Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where J. K. Mandal is active.

Publication


Featured researches published by J. K. Mandal.


Archive | 2013

Proceedings of the 4th International Conference on Frontiers in Intelligent Computing: Theory and Applications (FICTA) 2015

Swagatam Das; Tandra Pal; Samarjit Kar; Suresh Chandra Satapathy; J. K. Mandal

The proceedings of the 4thInternationalConferenceon Frontiers in Intelligent Computing: Theory and Applications 2015 (FICTA 2015) serves as the knowledge centre not only for scientists and researchers in the field of intelligent computing but also for students of post-graduate level in various engineering disciplines. The book covers a comprehensive overview of the theory, methods, applications and tools of Intelligent Computing. Researchers are now working in interdisciplinary areas and the proceedings of FICTA 2015 plays a major role to accumulate those significant works in one arena. The chapters included in the proceedings inculcates both theoretical as well as practical aspects of different areas like Nature Inspired Algorithms, Fuzzy Systems, Data Mining, Signal Processing, Image processing, Text Processing, Wireless Sensor Networks, Network Security and Cellular Automata.


international symposium on electronic system design | 2010

Authentication/Secret Message Transformation through Wavelet Transform Based Subband Image Coding (WTSIC)

J. K. Mandal; Madhumita Sengupta

In this paper a DWT based frequency domain steganographic technique, termed as WTSIC has been proposed where the cover PPM image transform into the time domain through DWT, resulting four sub-image components as ‘Low resolution’, ‘Horizontal orientation’, ‘Vertical orientation’ and ‘Diagonal orientation’. Secret message/image bits stream in varying positions are embedded in all three components and the experimental results against statistical and visual attack has been computed and compared with the existing steganographic algorithm like IAFDDFTT, [1] in terms of Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR), Standard Deviation (SD) Analysis and Image fidelity (IF) Analysis, which shows better performances in WTSIC.


international conference on emerging applications of information technology | 2011

Steganographic Technique Based on Minimum Deviation of Fidelity (STMDF)

J. K. Mandal; Madhumita Sengupta

In this paper a minimum deviation of fidelity based data embedding technique (STMDF) has been proposed where two bits per byte have been replaced by choosing the position randomly between LSB and up to fourth bit towards MSB. This technique also optimized the intensity value of pixel after embedding by comparing it with original pixel value. STMDF technique has been compared with existing Wu-Tsais Method [1] and H.C. Wu Method [2] techniques, where proposed technique shows better performance in terms of PSNR and fidelity of the stego images.


international conference on recent trends in information technology | 2011

A steganographic scheme for colour image authentication (SSCIA)

Nabin Ghoshal; J. K. Mandal

This paper deals with a novel steganographic technique which demonstrates the colour image authentication technique in frequency domain based on the Discrete Fourier Transform (DFT). The DFT is applied on sub-image block called mask of size 2 × 2 for frequency components of corresponding spatial component. This transforms process done from beginning to end mask in row major order of the carrier image. Image authentication is done by hiding secrete message/image into the transformed frequency components of carrier image. Four secrete message/image bits are fabricated within the transformed real frequency component of each carrier image byte except the LSB of first frequency component of each mask. After embedding, a delicate re-adjust phase is incorporated in all the frequency component of each mask, to keep the quantum value positive and non fractional in spatial domain. Robustness is achieved by hiding an authenticating or secretes message/image in the frequency component with positive and negatives both quantum values and invisibility is satisfied in spatial domain using delicate re-adjust phase. Inverse DFT (IDFT) is performed after embedding to transform embedded image in frequency domain to spatial domain. This novel technique is also applicable for secrete data transmission through carrier colour image by hiding secrete data. Experimental results conform that the proposed algorithm performs better than discrete cosine transformation (DCT), Quaternion Fourier Transformation (QFT) and Spatio Chromatic DFT (SCDFT) based schemes.


international conference on computer and communication technology | 2012

A Compression Technique Based on Optimality of LZW Code (OLZW)

Utpal Nandi; J. K. Mandal

A loss less dictionary based data compression technique has been proposed in this paper which is based on the optimality of LZW code. The compression process is started with empty dictionary and if the next symbol to be encoded is already in dictionary, length of symbol code is determined by the highest symbol code in the dictionary and encoded with the code in the dictionary. Otherwise, the symbol is encoded with 8-bit ASCII code. Some of the limitations of LZW compression technique have been eliminated in the proposed compression technique. Comparisons are made between proposed technique and two different version of LZW data compression technique which shows that the proposed technique works well for small size files particularly.


international conference on advanced computing | 2008

Masking based Data Hiding and Image Authentication Technique (MDHIAT)

Nabin Ghoshal; A. Sarkar; D. Chakraborty; S. Ghosh; J. K. Mandal

In this paper a masking based data hiding and image authentication technique (MDHIAT) has been proposed by embedding a message/image into a colour image. Bits from authenticating message/image are embedded in single bit position under each byte of the source image by choosing a standard 3 times 3 mask in row major order. Point of insertion of a bit is obtained by computing modulus operation of the position of the image byte within the mask and an integer s whose value lies between 1 and 8. A message digest MD-5 has also been generated from authentication message/image and inserted into the source image in same manner to impart additional security. Experimental results show a good fidelity in embedded image when the value of s is less than equal to 6. Results are compared with the most popular steganographic algorithm S-Tools in terms of histogram, noise and, standard deviation analysis where proposed MDHIAT shows better performance in compared to S-Tools.


