Sourabh Chandra

Sourabh Chandra
Calcutta Institute of Technology, Kolkata · Computer Science and Engineering

Research Scholar

About

40
Publications
72,374
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
298
Citations
Citations since 2016
11 Research Items
268 Citations
201620172018201920202021202201020304050
201620172018201920202021202201020304050
201620172018201920202021202201020304050
201620172018201920202021202201020304050
Additional affiliations
June 2008 - March 2020
CALCUTTA INSTITUTE OF TECHNOLOGY
Position
  • Professor (Assistant)

Publications

Publications (40)
Research
Full-text available
Data is one of the most relevant and important term from the ancient Greek age to modern science and business. The amount of data and use of data transformation for organizational work is increasing. So, for the sake of security and to avoid data loss and unauthorized access of data we have designed an image Steganographic algorithm implementing bo...
Article
Full-text available
Sentiment analysis is defined as the process of mining of data, view, review or sentence to predict the emotion of the sentence through natural language processing (NLP). The sentiment analysis involve classification of text into three phase "Positive", "Negative" or "Neutral". It analyzes the data and labels the 'better' and 'worse' sentiment as p...
Article
Full-text available
In this paper, we propose a new optimal framework with repair strategy to resolve major issues in the assignment of resources to mobile terminals (plainly to users) in WCDMA networks. The main goal of this proposed approach is to tackle the issues in the assignment of resources such as (1) load factor, (2) total capacity, (3) power, (4) channelizat...
Conference Paper
Full-text available
This paper presents the review of certain important and well discussed traditional as well as proposed search algorithms with respect to their time complexity, space Complexity , merits and demerits with the help of their realize applications. This paper also highlights their working principles. As it is well known that every sorted or unsorted lis...
Article
Full-text available
One of the major fundamental issues of Computer Science is arrangement of elements in the database. The efficiency of the sorting algorithms is to optimize the importance of other sorting algorithms11. The optimality of these sorting algorithms is judged while calculating their time and space complexities12. The idea behind this paper is to modify...
Article
Full-text available
In the recent trend of network and technology, " Cryptography " and " Steganography " have emerged out as the essential elements of providing network security. Although Cryptography plays a major role in the fabrication and modification of the secret message into an encrypted version yet it has certain drawbacks. Steganography is the art that meets...
Conference Paper
The amount of data is increasing tremendously. With the upgraded technology the use of raw data as a sharing particle through various networks has becoming a part of the business procedure. Therefore one business organization has to incorporate the proper constraints on data and should implement a proper security algorithm that will be useful to pr...
Conference Paper
With the emerging Science and Technology, network security has become a major concern. Researchers have proposed new theories and applications to eradicate the unethical access to the secret message. This paper presents a new algorithm on Symmetric Key Cryptography. The algorithm comprises of a bitwise shifting operation, folding logic along with s...
Conference Paper
Full-text available
Computer science has made a tremendous impact in practical as well as real life. In recent days, it has faced a lot of challenges and to overcome those, many researchers have put forward their brains to develop various efficient algorithms. Among those, searching and sorting are the most fundamental to keep track of the database. In this paper, a n...
Conference Paper
Full-text available
In the present day to day life, due to the inconvenience of travelling from place to place, information/messages are sent through the internet. As a result it faces a lot of obstacles. The internet security techniques consist of various provisions and policies, which are adopted by the network administrator so as to prevent and monitor the unauthor...
Conference Paper
Full-text available
With the increasing pace in science and technology, network security has become a great concern. The security demand of today's world requires better encryption and decryption techniques at the root level. The techniques should be simple as well as inexpensive both in terms of time and space. In this paper, we have proposed a simple symmetric key a...
Conference Paper
Full-text available
Today's civilization is inextricably involved with all sorts of data communication. For every organization and business bodies, handling large amount of data with proper confidentiality and security is an important task to do. To achieve the secure transfer of data through the network we have proposed a symmetric key cryptographic algorithm that pr...
Conference Paper
Full-text available
With the crucial growth of technology, data security over the network and internet has achieved immense of prominence today and achieving good security is always a talk of a good security method being in place. Therefore, there is need of better security method with better efficiency in order to increase the security and authenticity and to efficie...
Conference Paper
Full-text available
Network security is an important aspect of information sharing. Attempts have been made to remove various insecurities over internet. For this, many technological implementations and security policies have been developed. The amount of data, transferred, is not a factor. The basic factor is, how much security, the channel provides while transmittin...
Conference Paper
Full-text available
This paper is introducing a new image encryption method using hyper chaos based keys, multi step group-based binary gray encryption, bit shifting logic and finally prepares a cipher image, an encrypted image recognizing the plaintext image is very next to impossible. The principal advantage of chaos base encryption is there are sequences of key for...
