Suvamoy Changder
National Institute of Technology, Durgapur
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Suvamoy Changder.
advances in recent technologies in communication and computing | 2009
Suvamoy Changder; Narayan C. Debnath; D. Ghosh
Steganography is the means of storing information inside another message in such a way that hides informations existence. A number of steganography algorithms have been introduced using text, image, audio, video files as the cover media. Among these, text documents have been widely used for a very long time. This paper presents a new approach for steganography in Hindi texts. Considering the structure of Hindi alphabet/words, in this approach, by shifting the specific matra towards left or right, we hide the secret message in the text. This approach can be categorized under feature coding methods. The approach shows good result on the sample collected from different Hindi newspaper.
international conference on computer technology and development | 2010
Suvamoy Changder; D. Ghosh; Narayan C. Debnath
Steganography is the art and science of hiding a message inside another message without drawing any suspicion to the others so that the message can only be detected by its intended recipient. With the other Steganography methods such as Image, Audio, Video, a number of text Steganography algorithms have been introduced. This paper presents a new linguistic approach for Steganography through Indian Languages by considering the flexible grammar structure of Indian Languages. To add more security to the system, instead of hiding the original message it is converted to an irrelevant binary stream by comparing the message bits with the pixel values of an Image. Thereafter, the bits of this binary stream are encoded to some part-of-speech and by creating meaningful sentences starting with a suitable word belonging to the mapped part-of-speech, the proposed method hides the message inside a cover file containing some innocuous sentences. Similarly in receiving side, the algorithm finds the corresponding part-of-speech of the starting word of each sentence and place the bit stream of the mapped part-of-speech to recover the converted message. After comparing these bits with the Image pixels, the algorithm extracted the original message from the cover file. The proposed method exhibits satisfactory result on some Indian Languages like Bengali.
international conference on industrial technology | 2013
Amit Kr Mandal; Suvamoy Changder; Anirban Sarkar; Narayan C. Debnath
Software as a service or (SaaS) is a new software development and deployment paradigm over the cloud. It offers Information Technology services dynamically as “on-demand” basis over the internet. The related application data are stored in the large data centers managed by the Cloud Service Providers. Therefore the user need not to bother about the data storage or data management techniques and they can be able to access their applications from anywhere on the globe via a standard web browser. Many enterprises are facing a major research challenge due to the unavailability of generic cloud architecture for designing, developing and deploying of cloud services. In this paper flexible cloud architecture has been proposed, specifically for data centric applications which are suitable for heterogeneous types of applications. This paper also has aimed to establish the future research agendas related to design and management of data centric applications over the cloud infrastructure.
ACM Sigsoft Software Engineering Notes | 2013
Faisal Ahmad; Suvamoy Changder; Anirban Sarkar
Web services describe a standardized way of integrating Web-based applications. In recent days, with the advancement of cloud computing, web services play pivoting roles towards meeting complex business objectives on a large scale. However, engineering dynamic web services is a complex task as they can be added, modified and deleted on the fly and even without any prior notification. Executing a large scale business process using dynamic web services is very challenging. This paper proposes an execution machine, called Web Service Dynamic Execution Machine (WSDE machine), which works in the execution layer of the three layered architecture for web service dynamics [23]. The proposed machine is capable of executing business processes having both deterministic and non-deterministic flows, where the related web services are represented using a graph-based semantic based formal model. The generic nature of the WSDE machine is useful in improving performance, scalability and maintainability of large scale web service based information systems. In this paper, the proposed WSDE machine is also illustrated with a suitable case study.
international conference on information technology: new generations | 2011
Suvamoy Changder; Narayan C. Debnath; D. Ghosh
Steganography is the art and science of covered or hidden writing. The purpose of steganography is covert communication to hide the existence of a message from an intermediary. Digital Steganography algorithms have been developed by using texts, images and audio etc as the cover media. This paper presents a new approach on text steganography through Indian Languages. Considering the properties of a sentence such as number of words, number of characters, number of vowels etc and using the presence of redundant feature code able characters in Indian Languages, this approach hides the message into an innocent cover file containing Indian texts. This approach also presents the extraction of message from the generated cover file by applying the reverse method of hiding. The approach shows satisfactory results on applying to some topic of daily newspaper in Indian Languages like Bengali.
