Sabyasachi Pramanik

Sabyasachi Pramanik
Haldia Institute of Technology | Haldia · Department of Computer Science & Engineering

PhD (Computer Science and Engineering)

About

71
Publications
9,934
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
245
Citations
Introduction
Sabyasachi Pramanik currently works at the Department of Computer Science & Engineering, Haldia Institute of Technology. Sabyasachi does research in Steganography, Computer Communications, Data Hiding and Image Processing. Their current project is 'A new encrypted method in image steganography'.

Publications

Publications (71)
Conference Paper
Renewable energy is being more extensively utilized when the price of brown energy rises. Previous research focused on utilizing readily accessible green energy for augmenting non-renewable or brown energy, next to the expense of postponing along with rescheduling jobs when green energy supply was insufficient. Here, we propose an adaptive data cen...
Chapter
Because privacy concerns in IoT devices are the most sensitive of all the difficulties, such an extreme growth in IoT usage has an impact on the privacy and life spans of IoT devices, because until now, all devices communicated one to one, resulting in high traffic that may shorten the life of unit nodes. In addition, delivering data repeatedly inc...
Article
Full-text available
The world as we know it has changed over a short period of time, with the rise and spread of the deadly novel Corona virus known as COVID-19, the world will never be the same again. This study explores the devastating effects of the novel virus pandemic, the resulting lockdown, thus the need to transform the offline classroom into an online classro...
Chapter
The major reason for writing this chapter is from some of the issues we experience in our daily lives, such as traffic congestion, a lack of parking spaces, fuel waste, and pollution. If there isn't enough parking within a university's campus, it will take a long time to look for parking. If parking is available outside, employees will have to trav...
Chapter
Here the authors are trying to prepare a model for Identifying a patient whether he is Diabetic or not. The Pima Indian dataset has been used in this case study. There are basically 2 types of Diabetes. This chapter consists of 2 main sections: first is Data Pre-Processing and another is the Classifier Construction. After the pre-processing phase a...
Chapter
In the modern business condition, data being produced in most service associations is estimated in gigabytes or terabytes. On occasion, searching for information in a few terabytes of information can appear to be much the same as scanning for a needle in a sheaf. With the wild use of IT in business forms everywhere throughout the world, organizatio...
Chapter
Full-text available
The prevalence of mobile network–associated gadgets keeps on growing dramatically. 5G network will give the hypothetical speed of 20 Gbps so that clients will get 100 Mbps of access data rate. An expected 5 billion gadgets exist around the world. With the development of wearable gadgets, an ordinary client can convey up to two network‐associated ga...
Chapter
In the present day, images and videos account for nearly 80% of all the data transmitted during our daily activities. This work employs a combination of novel stegnography and data compression methodologies. So that the stego image generated while using stegnograpghy to the source textual image could be further compacted in an efficient and product...
Chapter
Full-text available
Research is considering security of big data and retaining the performance during its transmission over network. It has been observed that there have been several researches that have considered the concept of big data. Moreover, a lot of those researches also provided security against data but failed to retain the performance. Use of several encry...
Chapter
Machine learning (ML) and deep learning (DL) have both produced overwhelming interest and drawn unparalleled community interest recently. With a growing convergence of online activities and digital life, the way people have learned and function is evolving, but this also leads them towards significant security concerns. Protecting sensitive informa...
Chapter
Energy efficiency is a crucial parameter for the ad hoc wireless sensor network as it increases the life of a network. In an ad hoc wireless sensor network, every node ingests some part of energy with relaying of the remaining energy over that network. The suggested work is also directed toward elongating the life of the ad hoc wireless sensor netw...
Chapter
Full-text available
A mobile ad hoc network is a collection of autonomous mobile nodes having communication capability with one another within a radio range. This is a network with intrinsic attributes like auto-configuration and organization by the network itself. In traditional, AODV single metric is used for the route selection scheme. Here we put forward a stable...
Chapter
Full-text available
With governments of different countries having a vision of smart cities, the technology adoption and implementation are at its peak and the current increase in the usage of advanced technology for a smart city has led to an increase in the carbon imprint across the globe, which needs immediate attention for the environment sustainability. Although...
Conference Paper
Web mining is a central part of data analysis. The fetching and discovering knowledge from the different web data in data mining mechanism is more important nowadays. Web usage mining customs data mining practice for the investigation of custom decoration from different data storages. In this article paper, introducing a new approach for web mining...
