Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Arijit Sur is active.

Publication


Featured researches published by Arijit Sur.


ieee india conference | 2009

A New Image Watermarking Scheme Using Saliency Based Visual Attention Model

Arijit Sur; S. Srikar Sagar; Rajarshi Pal; Pabitra Mitra; Jayanta Mukhopadhyay

In this paper, a new spatial domain adaptive image watermarking scheme is proposed which embeds watermark information to the least salient pixels of the image. Watermarked image thus produced has less perceptual error with respect to human visual system (HVS). In proposed scheme least salient pixels are determined using the well known Itti-Koch model. Experimental results reveal that proposed scheme has less per- ceptual error than existing spatial domain embedding scheme.


ieee international conference on communication software and networks | 2011

Length based network steganography using UDP protocol

Anand S. Nair; Abhishek Kumar; Arijit Sur; Sukumar Nandi

In recent scientific literature, network based steganography is regarded as a new research direction in the paradigm of information hiding. Few approaches have been found which embed secret information by altering the length of network packets. In this paper, the steganographic security of an existing network length based embedding algorithm has been analyzed and a new scheme has been proposed to overcome the limitation of the existing scheme. In the proposed scheme, the length of UDP datagram is modified to embed the secret data. Experimental results show that proposed scheme ensures more security than that of the existing algorithm.


national conference on communications | 2013

A robust compressed domain video watermarking in P-frames with controlled bit rate increase

Tanima Dutta; Arijit Sur; Sukumar Nandi

In recent years video watermarking has become an important research issue due to increase in threats of video piracy, content authentication, and ownership integrity. In this paper, we propose a robust watermarking method with the blind extraction process for compressed video streams like H.264/AVC. The method embeds invisible watermark bits into the P-frames. Appropriate block selection and the embedding algorithm restrict the increase in video bit rate. The security of the method lies in selecting candidate blocks using a pseudo random key from set of previously selected blocks. The simulation results show that the proposed method is robust against common image and video watermarking attacks. A robust watermark is generated in order to withstand frame drop and insert attacks, which increases the overall robustness of the proposed method.


international conference on computer science and information technology | 2011

An Active Host-Based Detection Mechanism for ARP-Related Attacks

Ferdous A. Barbhuiya; S. Roopa; Ritesh Ratti; Neminath Hubballi; Santosh Biswas; Arijit Sur; Sukumar Nandi

Most of the LAN based-attacks involves the spoofing of the victim host with falsified IP-MAC pairs. MAC Spoofing is possible because of the stateless nature of the Address Resolution Protocol (ARP), which is responsible for resolving IP Addresses to MAC Addresses. Several mechanisms have been proposed to detect and mitigate ARP spoofing attempts both at the network level and at the host level, but each of them have their own drawback. In this paper we propose a Host-based Intrusion Detection system for LAN attacks which work without any extra constraint like static IP-MAC, modifying ARP etc. The scheme is successfully validated in a test bed with various attack scenarios and the results show the effectiveness of the proposed technique.


AST/UCMA/ISA/ACN'10 Proceedings of the 2010 international conference on Advances in computer science and information technology | 2010

An active intrusion detection system for LAN specific attacks

Neminath Hubballi; S. Roopa; Ritesh Ratti; Ferdous A. Barbhuiya; Santosh Biswas; Arijit Sur; Sukumar Nandi

Local Area Network (LAN) based attacks are due to compromised hosts in the network and mainly involve spoofing with falsified IP-MAC pairs. Since Address Resolution Protocol (ARP) is a stateless protocol such attacks are possible. Several schemes have been proposed in the literature to circumvent these attacks, however, these techniques either make IP-MAC pairing static, modify the existing ARP, patch operating systems of all the hosts etc. In this paper we propose an Intrusion Detection System (IDS) for LAN specific attacks without any extra constraint like static IP-MAC, changing the ARP etc. The proposed IDS is an active detection mechanism where every pair of IP-MAC are validated by a probing technique. The scheme is successfully validated in a test bed and results also illustrate that the proposed technique minimally adds to the network traffic.


