia Technology 10, 340-347, 2013
Hash based least significant bit technique for video steganography (HLSB)
K Dasgupta, JK Mandal, P Dutta
International Journal of Security, Privacy and Trust Management (IJSPTM) 1 …, 2012
Incorporating nonlinearities of measurement function in power system dynamic state estimation
JK Mandal, AK Sinha, L Roy
IEE Proceedings-Generation, Transmission and Distribution 142 (3), 289-296, 1995
Colour image steganography based on pixel value differencing in spatial domain
JK Mandal, D Das
International journal of information sciences and techniques 2 (4), 2012
Computational Intelligence, Communications, and Business Analytics [electronic resource]: First International Conference, CICBA 2017, Kolkata, India, March 24–25, 2017, Revised …
JK Mandal, P Dutta, S Mukhopadhyay
Singapore: Springer Singapore: Imprint: Springer, 2017., 2017
QoS of MANet through trust based AODV routing protocol by exclusion of black hole attack
RK Bar, JK Mandal, MM Singh
Procedia Technology 10, 530-537, 2013
A novel secure image steganography method based on chaos theory in spatial domain
D Bandyopadhyay, K Dasgupta, JK Mandal, P Dutta
International Journal of Security, Privacy and Trust Management (IJSPTM) 3 …, 2014
Steganography using adaptive pixel value differencing (APVD) of gray images through exclusion of overflow/underflow
JK Mandal, D Das
arXiv preprint arXiv:1205.6775, 2012
Computational intelligence in data mining-volume
LC Jain, HS Behera, JK Mandal, DP Mohapatra
Proceedings of the International Conference on CIDM 20, 21, 2014
Information Systems Design and Intelligent Applications: Proceedings of Second International Conference INDIA 2015, Volume 2
JK Mandal, SC Satapathy, MK Sanyal, PP Sarkar, A Mukhopadhyay
Springer India, 2015
A genetic algorithm based steganography using discrete cosine transformation (GASDCT)
A Khamrui, JK Mandal
Procedia Technology 10, 105-111, 2013
A novel technique for image authentication in frequency domain using discrete fourier transformation technique (IAFDDFTT)
N Ghoshal, JK Mandal
Malaysian Journal of Computer Science 21 (1), 24-32, 2008
High payload image steganography based on Laplacian of Gaussian (LoG) edge detector
SK Ghosal, JK Mandal, R Sarkar
Multimedia Tools and Applications 77 (23), 30403-30418, 2018
Wavelet based denoising of medical images using sub-band adaptive thresholding through genetic algorithm
S Mukhopadhyay, JK Mandal
Procedia Technology 10, 680-689, 2013
Authentication/secret message transformation through wavelet transform based subband image coding (WTSIC)
JK Mandal, M Sengupta
2010 International Symposium on Electronic System Design, 225-229, 2010
Steganographic technique based on minimum deviation of fidelity (STMDF)
JK Mandal, M Sengupta
2011 Second International Conference on Emerging Applications of Information …, 2011
Binomial transform based fragile watermarking for image authentication
SK Ghosal, JK Mandal
Journal of Information Security and Applications 19 (4-5), 272-281, 2014
Activity recognition system using inbuilt sensors of smart mobile phone and minimizing feature vectors
D Acharjee, A Mukherjee, JK Mandal, N Mukherjee
Microsystem Technologies 22 (11), 2715-2722, 2016
Hierarchical dynamic state estimator using ANN-based dynamic load prediction
AK Sinha, JK Mandal
IEE Proceedings-Generation, Transmission and Distribution 146 (6), 541-549, 1999
A novel wide & deep transfer learning stacked GRU framework for network intrusion detection
NB Singh, MM Singh, A Sarkar, JK Mandal
Journal of Information Security and Applications 61, 102899, 2021
The system can't perform the operation now. Try again later.
Articles 1–20