international conference on emerging applications of information technology | 2011

A Modified Weighted Based Filter for Removal of Random Impulse Noise (MWB)

J. K. Mandal; Aparna Sarkar

In this paper an effort has been made to device an algorithm for highly corrupted images. In this paper a novel Modified Weighted Based(MWB) filter has been proposed, which is based on the weighted differences between the current pixel and its neighbors aligned with four main directions. Simulations showed that the MWB filter provides optimal performances of suppressing impulse with high noise level which may enhance the performance in terms of removal of random-valued impulse noise compared to the directional weighted median (DWM) filter [1] along with other filters like signal-dependent rank order mean (SDROM)filter[6], multistate median (MSM) filter[2], adaptive center weighted median (ACWM) filter[8], pixel-wise MAD(PWMAD) filter[7] etc.


international conference on recent trends in information technology | 2011

An adaptive neural network guided secret key based encryption through recursive positional modulo-2 substitution for online wireless communication (ANNRPMS)

J. K. Mandal; Arindam Sarkar

In this paper, a neural network guided secret key based technique for encryption (ANNRPMS) has been proposed using recursive positional modulo-2 substitution for online transmission of data/information through wireless communication. In this approach both the communicating networks receive an indistinguishable input vector, produce an output bit and are trained based on the output bit. The dynamics of the two networks and their weight vectors are found to a novel experience, where the demonstrate networks synchronize to an identical time dependent weight vectors. This observable fact has been used to form a secured variable length secret-key using a public channel. The length of the key depends on the number of input and output neurons. The original plain text is encrypted using recursive positional modulo-2 substitution technique. The secret key also fabricated through encryption process in a cascaded manner. This intermediate cipher text is again encrypted to form the final cipher text through chaining and cascaded xoring of identical weight vector with the identical length intermediate cipher text block. If size of the last block of intermediate cipher text is less than the size of the key then this block is kept unchanged. Receiver will use identical weight vector for performing deciphering process for getting the recursive positional modulo-2 substitution encrypted cipher text and secret key for decoding. A session key based transmission has also been proposed using 161-bit key format of 14 different segments [7,8]. Parametric tests are done and results are compared in terms of Chi-Square test, response time in transmission with some existing classical techniques, which shows comparable results for the proposed system.


International Journal of Distributed and Parallel systems | 2012

OBJECT ORIENTED MODELLING OF IDEA USING GA BASED EFFICIENT KEY GENERATION FOR E-GOVERNANCE SECURITY (OOMIG)

Arindam Sarkar; Sunil Karforma; J. K. Mandal

Nowadays different state and central government in India as well as abroad are taking initiative to deliver different kind of services electronically specially using Information and Communication Technology (ICT). Intruders or hackers can steal or modify the information communicated between Government and consumer through internet. To implement privacy and confidentiality of the information we must use suitable encryption technique. In this paper an Object Oriented Modelling of International Data Encryption Algorithm (IDEA) using GA based efficient key generation technique has been proposed to incorporate privacy and confidentiality of information which would be communicated between government and consumer.


2011 International Conference on Recent Trends in Information Systems | 2011

An adaptive genetic key based neural encryption for online wireless communication (AGKNE)

J. K. Mandal; Arindam Sarkar

In this paper, a genetic secret key based technique for neural encryption (AGKNE) has been proposed for online transmission of data/information in wireless communication. In this method both the communicating party receive the similar input vector, generate an output bit and are trained based on the output bit. Length of the key depends on the number of input and output neurons. Synchronized identical weight vectors are used to create chromosomes pool. Genetic secret key is generated on calculating the fitness function, which is the hamming distance between two chromosomes. GA operators like crossover and mutation are also used to add elitism of chromosomes. Plain stream passes through recursive modulo 2-substitution operation to generate intermediate cipher which is again encrypted using neuro genetic key to form the 2nd level cipher stream. Finally, chaining and cascaded xoring of neural key with the identical length intermediate cipher text is done to generate the cipher. Receiver will use identical neural weight secret key for performing deciphering process for generating the neuro genetic encrypted cipher text and secret key for decoding. Finally modulo-2 secret key uses to generate plain text. A session key based transmission has also been proposed using 161-bit key format of 14 different segments [7]. Parametric tests are done and results are compared in terms of Chi-Square test, response time in transmission with some existing classical techniques, which shows comparable results for the proposed system.

Collaboration


Dive into the J. K. Mandal's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Arindam Sarkar

Kalyani Government Engineering College

View shared research outputs
Top Co-Authors

Avatar

Madhumita Sengupta

Kalyani Government Engineering College

View shared research outputs
Top Co-Authors

Avatar

Somnath Mukhopadhyay

Kalyani Government Engineering College

View shared research outputs
Top Co-Authors

Avatar

Nabin Ghoshal

Kalyani Government Engineering College

View shared research outputs
Top Co-Authors

Avatar

Suresh Chandra Satapathy

Anil Neerukonda Institute of Technology and Sciences

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Anirban Chakraborty

Barrackpore Rastraguru Surendranath College

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Indrajit Bhattacharya

Kalyani Government Engineering College

View shared research outputs
Researchain Logo
Decentralizing Knowledge