Souradeep Mukhopadhyay
Jadavpur University
Followers: 0 Following: 0
Statistiques
RANG
72 019
of 300 392
RÉPUTATION
0
CONTRIBUTIONS
0 Questions
5 Réponses
ACCEPTATION DE VOS RÉPONSES
0.00%
VOTES REÇUS
0
RANG
11 709 of 20 934
RÉPUTATION
39
CLASSEMENT MOYEN
0.00
CONTRIBUTIONS
3 Fichiers
TÉLÉCHARGEMENTS
4
ALL TIME TÉLÉCHARGEMENTS
375
RANG
of 168 373
CONTRIBUTIONS
0 Problèmes
0 Solutions
SCORE
0
NOMBRE DE BADGES
0
CONTRIBUTIONS
0 Publications
CONTRIBUTIONS
0 Public Chaîne
CLASSEMENT MOYEN
CONTRIBUTIONS
0 Point fort
NOMBRE MOYEN DE LIKES
Feeds
A soumis
Secured Image Steganography based on Catalan Transform
Secured Image Steganography based on Catalan Transform. It is accepted in Multimedia Tools and Applications, Springer. (21st Dec...
presque 5 ans il y a | 1 téléchargement |
A soumis
Exploiting Laguerre Transform in Image Steganography
New Steganography Algorithm developed using Laguerre Transform
presque 5 ans il y a | 1 téléchargement |
How to make Laguerre Transform
https://in.mathworks.com/matlabcentral/fileexchange/79409-exploiting-laguerre-transform-in-image-steganography
environ 5 ans il y a | 0
How to Use arrayfun with a Multivariate Function of n Variables?
You should make 3 different X arrays here X1, X2, X3 and then pass the 3 arrays in function 3 times to compute y 3 times.
environ 5 ans il y a | 0
Inverse Laplace transform with Bessel function
You can find something from this link:"https://in.mathworks.com/matlabcentral/answers/366374-problem-computing-inverse-laplace-t...
environ 5 ans il y a | 0
MATLAB code for a steganographic method based on integer wavelet transform and genetic algorithm
You can use integer transform based steganography https://in.mathworks.com/matlabcentral/fileexchange/78751-image-steganography...
plus de 5 ans il y a | 0
Image Steganography using LSB?
% Clear the existing workspace clear all; % Clear the command window clc; % Read the input image input = imread('p...
plus de 5 ans il y a | 0
A soumis
Image Steganography-using-Lah-Transform
Application of Lah transform for security and privacy of data through information hiding in telecommunication
plus de 5 ans il y a | 2 téléchargements |





