Sabyasachi Pramanik

Sabyasachi Pramanik
Haldia Institute of Technology | Haldia · Department of Computer Science & Engineering

PhD (Computer Science and Engineering)

About

102
Publications
17,217
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
968
Citations
Introduction
Sabyasachi Pramanik currently works as an Associate Professor in the Department of Computer Science & Engineering, Haldia Institute of Technology. Sabyasachi does research in Steganography, Computer Communications, Data Hiding and Image Processing. Their current project is 'A new encrypted method in image steganography'.

Publications

Publications (102)
Chapter
The chapter describes how clinical data may be stored in digital formats, such as patient reports, as electronic health records, and how meaningful information from these records may be created using data analytics methods and tools that may assist patients and physicians to save time and money. The Apollo Hospital in Kolkata, West Bengal, India is...
Article
Full-text available
The primary source of food is extracted from the plant. Take care of and maintain the plants in real-time to enhance human survival. Diseases in plants can directly lead to a reduction in the industrial economy. Automatic detection of plant diseases is crucial for effective disease control. Vitis vinifera (Grapes) is an essential crop with rich vit...
Article
Full-text available
In the steganographic picture, it remains a challenging problem to determine the best place for inserting the hidden message with a minimum distortion of the host medium. However, there is a long way to go to select the right embedding position with less distortion. To accomplish this goal, we suggest a new high performance image steganography meth...
Chapter
Tuberculosis is an infectious disease that affects a significant number of people all over the globe. The possibility of therapy does not exclude the need for an accurate diagnosis, however. Even while there is generally available X-ray equipment, particularly in underdeveloped nations, there is sometimes a lack of radiological expertise, which mak...
Chapter
An accurate inquiry may aid timely infection diagnosis, patients’ communal security, and community amenities in today’s world, where data is quickly developing in fields such as bioscience and health protection. In the field of medicine, prediction is an important but sometimes overlooked component. In this paper, the authors construct deep learnin...
Chapter
Information that is current and accurate is essential for resource optimization. Sensors in agriculture identify the soil's nutrients, moisture, organic matter, and clay. Different technologies are used to link sensors located in diverse places. Without a connection to the internet, its data will be spontaneously communicated to the cloud. Utilizin...
Chapter
The world's oldest and most active profession is agriculture. There is an urgent need for society as a whole to think creatively and discover new effective answers to farming, utilizing lesser land for producing more plants and increasing the yield of the cultivated land because the world's population is constantly growing and land is becoming scar...
Chapter
One of the new and difficult study fields in the contemporary environment is the idea of smart cities. The cities are bordered by woods, farmland, or open spaces where fires might break out, endangering human lives and wiping out many resources. This chapter uses the idea of sensor networks and UAV technology to develop an early fire detection syst...
Chapter
The time is now for deep learning (DL)-dependent analysis of healthcare images to move from the realm of exploratory research projects to that of translational ones, and eventually into clinical practise. This process has been sped up by developments in data availability, DL methods, and computer power over the last decade. As a result of this expe...
Chapter
The leading and suitable techniques for examining and assessing the microstructure of things are nowadays high-resolution optical microscopy and imaging approaches. Manfred Von Ardenne developed scanning electron microscopy (SEM), a kind of surface microscopy, in the 1930s. SEM employs electron behaviour to produce 3D pictures of entities that prov...
Chapter
Technology has been fundamental in defining, advancing, and reinventing medical practises, equipment, and drugs during the last century. Although cloud computing is quite a newer concept, it is now one of the most often discussed issues in academic and therapeutic contexts. Many academics and healthcare persons are focused in providing vast, conven...
Chapter
Due to the development in human population and their requirements, the vehicular population on the globe is increasing day by day in the medium of public transportation. As a result, carpooling comes into play, with the fundamental notion being to share personal automobile space among persons travelling similar paths. Smart carpooling, car sharing,...
Chapter
Banks cannot afford to be complacent in their operations. Due to the dramatic changes brought about by improvements in computer technology (IT) as well as competitive intensity from FinTech businesses, they must re-evaluate their competing advantages. A major point of emphasis in this essay is that banks must not abandon relationship banking that e...
Chapter
Internet of Things (IoT) is a fast-growing idea that aims to connect billions of objects (such as smartphones, sensors, and potential networking equipment) and allow them to communicate with one another. The IoT is a network of interconnected devices which utilises sensor to use technology communicate relating to one another across without the nece...
