Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Debnath Bhattacharyya is active.

Publication


Featured researches published by Debnath Bhattacharyya.


Sensors | 2010

A comparative study of wireless sensor networks and their routing protocols.

Debnath Bhattacharyya; Tai-hoon Kim; Subhajit Pal

Recent developments in the area of micro-sensor devices have accelerated advances in the sensor networks field leading to many new protocols specifically designed for wireless sensor networks (WSNs). Wireless sensor networks with hundreds to thousands of sensor nodes can gather information from an unattended location and transmit the gathered data to a particular user, depending on the application. These sensor nodes have some constraints due to their limited energy, storage capacity and computing power. Data are routed from one node to other using different routing protocols. There are a number of routing protocols for wireless sensor networks. In this review article, we discuss the architecture of wireless sensor networks. Further, we categorize the routing protocols according to some key factors and summarize their mode of operation. Finally, we provide a comparative study on these various protocols.


international conference on computational intelligence and communication networks | 2010

Wireless Sensor Networks and Its Routing Protocols: A Comparative Study

Subhajit Pal; Debnath Bhattacharyya; Geetam Singh Tomar; Tai-hoon Kim

Wireless sensor networks with hundreds to thousands of sensor nodes can collect information from an un attendant environment and transmit the collected information to a specific user depending on user end application. These sensor nodes have some constraints due to limited energy, storage capacity and computing power. Data sre routed from one node to another using different routing protocols. There are a number of routing protocols for wireless sensor network. In this review article, we discuss the architecture of the wireless sensor network. Further, we categorize the routing protocols according to some factors and summarize on their mode of operation. At the end, we put up a comparative study on these protocols.


ubiquitous computing | 2011

Brain Tumor Detection Using MRI Image Analysis

Debnath Bhattacharyya; Tai-hoon Kim

Brain tumor is the most commonly occurring malignancy among human beings, so study of brain tumor is important. In this paper, we propose an image segmentation method to indentify or detect tumor from the brain magnetic resonance imaging (MRI). There are many thresholding methods developed but they have different result in each image. So we need a method by which detection of tumor can be done uniquely. In this paper we propose a set of image segmentation algorithms which gives a satisfactory result on brain tumor images.


international conference on computer and electrical engineering | 2009

Biometric Authentication Techniques and its Future Possibilities

Debnath Bhattacharyya; Rahul Ranjan; Poulami Das; Tai-hoon Kim; Samir Kumar Bandyopadhyay

Advances in the field of Information Technology also make Information Security an inseparable part of it. In order to deal with security, Authentication plays an important role. This paper presents a review on the biometric authentication techniques and some future possibilities in this field. In biometrics, a human being needs to be identified based on some characteristic physiological parameters. A wide variety of systems require reliable personal recognition schemes to either confirm or determine the identity of an individual requesting their services. The purpose of such schemes is to ensure that the rendered services are accessed only by a legitimate user, and not anyone else. By using biometrics it is possible to confirm or establish an individual’s identity. The position of biometrics in the current field of Security has been depicted in this work. We have also outlined opinions about the usability of biometric authentication systems, comparison between different techniques and their advantages and disadvantages in this paper.


software engineering, artificial intelligence, networking and parallel/distributed computing | 2008

A Secure Scheme for Image Transformation

Samir Kumar Bandyopadhyay; Debnath Bhattacharyya; Debashis Ganguly; Swarnendu Mukherjee; Poulami Das

The dynamic growth in the field of Information communication has hiked the ease of Information transmission. But this type of real advancement in other sense has explored so many possibilities of information being snooped, at the time of communication in between the sender and the intended receiver. So, day by day Information Security is becoming an inseparable part of Computing and Communication. Various tools are available in order to address those issues and in them Steganography plays a significant role. In this paper, a heuristic approach for Information hiding in the form of multimedia objects or text using Steganography is proposed keeping in mind two considerations - Size and degree of security. Here, the Information is hidden behind an image in the form of an encoded matrix which is obtained from the bit matrix of the embedded object.


Telecommunication Systems | 2013

A GA based audio steganography with enhanced security

Krishna Bhowal; Debnath Bhattacharyya; Anindya Jyoti Pal; Tai-hoon Kim

In the current internet community, secure data transfer is limited due to its attack made on data communication. So more robust methods are chosen so that they ensure secured data transfer. One of the solutions which came to the rescue is the audio Steganography.“A GA Based Audio Steganography with enhanced security” is one propose system which is based on audio Steganography and cryptography, ensures secure data transfer between the source and destination. Here we present a novel, principled approach to resolve the remained problems of substitution technique of audio Steganography. We use most powerful encryption algorithm (RSA) to encrypt message in the first level of security, which is very complex to break. In the second level, we use a more powerful GA based LSB (Least Significant Bit) Algorithm to encode the encrypted message into audio data. Here encrypted message bits are embedded into random and higher LSB layers, resulting in increased robustness against noise addition. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well. On the other hand, to reduce the distortion, GA operators are used.The basic idea behind this paper is maintained randomness in message bit insertion into audio data for hiding the data from hackers and multi-objective GA is used to reduce distortion.