Multimedia Tools and Applications | 2016

Object based watermarking for H.264/AVC video resistant to rst attacks

Sibaji Gaj; Ashish Singh Patel; Arijit Sur

In this paper, a compressed domain video watermarking scheme is proposed which embeds the watermark in the homogeneous moving object within a shot of video sequence to resist geometric attacks such as rotation, scaling etc. Intuitively, object based watermarking results low payload and has the least impact on visual quality since the object area is generally small and highly textured. The proposed work has two main contributions, firstly, an existing compressed domain motion coherent block detection algorithm [7] is extended to detect the moving objects within a video shot and secondly, a watermarking scheme has been proposed by embedding within the moving objects to resist RST attacks. A comprehensive set of experiments has been carried out to justify the applicability of the proposed scheme over the existing literature.


international conference on multimedia information networking and security | 2010

Detection of Packet Length Based Network Steganography

Anand S. Nair; Arijit Sur; Sukumar Nandi

Network Steganography which uses length of the packets for hiding the secret data are getting more importance day by day. Various steganographic algorithms have been proposed which embeds the data length modulating sequence of packet lengths with secret data stream. In this paper, a network steganalysis scheme has been proposed which can detect the presence of steganographic embedding by modifying the length of the UDP datagrams. Experimental results show that proposed detection scheme can detect packet length based network steganography with considerable accuracy.


european signal processing conference | 2015

3D video watermarking using DT-DWT to resist synthesis view attack

Shuvendu Rana; Arijit Sur

In this paper, a 3D video watermarking scheme is proposed for depth image based rendering (DIBR) based multi view video plus depth (MVD) encoding technique. To make the scheme invariant to view synthesis process in DIBR technique, watermark is inserted in a center view which is rendered from left and right views of a 3D video frame. A low pass center view, obtained from the motion compensated temporal filtering over all the frames of a GOP, is used for embedding to reduce the temporal flickering artifacts. To make the scheme invariant to the DIBR process, 2D DT-DWT block coefficients of low-pass center view are used for embedding by exploiting its shift invariance and directional property. A comprehensive set of experiments have been carried out to justify the robustness of the proposed scheme over existing schemes with respect to compression of the 3D-HEVC video codec and synthesis view attack.


international conference on image processing | 2014

SIFT based robust image watermarking resistant to resolution scaling

Priyatham Bollimpalli; Nilkanta Sahu; Arijit Sur

In this paper, a novel image watermarking scheme is proposed which is robust to resolution scaling. In the proposed method, SIFT (Scale Invariant Feature Transform) features are used which are invariant to rotation, translation and scaling. Most of the existing watermarking algorithms that uses SIFT features, fail to retain the watermark when the image is heavily scaled down. In the proposed scheme, a context coherent object or patch is inserted in the image such that it generates strong SIFT features. These newly generated SIFT features themselves work as a watermark. Since the SIFT features are invariant to scaling, these features can be extracted from any image resolution with high probability. The experimental results support the contention that the proposed method is considerably robust against resolution scaling.


Multimedia Tools and Applications | 2015

Robust watermarking for resolution and quality scalable video sequence

Shuvendu Rana; Nilkanta Sahu; Arijit Sur

Due to the increasing heterogeneity among the end using devices for playing multimedia content, scalable video communication attracts significant attention in recent days. As a consequence, content authentication or ownership authentication using watermarking for scalable video stream is becoming emerging research topic. In this paper, a watermarking scheme for scalable video is proposed which is robust against spatial and quality scalability. In the proposed scheme, a DC frame is generated by accumulating DC values of non-overlapping blocks for every frame in the input video sequence. DC frame sequence is up-sampled and subtracted from the original video sequence to generate residual frame sequence. Then Discrete Cosine Transform (DCT) based temporal filtering is applied on DC as well as residual frame sequence. Watermark is embedded in low pass frames of DC frames and up sampled watermark is embedded in the low pass residual frames to achieve the graceful improvement of watermark signal in successive enhancement layer. A comprehensive set of experiments are done to justify the superiority of the proposed scheme over existing literature with respect to spatial and quality adaptation attacks as well as visual quality.

Collaboration


Dive into the Arijit Sur's collaboration.

Top Co-Authors

Avatar

Shuvendu Rana

Indian Institute of Technology Guwahati

View shared research outputs
Top Co-Authors

Avatar

Sibaji Gaj

Indian Institute of Technology Guwahati

View shared research outputs
Top Co-Authors

Avatar

Sukumar Nandi

Indian Institute of Technology Guwahati

View shared research outputs
Top Co-Authors

Avatar

P. K. Bora

Indian Institute of Technology Guwahati

View shared research outputs
Top Co-Authors

Avatar

Piyush Goel

Indian Institute of Technology Kharagpur

View shared research outputs
Top Co-Authors

Avatar

Arnab Sarkar

Indian Institute of Technology Guwahati

View shared research outputs
Top Co-Authors

Avatar

Jayanta Mukhopadhyay

Indian Institute of Technology Kharagpur

View shared research outputs
Top Co-Authors

Avatar

Nilkanta Sahu

Indian Institute of Technology Guwahati

View shared research outputs
Top Co-Authors

Avatar

Satish Kumar

Indian Institute of Technology Guwahati

View shared research outputs
Top Co-Authors

Avatar

Jayanta Mukherjee

Indian Institute of Technology Kharagpur

View shared research outputs
Researchain Logo
Decentralizing Knowledge