Conference Paper
Full-text available
The significance of how information is obtained and helps to make proper decisions has been highlighted by the fast growth of the smart business and analytics processing. Big data in clinical applications opens up newer avenues for analysing and gaining insight from large amounts of data. The traditional methods to health data management have had m...
Conference Paper
Green IT seeks to utilise computing facilities in an energy-capability, expenditure-minimization, along with ecologically amiable way by greening the employ, dumping, layout, and manufacture of computers and computer-associated goods, that has an impact on many areas of a country's growth. The motivations and difficulties of green computing embrace...
Preprint
Full-text available
With the rapid development of digital image technology, the number of digital images stored on the Internet environment has been increasing remarkably over the past decade. As a result, it has become a top priority to come up with an effective and convenient search tools for images. Although several image-based search tools have been introduced til...
Article
Full-text available
Steganography is the art and a science of obscuring the presence of communication by hiding content in electronic media and so obscuring the presence of communication from the adversary’s perspective. The goal of spatial adaptive approaches is to incorporate additional information in the image’s edge regions. The portions of the picture with the mo...
Chapter
The current lockouts, climatic variations, population expansion, and constraints on convenience and natural resource access are some of the factors that are making the need for smart cities more critical than ever before. On the other hand, these difficulties may be conquered more effectively with the use of emerging technology. In smart cities, th...
Chapter
Smart cities are going through enormous moves in technology and operations in recent days, and ‘data science' is driving the change in the current age of the Fourth Industrial Revolution (Industry 4.0). Data science is typically the scientific study and analysis of actual happenings with historical data using a variety of scientific methodologies,...
Chapter
Megacities are intricate systems that struggle with difficulties including overcrowding, subpar urban design and planning, inadequate mobility and public transportation, subpar governance, problems with climate change, subpar water and sewage infrastructure, problems with waste and health, and unemployment. By maximising the use of available resour...
Conference Paper
Renewable energy is being more extensively utilized when the price of brown energy rises. Previous research focused on utilizing readily accessible green energy for augmenting non-renewable or brown energy, next to the expense of postponing along with rescheduling jobs when green energy supply was insufficient. Here, we propose an adaptive data cen...
Chapter
Full-text available
Genetic algorithm is based on the natural search process, which mimics natural growth and employs approaches inspired by natural evolution to solve optimization problems, employing bequest, mutation, and miscellany, as well as intersect. Its actual meaning is a competent, concurrent, and universal search approach that continuously obtains and build...
Chapter
Full-text available
Large-scale research evaluations, as well as the acquisition and analysis of massive amounts of data, in order to follow trends and models form the organization. As the world around us continues to change, many entrepreneurs are interested in learning how big data might help them enhance their businesses. While businesses have traditionally analyze...
Chapter
In the modern business condition, data being produced in most service associations is estimated in gigabytes or terabytes. On occasion, searching for information in a few terabytes of information can appear to be much the same as scanning for a needle in a sheaf. With the wild use of IT in business forms everywhere throughout the world, organizatio...
Chapter
Data mining is a user-friendly approach to locating previously unknown or hidden information in data. The employment of data mining technologies in the healthcare system may result in the finding of relevant data. Data mining is used in healthcare medicine to construct learning models that predict a patient’s condition. Data mining technologies hav...
Chapter
Because privacy concerns in IoT devices are the most sensitive of all the difficulties, such an extreme growth in IoT usage has an impact on the privacy and life spans of IoT devices, because until now, all devices communicated one to one, resulting in high traffic that may shorten the life of unit nodes. In addition, delivering data repeatedly inc...
Article
Full-text available
The world as we know it has changed over a short period of time, with the rise and spread of the deadly novel Corona virus known as COVID-19, the world will never be the same again. This study explores the devastating effects of the novel virus pandemic, the resulting lockdown, thus the need to transform the offline classroom into an online classro...
Chapter
The major reason for writing this chapter is from some of the issues we experience in our daily lives, such as traffic congestion, a lack of parking spaces, fuel waste, and pollution. If there isn't enough parking within a university's campus, it will take a long time to look for parking. If parking is available outside, employees will have to trav...
Chapter
Here the authors are trying to prepare a model for Identifying a patient whether he is Diabetic or not. The Pima Indian dataset has been used in this case study. There are basically 2 types of Diabetes. This chapter consists of 2 main sections: first is Data Pre-Processing and another is the Classifier Construction. After the pre-processing phase a...
Chapter
In the modern business condition, data being produced in most service associations is estimated in gigabytes or terabytes. On occasion, searching for information in a few terabytes of information can appear to be much the same as scanning for a needle in a sheaf. With the wild use of IT in business forms everywhere throughout the world, organizatio...