ubiquitous computing | 2011

Performance Comparision of AODV, DSR and DSDV under Various Network Conditions: A Survey

Geetam Singh Tomar; Tripti Sharma; Debnath Bhattacharyya; Tai-hoon Kim

Mobile Ad-hoc networks are characterized by constant topology changes, in the absence of fixed infrastructure and lack of any centralized control. Traditional routing algorithms prove to be inefficient in such a changing environment. Ad-hoc routing protocols such as Dynamic Source Routing (DSR), Ad-hoc On-Demand Distance Vector Routing (AODV) and Destination sequence Vector (DSDV) have been proposed to solve the multi hop routing problem in Ad-hoc networks. Extensive research has been done in comparing the different proposed ad-hoc routing protocols under varying network scenarios. Routing overhead, packet delivery ratio, end-to-end delay, path optimality, and throughput are some metrics commonly used in the comparisons. In this survey paper we had analyzed the performance of the routing algorithms under various networks conditions.


international conference on communication systems and network technologies | 2013

Designing and Performance Analysis of a Proposed Symmetric Cryptography Algorithm

Bijoy Kumar Mandal; Debnath Bhattacharyya; Samir Kumar Bandyopadhyay

We design an algorithm to merge both RSA algorithm and Diffie-Hellman Algorithm of them to provide a user with even higher level of data security. Actually, our intent is to secure data of smaller as well as larger size by obtaining one randomly chosen key pair from set of RSA keys and one randomly chosen secret key using Diffie-Hellman algorithm and then applying RSA encryption to make even public components of Diffie-Hellman algorithm inaccessible for any eavesdropper freely. Encrypted exchange of public components of Diffie-Hellman part of the system makes it hidden from all other than intended users to see Diffie-Hellman generator and prime modulus. This will make our algorithm M*N times complex to break using even the latest version of Brute Force attack, where M and N are corresponding complexities imposed by the Diffie-Hellman and RSA algorithms respectively. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. This paper provides evaluation of five of the most common encryption algorithms namely: AES (Rijndael), DES, 3DES, RC2, Blowfish. A comparison has been conducted with our proposed algorithm.


ieee international conference on cognitive informatics | 2009

Discrete Fourier Transformation based Image Authentication technique

Debnath Bhattacharyya; Jhuma Dutta; Poulami Das; Rathit Bandyopadhyay; Samir Kumar Bandyopadhyay; Tai-hoon Kim

In this paper a novel technique, Discrete Fourier Transformation based Image Authentication (DFTIAT) has been proposed to authenticate an image and with its own application one can also transmit secret message or image over the network. Instead of direct embedding a message or image within the source image, choosing a window of size 2 × 2 of the source image in sliding window manner then convert it from spatial domain to frequency domain using Discrete Fourier Transform (DFT). The bits of the authenticating message or image are then embedded at LSB within the real part of the transformed image. Inverse DFT is performed for the transformation from frequency domain to spatial domain as final step of encoding. Decoding is done through the reverse procedure. The experimental results have been discussed and compared with the existing steganography algorithm S-Tools. Histogram analysis and Chi-Square test of source image with embedded image shows the better results in comparison with the S-Tools.


multimedia and ubiquitous engineering | 2007

Handwritten Signature Extraction from Watermarked Images using Genetic Crossover

Samir Kumar Bandyopadhyay; Debnath Bhattacharyya; Poulami Das

In this paper, we propose a technique for embedding handwritten signature image data into color images and extracting embedded image data from color images. For the sake of security, two watermarked images will be transmitted in different times from the senders end to the receivers end, in due course, from two transmitted images, at the receivers end, original handwritten signature image data will be extracted; a new way of data hiding. From 1994 onward, the use and popularity of Internet in business particular has explored the area of Intellectual Property protection techniques. This paper presents a technique for watermarking Handwritten Signature that achieves robustness by responding to complexity of copy detection, vulnerability to mark removal after revelation for ownership verification and mark integrity issues due to partial mark removal; these three weaknesses.

Collaboration


Dive into the Debnath Bhattacharyya's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Poulami Das

Heritage Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Hye-jin Kim

Sungshin Women's University

View shared research outputs
Top Co-Authors

Avatar

Debashis Ganguly

Heritage Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Tai-Hoon Kim

Sungshin Women's University

View shared research outputs
Top Co-Authors

Avatar

Kheyali Mitra

Heritage Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hye-Jin Kim

Jeju National University

View shared research outputs
Researchain Logo
Decentralizing Knowledge