A novel technique for image steganography based on Block-DCT and Huffman Encoding A Nag, S Biswas, D Sarkar, PP Sarkar arXiv preprint arXiv:1006.1186, 2010 | 216 | 2010 |
Image encryption using affine transform and XOR operation A Nag, JP Singh, S Khan, S Ghosh, S Biswas, D Sarkar, PP Sarkar 2011 International conference on signal processing, communication, computing …, 2011 | 143 | 2011 |
Sentiment analysis in the light of LSTM recurrent neural networks S Pal, S Ghosh, A Nag International Journal of Synthetic Emotions (IJSE) 9 (1), 33-39, 2018 | 71 | 2018 |
An image steganography technique using X-box mapping A Nag, S Ghosh, S Biswas, D Sarkar, PP Sarkar IEEE-International Conference On Advances In Engineering, Science and …, 2012 | 69 | 2012 |
HDDS: Hierarchical Data Dissemination Strategy for energy optimization in dynamic wireless sensor network under harsh environments N Mazumdar, A Nag, S Nandi Ad Hoc Networks 111, 102348, 2021 | 46 | 2021 |
A novel framework for COVID-19 case prediction through piecewise regression in India A Senapati, A Nag, A Mondal, S Maji International Journal of Information Technology 13 (1), 41-48, 2021 | 43 | 2021 |
Trust-based load-offloading protocol to reduce service delays in fog-computing-empowered IoT N Mazumdar, A Nag, JP Singh Computers & Electrical Engineering 93, 107223, 2021 | 36 | 2021 |
Finding active expert users for question routing in community question answering sites PK Roy, JP Singh, A Nag Machine Learning and Data Mining in Pattern Recognition: 14th International …, 2018 | 30 | 2018 |
Secret image sharing scheme based on a boolean operation A Nag, S Biswas, D Sarkar, PP Sarka Cybernetics and Information Technologies 14 (2), 98-113, 2014 | 30 | 2014 |
A secure framework for IoT-based healthcare system AK Chattopadhyay, A Nag, D Ghosh, K Chanda Proceedings of International Ethical Hacking Conference 2018: eHaCON 2018 …, 2019 | 29 | 2019 |
A verifiable multi-secret image sharing scheme using XOR operation and hash function AK Chattopadhyay, A Nag, JP Singh, AK Singh Multimedia Tools and Applications 80, 35051-35080, 2021 | 28 | 2021 |
An efficient Boolean based multi-secret image sharing scheme A Nag, JP Singh, AK Singh Multimedia tools and applications 79 (23), 16219-16243, 2020 | 26 | 2020 |
Secure data authentication and access control protocol for industrial healthcare system DS Gupta, N Mazumdar, A Nag, JP Singh Journal of Ambient Intelligence and Humanized Computing 14 (5), 4853-4864, 2023 | 25 | 2023 |
An adaptive hierarchical data dissemination mechanism for mobile data collector enabled dynamic wireless sensor network N Mazumdar, S Roy, A Nag, S Nandi Journal of Network and Computer Applications 186, 103097, 2021 | 25 | 2021 |
A weighted location based lsb image steganography technique A Nag, JP Singh, S Khan, S Ghosh, S Biswas, D Sarkar, PP Sarkar Advances in Computing and Communications: First International Conference …, 2011 | 25 | 2011 |
A Huffman code based image steganography technique A Nag, JP Singh, S Biswas, D Sarkar, PP Sarkar Applied Algorithms: First International Conference, ICAA 2014, Kolkata …, 2014 | 22 | 2014 |
A new audio steganography scheme based on location selection with enhanced security P Pathak, AK Chattopadhyay, A Nag 2014 first international conference on automation, control, energy and …, 2014 | 20 | 2014 |
Fuzzy-logic-based IoMT framework for COVID19 patient monitoring S Panja, AK Chattopadhyay, A Nag, JP Singh Computers & Industrial Engineering 176, 108941, 2023 | 19 | 2023 |
Secure data outsourcing on cloud using secret sharing scheme. AK Chattopadhyay, A Nag, K Majumder Int. J. Netw. Secur. 19 (6), 912-921, 2017 | 19 | 2017 |
Brain stroke prediction model based on boosting and stacking ensemble approach S Mondal, S Ghosh, A Nag International Journal of Information Technology 16 (1), 437-446, 2024 | 18 | 2024 |