Preprint
Full-text available
Purpose: Diabetes is a type of metabolic disorder with a high level of blood glucose. Due to the high blood sugar, the risk of heart-related diseases like heart attack and stroke got increased. The number of diabetic patients worldwide has increased significantly, and it is considered to be a major life-threatening disease worldwide. The diabetic d...
Preprint
Full-text available
Fraudulent online transactions have caused significant damage and loss to individuals and companies over a period of time. There has been an increase in online frauds with the progression of state-of-the-art technologies and worldwide communication. The design of efficient fraud detection algorithms is critical for reducing these losses. Machine le...
Chapter
Full-text available
The prevalence of mobile network–associated gadgets keeps on growing dramatically. 5G network will give the hypothetical speed of 20 Gbps so that clients will get 100 Mbps of access data rate. An expected 5 billion gadgets exist around the world. With the development of wearable gadgets, an ordinary client can convey up to two network‐associated ga...
Chapter
In the present day, images and videos account for nearly 80% of all the data transmitted during our daily activities. This work employs a combination of novel stegnography and data compression methodologies. So that the stego image generated while using stegnograpghy to the source textual image could be further compacted in an efficient and product...
Chapter
Full-text available
Research is considering security of big data and retaining the performance during its transmission over network. It has been observed that there have been several researches that have considered the concept of big data. Moreover, a lot of those researches also provided security against data but failed to retain the performance. Use of several encry...
Chapter
Energy efficiency is a crucial parameter for the ad hoc wireless sensor network as it increases the life of a network. In an ad hoc wireless sensor network, every node ingests some part of energy with relaying of the remaining energy over that network. The suggested work is also directed toward elongating the life of the ad hoc wireless sensor netw...
Chapter
Full-text available
A mobile ad hoc network is a collection of autonomous mobile nodes having communication capability with one another within a radio range. This is a network with intrinsic attributes like auto-configuration and organization by the network itself. In traditional, AODV single metric is used for the route selection scheme. Here we put forward a stable...
Chapter
Machine learning (ML) and deep learning (DL) have both produced overwhelming interest and drawn unparalleled community interest recently. With a growing convergence of online activities and digital life, the way people have learned and function is evolving, but this also leads them towards significant security concerns. Protecting sensitive informa...
Article
Full-text available
Kidney stones are renal calculi that are formed due to the collection of calcium and uric acid. The major symptom for the existence of these renal calculi is severe pain, especially when it travels down the urethras To detect these renal calculi, ultrasound images are preferable. But these images have speckle noise which makes the detection of ston...
Chapter
Full-text available
With governments of different countries having a vision of smart cities, the technology adoption and implementation are at its peak and the current increase in the usage of advanced technology for a smart city has led to an increase in the carbon imprint across the globe, which needs immediate attention for the environment sustainability. Although...
Conference Paper
Web mining is a central part of data analysis. The fetching and discovering knowledge from the different web data in data mining mechanism is more important nowadays. Web usage mining customs data mining practice for the investigation of custom decoration from different data storages. In this article paper, introducing a new approach for web mining...
Chapter
Full-text available
With governments of different countries having a vision of smart cities, the technology adoption and implementation are at its peak and the current increase in the usage of advanced technology for a smart city has led to an increase in the carbon imprint across the globe, which needs immediate attention for the environment sustainability. Although...
Conference Paper
Full-text available
One of the potential top-level goals for 5G heterogeneous networks may be intellectual and perfect network which modifies consumer preferences in a proactive manner in addition to needs of channel. Research provides an interdisciplinary approach to e-health, primarily concern BDA, and radio space management inside a various level fifth generation n...
Book
Multidisciplinary Approach to Modern Digital Steganography reviews the security aspects of cloud, IoT, and Android platforms related to steganography and addresses emerging security concerns, new algorithms, and case studies in the field. Furthermore, the book presents a new approach to secure data storage on cloud infrastructure and IoT along with...
Article
Full-text available
Internet is used for exchanging information. Sometimes it is needed to transmit confidential data via internet. Here the authors use image steganography to pass confidential data within a cover image. To construct the algorithm, they take the combinational help of particle swarm optimization (PSO), bi-orthogonal wavelet transform (BWT), and genetic...