Article
Kidney stones are renal calculi that are formed due to the collection of calcium and uric acid. The major symptom for the existence of these renal calculi is severe pain, especially when it travels down the urethras To detect these renal calculi, ultrasound images are preferable. But these images have speckle noise which makes the detection of ston...
Chapter
Full-text available
With governments of different countries having a vision of smart cities, the technology adoption and implementation are at its peak and the current increase in the usage of advanced technology for a smart city has led to an increase in the carbon imprint across the globe, which needs immediate attention for the environment sustainability. Although...
Conference Paper
Full-text available
One of the potential top-level goals for 5G heterogeneous networks may be intellectual and perfect network which modifies consumer preferences in a proactive manner in addition to needs of channel. Research provides an interdisciplinary approach to e-health, primarily concern BDA, and radio space management inside a various level fifth generation n...
Book
Multidisciplinary Approach to Modern Digital Steganography reviews the security aspects of cloud, IoT, and Android platforms related to steganography and addresses emerging security concerns, new algorithms, and case studies in the field. Furthermore, the book presents a new approach to secure data storage on cloud infrastructure and IoT along with...
Article
Full-text available
Internet is used for exchanging information. Sometimes it is needed to transmit confidential data via internet. Here the authors use image steganography to pass confidential data within a cover image. To construct the algorithm, they take the combinational help of particle swarm optimization (PSO), bi-orthogonal wavelet transform (BWT), and genetic...
Article
Full-text available
The original version of this article unfortunately contained mistake. The affiliation address of Wegayehu Enbeyle should be changed to Department of Statistics, Mizan-Tepi University, Tepi, Ethiopia
Preprint
Full-text available
Obesity and overweight is a foremost concern around the globe for each group of age. This can be accelerated by the current imposed lockdown. However, excessive weight gain may result in other chronic diseases. This study has been considering the age group of 25 to 55 years as the sample populations and monitoring them from July, 2020 to November,...
Preprint
Full-text available
Call for Book Chapters Book Title: “Software Defined Networking for Ad Hoc Networks” Book Series Webpage: https://www.springer.com/series/15427 Chapter Submission Link: https://escripts.eai.eu/paper/submit/direct/333 For more detailed information, please visit the https://www.springer.com/in/authors-editors/book-authors-editors/resources-...
Conference Paper
The objective of knowledge acquisition is to disseminate it within society. Academic research and publishing the outcome through journals is one of the primary avenues for the dissemination of knowledge. There are various concepts associated with journal publication. Indexing, review methods, types of journals, journal quality measures are some of...
Chapter
The immense measure of classified information has been moved on the Internet. Information security turns out to be progressively significant for some applications, for instance, private transmission, video observation, military and clinical applications. Lately, there has been a great deal of enthusiasm for steganography and steganalysis. Steganogr...
Article
The wireless sensor network (WSN) is a swiftly growing technological knowledge stage with noteworthy and dynamic implementations in various fields. Due to minute battery power in WSNs, power utilization in WSN is a foremost problem. In this paper, the authors have compared resourceful power consumption protocols using different variants of SEP prot...
Chapter
In this chapter, the authors present an innovative, smart controller to sustain mobility in wireless sensor networks (WSNs). Principally, the focal point is dependent on the arrangement of fuzzy input variables (i.e., remaining battery power [RBP], mobility, and centrality solution) to crucial usages, similar to personnel safety in an industrialize...
Chapter
Digital enterprise transformation is the amalgamation of digital techniques into the scopes of a business enterprise, fundamentally altering how one can employ and furnish ethics to clients. An organization can be authorized to take digital transformation due to several reasons. But the most important reason is that it is the survival issuance for...
Chapter
Steganography is the way to conceal data inside a normal (non-mystery) record to keep it from discovery. While encryption expects to conceal the substance of data, steganography means to shroud the presence of data. Information security is significant when touchy information is communicated over the internet. Steganography and steganalysis methods...
Chapter
Full-text available
In this digital era, most of the daily works of users are captured in digital forms like image, audio, video, or even text. These may contain sensitive, confidential, or private information as well. To keep these, there are different techniques exercised over the years like chest, coffer, repository, treasury, etc. Sometimes such ways of hiding inf...
Chapter
Full-text available