ieee international conference on image information processing | 2013
Shabnam Samima; Ratnakirti Roy; Suvamoy Changder
Steganography is the science of hiding crucial information in someinnocuous objects such that the mere existence of the hidden information is unidentifiable in human sight. Various unique methodologies have been implemented over time to hide information using steganography. In most of the methodologies the exact secret information is hidden inside the cover image in a way that it is completely unrecognizable. Thus, if the embedding mechanism is compromised, there is no way that the hidden message can remain unexposed. Security of the secret information can be enhanced if the actual secret message is not embedded in the cover image at all. In this paper a novel approach to image steganography through image realization has been proposed in which, rather than sending the actual secret information some mapping information of the secret information is embedded in the stego image. The actual realization of the secret information is secured using a multi layered secure pass key.
international conference on computer science and information technology | 2010
Suvamoy Changder; D. Ghosh; Narayan C. Debnath
Steganography is the method to hide a message inside another message without drawing any suspicion to the others and that the message can only be detected by its intended recipient. With the other steganography methods such as Image, Audio, Video, a number of text steganography algorithms have been introduced. This paper presents some new approaches for steganography in Indian Languages. Considering the availability of more characters and flexible grammar structure of Indian Languages this approach hide the secret message in the text by creating meaningful sentences after finding the longest common subsequence of two binary string among which one is the secret message and another may be any binary string. The collection of these created Indian sentences will be used as the cover media for this steganography method. Similarly by applying the reverse method to the cover file that is after finding the longest common subsequence of sentences from the cover file and replacing the matched character by the bits of another binary string the system extract the original message from the cover file.
international conference on computer communication and informatics | 2014
Piyush Kumar Gupta; Ratnakirti Roy; Suvamoy Changder
Steganography is a process to hide secret data into a cover media in an imperceptible manner. In the spatial domain of image steganography, the most common technique is Least Significant Bit Replacement (LSBR). However, LSBR is extremely sensitive to compression attacks involving truncation of LSBs. As a possible solution to the drawback of the traditional LSBR scheme, this paper proposes an image steganography technique that embeds secret data in the moderately higher significant bits such as 4th or 5th bit of a pixel. The proposed method uses a color image as a cover and according to pixel values; three groups of pixels are maintained. These groups are used for selecting the candidate pixels for 4th or 5th bit embedding. It also implements an optimal pixel adjustment process (OPAP) to minimize the visual distortion due to embedding. In addition to the OPAP, a method for randomly dispersing the secret data bits is also implemented making it harder for an adversary to detect hidden information. The experimental results for proposed method showed high values for Peak Signal to Noise Ratio (PSNR) signifying High stego-image fidelity.
Archive | 2014
Tauheed Ahmed; Ratnakirti Roy; Suvamoy Changder
Digital Watermarking is an information hiding technique in which an identifying piece of information is embedded into a cover work so as to identify the ownership of some important information or document. It is widely used for enforcing copyright infringement protection for various types of digital data including images. In images, various watermarking techniques have been proposed over time. The watermarking techniques are often susceptible to geometric attacks such as rotation and cropping. This paper proposes an image watermarking scheme which uses the geometric properties of an image to ensure invariance of the watermark to rotation and cropping. It also incorporates a checksum based mechanism for tracking any distortion effect in the cover work. Efforts have been given to ensure that the proposed algorithm conforms to high Robustness and Fidelity which are the primary quality requirements for any Digital Watermarking system.
international conference on signal processing | 2015
Sabyasachi Kamila; Ratnakirti Roy; Suvamoy Changder
Steganography is a branch of information hiding. It hides the existence of a secret message by embedding it in a cover media. In this paper, a new method for color image steganography is proposed in frequency domain where Discrete Wavelet Transform (DWT) of the cover image is used to differentiate high frequency and low frequency information of each pixel of the image. Proposed method hides secret bits in three higher frequency components making sure that the embedding impact on the cover image is minimum and not centralized in sensitivity domain. Experimental results reveal a good visual quality of the stego image with desirable steganalysis resisting characteristics.