Article
Full-text available
The original version of this article unfortunately contained mistake. The affiliation address of Wegayehu Enbeyle should be changed to Department of Statistics, Mizan-Tepi University, Tepi, Ethiopia
Preprint
Full-text available
Obesity and overweight is a foremost concern around the globe for each group of age. This can be accelerated by the current imposed lockdown. However, excessive weight gain may result in other chronic diseases. This study has been considering the age group of 25 to 55 years as the sample populations and monitoring them from July, 2020 to November,...
Preprint
Call for Book Chapters Book Title: “Software Defined Networking for Ad Hoc Networks” Book Series Webpage: https://www.springer.com/series/15427 Chapter Submission Link: https://escripts.eai.eu/paper/submit/direct/333 For more detailed information, please visit the https://www.springer.com/in/authors-editors/book-authors-editors/resources-...
Conference Paper
The objective of knowledge acquisition is to disseminate it within society. Academic research and publishing the outcome through journals is one of the primary avenues for the dissemination of knowledge. There are various concepts associated with journal publication. Indexing, review methods, types of journals, journal quality measures are some of...
Chapter
The immense measure of classified information has been moved on the Internet. Information security turns out to be progressively significant for some applications, for instance, private transmission, video observation, military and clinical applications. Lately, there has been a great deal of enthusiasm for steganography and steganalysis. Steganogr...
Article
The wireless sensor network (WSN) is a swiftly growing technological knowledge stage with noteworthy and dynamic implementations in various fields. Due to minute battery power in WSNs, power utilization in WSN is a foremost problem. In this paper, the authors have compared resourceful power consumption protocols using different variants of SEP prot...
Chapter
In this chapter, the authors present an innovative, smart controller to sustain mobility in wireless sensor networks (WSNs). Principally, the focal point is dependent on the arrangement of fuzzy input variables (i.e., remaining battery power [RBP], mobility, and centrality solution) to crucial usages, similar to personnel safety in an industrialize...
Chapter
Digital enterprise transformation is the amalgamation of digital techniques into the scopes of a business enterprise, fundamentally altering how one can employ and furnish ethics to clients. An organization can be authorized to take digital transformation due to several reasons. But the most important reason is that it is the survival issuance for...
Chapter
Steganography is the way to conceal data inside a normal (non-mystery) record to keep it from discovery. While encryption expects to conceal the substance of data, steganography means to shroud the presence of data. Information security is significant when touchy information is communicated over the internet. Steganography and steganalysis methods...
Chapter
Full-text available
In this digital era, most of the daily works of users are captured in digital forms like image, audio, video, or even text. These may contain sensitive, confidential, or private information as well. To keep these, there are different techniques exercised over the years like chest, coffer, repository, treasury, etc. Sometimes such ways of hiding inf...
Chapter
Full-text available
Microblogging, where millions of users exchange messages to share their opinions on different trending and non-trending topics, is one of the popular communication media in recent times. Several researchers are concentrating on these data due to a huge source of information exchanges in online social media. In platforms such as Twitter, dataset-gen...
Chapter
Full-text available
COVID-19 is likely to pose a significant threat to healthcare, especially for disadvantaged populations due to the inadequate condition of public health services with people's lack of financial ways to obtain healthcare. The primary intention of such research was to investigate trend analysis for total daily confirmed cases with new corona virus (i...
Chapter
In the present research work, the use of geometrical figures have been made for the calculation of the value of pi. Instead of circle and square, ellipse and rectangle had been used to derive the value of pi. Ellipse can be considered as an extension of a circle where it had been stretched in two dimensions in unequal manner giving rise to the conc...
Article
Full-text available
Cancer has been described as a diverse illness with several distinct subtypes that may occur simultaneously. As a result, early detection and forecast of cancer types have graced essentially in cancer fact-finding methods since they may help to improve the clinical treatment of cancer survivors. The significance of categorizing cancer suffers into...
Article
In today's world, data security is very important. In the area of information and communication technology, security has become a major issue. Steganography is used for highly secure, secret information exchange. To design a digital data security application, we proposed combining the cryptography technique with the DES technique and the steganogra...
Article
Thedepictionandexecutionofamultidisciplinaryfact-findingdesignincludingasmartagent-basedarchitecture for collective e-commerce operations are presented in this article. A Multi-Agent System (MAS)structure is designed and developed for multidiscipline e-commerce settings including a variety of globally distributed consumers and merchants. This frame...
Chapter
In the information technology community, communication is a vital issue. And image transfer creates a major role in the communication of data through various insecure channels. Security concerns may forestall the direct sharing of information and how these different gatherings cooperatively direct data mining without penetrating information securit...