Microblogging, where millions of users exchange messages to share their opinions on different trending and non-trending topics, is one of the popular communication media in recent times. Several researchers are concentrating on these data due to a huge source of information exchanges in online social media. In platforms such as Twitter, dataset-gen...
Chapter
COVID-19 is likely to pose a significant threat to healthcare, especially for disadvantaged populations due to the inadequate condition of public health services with people's lack of financial ways to obtain healthcare. The primary intention of such research was to investigate trend analysis for total daily confirmed cases with new corona virus (i...
Chapter
In the present research work, the use of geometrical figures have been made for the calculation of the value of pi. Instead of circle and square, ellipse and rectangle had been used to derive the value of pi. Ellipse can be considered as an extension of a circle where it had been stretched in two dimensions in unequal manner giving rise to the conc...
Article
Full-text available
Cancer has been described as a diverse illness with several distinct subtypes that may occur simultaneously. As a result, early detection and forecast of cancer types have graced essentially in cancer fact-finding methods since they may help to improve the clinical treatment of cancer survivors. The significance of categorizing cancer suffers into...
Article
In today's world, data security is very important. In the area of information and communication technology, security has become a major issue. Steganography is used for highly secure, secret information exchange. To design a digital data security application, we proposed combining the cryptography technique with the DES technique and the steganogra...
Article
Thedepictionandexecutionofamultidisciplinaryfact-findingdesignincludingasmartagent-basedarchitecture for collective e-commerce operations are presented in this article. A Multi-Agent System (MAS)structure is designed and developed for multidiscipline e-commerce settings including a variety of globally distributed consumers and merchants. This frame...
Chapter
In the information technology community, communication is a vital issue. And image transfer creates a major role in the communication of data through various insecure channels. Security concerns may forestall the direct sharing of information and how these different gatherings cooperatively direct data mining without penetrating information securit...
Book
A sensor system may contain an immense number of straightforward sensor Nodes that are conveyed at some reviewed site. In enormous zones, such a system, as a rule, has a work structure. For this situation, a portion of the sensor Nodes goes about as switches, sending messages starting with one of their neighbors then onto the next. The Nodes are de...
Preprint
Full-text available
I am pleased to inform you that our edited book proposal titled “Cyber Security and Digital Forensics: Challenges and Future Trends” is accepted and approved by Scrivener Publishing (Wiley) for Publishing. The book will be published under the Wiley-Scrivener imprint and will be submitted for indexing by Scopus and offered to Web of Science. Tentat...
Preprint
Full-text available
Computational statistics focus on devising an efficient methodology to obtain quantitative solutions for problems that are devised quantitatively. This subject brings together computational capability and statistical advanced thought processes together to solve some of the problems efficiently. Some of the interesting areas of the subject are optim...
Preprint
Full-text available
The Handbook “Emerging Research Approaches to Cybersecurity and Network Security” presents the latest methodologies and trends in detecting and preventing cyber and network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students...
Preprint
Full-text available
Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder. This book gives an insight to the different latest techniques and state of the art methods, algorithms, architectures, models, methodologies, and case studies of steganography in the domain of Cloud, IoT and Android Platf...
Preprint
Full-text available
The handbook “An Interdisciplinary Approach to Modern Network Security” presents the latest methodologies and trends in detecting and preventing network threats investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, prac...
Article
Full-text available
Data hiding is a technique for the secure transmission of confidential data. Many data hiding techniques exist and steganography is the most important one. This paper presents a new steganography method in the spatial domain. We use steganography to send confidential information from sender to receiver. Here, we generate a password on a random basi...
Article
Full-text available
According to the optimization techniques examined in the past, the performance of Genetic Algorithm (GA) based approaches are seen as a substandard technique compared to PSO based approaches with a target to improve the performance of GA approach. The modification in GA is performed and proposed in this work. The modification performed in the GA ba...
Article
Full-text available
The Internet is used for exchanging information. Sometimes it is required to transmit confidential data over the internet. Here the authors use image steganography to embed confidential data within a cover image. To construct the technique, this article combines the help of Particle Swarm Optimization (PSO), Bi-Orthogonal Wavelet Transform (BWT) an...
Article
