Souradeep Mukhopadhyay
Jadavpur University
Followers: 0 Following: 0
Souradeep Mukhopadhyay is currently studying in Jadavpur University CSE UG 2. He is interested at Machine Learning, Image and video Processing, Optimization and Steganography. He is KVPY SX scholar.
Statistiques
RANG
275 100
of 296 352
RÉPUTATION
0
CONTRIBUTIONS
0 Questions
5 Réponses
ACCEPTATION DE VOS RÉPONSES
0.00%
VOTES REÇUS
0
RANG
11 605 of 20 394
RÉPUTATION
38
CLASSEMENT MOYEN
0.00
CONTRIBUTIONS
3 Fichiers
TÉLÉCHARGEMENTS
4
ALL TIME TÉLÉCHARGEMENTS
364
RANG
of 156 133
CONTRIBUTIONS
0 Problèmes
0 Solutions
SCORE
0
NOMBRE DE BADGES
0
CONTRIBUTIONS
0 Publications
CONTRIBUTIONS
0 Public Chaîne
CLASSEMENT MOYEN
CONTRIBUTIONS
0 Point fort
NOMBRE MOYEN DE LIKES
Feeds
A soumis
Secured Image Steganography based on Catalan Transform
Secured Image Steganography based on Catalan Transform. It is accepted in Multimedia Tools and Applications, Springer. (21st Dec...
presque 4 ans il y a | 1 téléchargement |
A soumis
Exploiting Laguerre Transform in Image Steganography
New Steganography Algorithm developed using Laguerre Transform
environ 4 ans il y a | 1 téléchargement |
How to make Laguerre Transform
https://in.mathworks.com/matlabcentral/fileexchange/79409-exploiting-laguerre-transform-in-image-steganography
plus de 4 ans il y a | 0
How to Use arrayfun with a Multivariate Function of n Variables?
You should make 3 different X arrays here X1, X2, X3 and then pass the 3 arrays in function 3 times to compute y 3 times.
plus de 4 ans il y a | 0
Inverse Laplace transform with Bessel function
You can find something from this link:"https://in.mathworks.com/matlabcentral/answers/366374-problem-computing-inverse-laplace-t...
plus de 4 ans il y a | 0
MATLAB code for a steganographic method based on integer wavelet transform and genetic algorithm
You can use integer transform based steganography https://in.mathworks.com/matlabcentral/fileexchange/78751-image-steganography...
plus de 4 ans il y a | 0
Image Steganography using LSB?
% Clear the existing workspace clear all; % Clear the command window clc; % Read the input image input = imread('p...
plus de 4 ans il y a | 0
A soumis
Image Steganography-using-Lah-Transform
Application of Lah transform for security and privacy of data through information hiding in telecommunication
plus de 4 ans il y a | 2 téléchargements |