Book
A sensor system may contain an immense number of straightforward sensor Nodes that are conveyed at some reviewed site. In enormous zones, such a system, as a rule, has a work structure. For this situation, a portion of the sensor Nodes goes about as switches, sending messages starting with one of their neighbors then onto the next. The Nodes are de...
Preprint
I am pleased to inform you that our edited book proposal titled “Cyber Security and Digital Forensics: Challenges and Future Trends” is accepted and approved by Scrivener Publishing (Wiley) for Publishing. The book will be published under the Wiley-Scrivener imprint and will be submitted for indexing by Scopus and offered to Web of Science. Tentat...
Preprint
Full-text available
Computational statistics focus on devising an efficient methodology to obtain quantitative solutions for problems that are devised quantitatively. This subject brings together computational capability and statistical advanced thought processes together to solve some of the problems efficiently. Some of the interesting areas of the subject are optim...
Preprint
Full-text available
The Handbook “Emerging Research Approaches to Cybersecurity and Network Security” presents the latest methodologies and trends in detecting and preventing cyber and network threats. Investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students...
Preprint
Full-text available
Steganography is the art of secret writing. The purpose of steganography is to hide the presence of a message from the intruder. This book gives an insight to the different latest techniques and state of the art methods, algorithms, architectures, models, methodologies, and case studies of steganography in the domain of Cloud, IoT and Android Platf...
Preprint
Full-text available
The handbook “An Interdisciplinary Approach to Modern Network Security” presents the latest methodologies and trends in detecting and preventing network threats investigating the potential of current and emerging security technologies, this publication is an all-inclusive reference source for academicians, researchers, students, professionals, prac...
Article
Full-text available
Data hiding is a technique for the secure transmission of confidential data. Many data hiding techniques exist and steganography is the most important one. This paper presents a new steganography method in the spatial domain. We use steganography to send confidential information from sender to receiver. Here, we generate a password on a random basi...
Article
Full-text available
According to the optimization techniques examined in the past, the performance of Genetic Algorithm (GA) based approaches are seen as a substandard technique compared to PSO based approaches with a target to improve the performance of GA approach. The modification in GA is performed and proposed in this work. The modification performed in the GA ba...
Article
Full-text available
The Internet is used for exchanging information. Sometimes it is required to transmit confidential data over the internet. Here the authors use image steganography to embed confidential data within a cover image. To construct the technique, this article combines the help of Particle Swarm Optimization (PSO), Bi-Orthogonal Wavelet Transform (BWT) an...
Article
Wireless sensor networks (WSNs) have enabled an improved awareness in a range of purposes like battlefield surveillance, disaster management, industrial process monitoring and control, machine health monitoring, and medical applications. Accordingly, great numbers of sensor nodes (SNs) are arranged for usages that can function as an individual. Bec...
Article
Information or data is vital asset to us. Steganography is the specialty of secured, or hidden, writing. The reason for steganography is undercover communication to hide the presence of a message from a third party. This proposed framework manages executing security-utilizing Steganography. The mediums are typically images, video, audio and so fort...
Preprint
Information or data is a vital asset to us. Steganography is the specialty of secured, or hidden, writing. The reason for steganography is undercover communication to hide the presence of a message from a third party. This proposed framework manages to execute security-utilizing Steganography. The mediums are typically images, video, audio and so f...
Article
Wireless Sensor Network (WSN) is demanding and very appealing technology useful for different applications. WSNs consist of wirelessly interconnected sensor nodes (SNs) which can assemble, distribute and process information in a range of application regions. Power utilization in WSN is a key difficulty. Some of the usages comprise landslide detecti...
Article
Full-text available
Steganography is data hiding technique in internet. Here we send CAPTCHA codes within a cover image using image steganography. CAPTCHA are the crazy codes. They are used in human response test. The word is actually acronym for: “Completely Automated Public Turning test to tell Computers and Humans Apart”. It is a type of challenge-response test use...
Article
Full-text available
p>Steganography is data hiding technique in internet. Here we send CAPTCHA codes within a cover image using Image steganography. CAPTCHA are the crazy codes. They are used in human response test. The word is actually an acronym for: " C ompletely A utomated P ublic T uring test to tell C omputers and H umans A part". It is a type of challenge–respo...
Conference Paper
Full-text available
With the ever increasing amount and variety of data to be stored and transmitted in various mediums, the specification of security which has to be established at various levels of medium access and the accompanying issues of authentication and authorization has become a critical factor. Various stenographic, watermarking and data-embedding algorith...