Conference Paper
Full-text available
requires special operations like insertion, deletion, sorting, searching, traversing etc. Sorting organizes the data in a particular order which makes other operations easier. Hence a better sorting algorithm increases the efficiency of each of the subsequent operations. Among various Sorting Techniques, Divide and Conquer algorithms hold promise s...
Conference Paper
Full-text available
requires special operations like insertion, deletion, sorting, searching, traversing etc. Sorting organizes the data in a particular order which makes other operations easier. Hence a better sorting algorithm increases the efficiency of each of the subsequent operations. Among various Sorting Techniques, Divide and Conquer algorithms hold promise s...
Conference Paper
Full-text available
Technology is advancing day-to-day. For a better and faster technology, information security is a must. This requires data authentication at the execution levels. Cryptography is a useful tool through which secure data independency can be established. It uses two basic operations namely encryption and decryption for secure data communication. A lar...
Conference Paper
Full-text available
Science and Technology are updating rapidly. Data are transferred through various communicative mediums. Hence always there been a major requirement of confidentiality and secure authorization of information to prevent the unauthorised access and attacks. Symmetric key cryptography is an integral part of cryptographic technique which ensures high s...
Conference Paper
Full-text available
Visual Cryptography is an astonishing encryption technique to hide data/information in images, which divide secret image into multiple/multilevel layers. Each layer carries some information. The advantage of the visual Cryptography is in its decryption process where without any complex cryptographic computation encrypted information is decrypted us...
Article
Full-text available
Though the concept of Quality Assurance(QA) in Education is relatively new some guidelines are already in place. With the new concepts of education dissemination the need of newer effective QA methodologies are evident. The present work has been undertaken to derive a framework of digital distance education development in developing countries’ env...
Article
Full-text available
There are many popular problems in different practical fields of computer sciences, database applications, etc. One of these basic operations is the sorting algorithm. It has attracted a great deal of research. A lot of sorting algorithms has already been developed. These algorithms have enhanced the performance in terms of computational complexity...
Article
Full-text available
There are many popular problems in different practical fields of computer sciences, database applications, etc. One of these basic operations is the sorting algorithm. It has attracted a great deal of research. A lot of sorting algorithms has already been developed. These algorithms have enhanced the performance in terms of computational complexity...
Article
Full-text available
Zooming simply means enlarging a picture in a sense that the details in the image became more visible and clear. Digital zoom is basically image processing within a camera. During a digital zoom, the center of the image is magnified and the edges of the picture got crop out. Due to magnified center, it looks like that the object is closer to you. D...
Article
Full-text available
Black money transaction is a major drawback for country's economy. Taxes collected from the white money transactions are used for the development of society. In this proposal, we are introducing a technology which is going to eradicate the problem of black money transaction. The main function of this device is " Money Transfer " from one place to a...
Article
Full-text available
It is the age of Technology. Today, the research is putting focus on innovative development and comparing and analysing the existing technologies. The field of Software Technology is always associated with some basic operations. These operations operate, based on some internal codes. One of these basic operations is searching. It has both practical...
Article
Full-text available
Incremental software development methods have been traced back to 1957. In 1974, it was introduced an adaptive software development process. So-called "lightweight" software development methods evolved in the mid-1990s as a reaction against "heavyweight" methods, which were characterized by their critics as a heavily regulated, regimented, microman...
Article
Full-text available
The cram of plant disease refers to the studies of visually observable patterns of a particular plant. Nowadays produces face many traits/diseases. Damage of the insect is one of the most important trait/disease. Insecticides are not always proved efficient because insecticides may be toxic to some kind of birds. This paper introduces defect identi...
Article
Full-text available
Image scrambling is an effective method for providing image security. The basic idea of scrambling is to change the image pixel positions through matrix transform to achieve the visual effect of disorder. Cellular automata can be successfully applied for this purpose. This paper presents digital image scrambling based on modified shuffling. The met...
Article
Full-text available
The cram of plant disease refers to the studies of visually observable patterns of a particular plant. Nowadays produces face many traits/diseases. Damage of the insect is one of the most important trait/disease. Insecticides are not always proved efficient because insecticides may be toxic to some kind of birds. This paper introduces defect identi...
Article
Full-text available
Image scrambling is an effective method for providing image security. The basic idea of scrambling is to change the image pixel positions through matrix transform to achieve the visual effect of disorder. Cellular automata can be successfully applied for this purpose. This paper presents digital image scrambling based on modified shuffling. The met...

Network

Cited By

Projects

Project (1)
Project
Searching Algorithm