Wireless sensor networks (WSNs) have enabled an improved awareness in a range of purposes like battlefield surveillance, disaster management, industrial process monitoring and control, machine health monitoring, and medical applications. Accordingly, great numbers of sensor nodes (SNs) are arranged for usages that can function as an individual. Bec...
Article
Information or data is vital asset to us. Steganography is the specialty of secured, or hidden, writing. The reason for steganography is undercover communication to hide the presence of a message from a third party. This proposed framework manages executing security-utilizing Steganography. The mediums are typically images, video, audio and so fort...
Preprint
Information or data is a vital asset to us. Steganography is the specialty of secured, or hidden, writing. The reason for steganography is undercover communication to hide the presence of a message from a third party. This proposed framework manages to execute security-utilizing Steganography. The mediums are typically images, video, audio and so f...
Article
Wireless Sensor Network (WSN) is demanding and very appealing technology useful for different applications. WSNs consist of wirelessly interconnected sensor nodes (SNs) which can assemble, distribute and process information in a range of application regions. Power utilization in WSN is a key difficulty. Some of the usages comprise landslide detecti...
Article
Full-text available
Steganography is data hiding technique in internet. Here we send CAPTCHA codes within a cover image using image steganography. CAPTCHA are the crazy codes. They are used in human response test. The word is actually acronym for: “Completely Automated Public Turning test to tell Computers and Humans Apart”. It is a type of challenge-response test use...
Article
Full-text available
p>Steganography is data hiding technique in internet. Here we send CAPTCHA codes within a cover image using Image steganography. CAPTCHA are the crazy codes. They are used in human response test. The word is actually an acronym for: " C ompletely A utomated P ublic T uring test to tell C omputers and H umans A part". It is a type of challenge–respo...
Conference Paper
Full-text available
With the ever increasing amount and variety of data to be stored and transmitted in various mediums, the specification of security which has to be established at various levels of medium access and the accompanying issues of authentication and authorization has become a critical factor. Various stenographic, watermarking and data-embedding algorith...
Article
Full-text available
In this paper, the authors propose a new algorithm to hide data inside image using steganography technique. The proposed algorithm uses binary codes and pixels inside an image. The zipped file is used before it is converted to binary codes to maximize the storage of data inside the image. By applying the proposed algorithm, a system called Steganog...
Article
Full-text available
This paper presents the application of Wavelet Transform and Genetic Algorithm in a novel steganography scheme. We employ a genetic algorithm based mapping function to embed data in Discrete Wavelet Transform coefficients in 4x4 blocks on the cover image. The optimal pixel adjustment process is applied after embedding the message. We utilize the fr...
Article
Full-text available
The secure data transmission over internet is achieved using Steganography. In this paper, a new algorithm based on the CPT-has been proposed for data hiding in a image. Here, no is used key for embedding and extracting of data. It hides four bits in a block of size 5×5 by changing a maximum of two bit. Better visual quality can be achieved by the...
Article
The secure data transmission over internet is achieved using Steganography. In this paper, a new algorithm based on the CPT-has been proposed for data hiding in a image. Here, no is used key for embedding and extracting of data. It hides four bits in a block of size 5×5 by changing a maximum of two bit. Better visual quality can be achieved by the...
Preprint
Full-text available
The secure data transmission over internet is achieved using Steganography. In this paper, a new algorithm based on the CPT-has been proposed for data hiding in a image. Here, no is used key for embedding and extracting of data. It hides four bits in a block of size 5×5 by changing a maximum of two bit. Better visual quality can be achieved by the...
Article
Full-text available
Embedding maximum information in a stego-image with minimum change in its appearance has been a major concern in image-based steganography techniques. In this paper, utilizing Genetic algorithm (GA) we have built up a competent optimal robust steganography technique. The watermarks are implanted into the HL and LH frequency coefficients in bi-ortho...
Article
Embedding maximum information in a stego-image with minimum change in its appearance has been a major concern in image-based steganography techniques. In this paper, utilizing Genetic algorithm (GA) we have built up a competent optimal robust steganography technique. The watermarks are implanted into the HL and LH frequency coefficients in bi-ortho...
Article
Full-text available
In any form of communication, security is the most important aspect in today's world. Many data security and data hiding algorithms have been developed in the past. In this project, named "A Framework For Digital Image Steganography", we have designed a system that will allow an average user to securely transfer text messages by hiding them in a di...

Network

Cited By