Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Tirtha Sankar Das is active.

Publication


Featured researches published by Tirtha Sankar Das.


international conference on advances in computer engineering | 2010

Coded Fingerprinting Based Watermarking to Resist Collusion Attacks and Trace Colluders

Monjul Saikia; Swanirbhar Majumder; Tirtha Sankar Das; Anwar Hussain; Subir Kumar Sarkar

The alteration, repackaging, and redistribution of multimedia content like image, video, audio, etc. poses a serious threat to both national security and commercial markets. Presently with the growing popularity of digital media the world is becoming smaller and smaller. That is mainly due to the internet connectivity and WWW phenomena. But the copyright protection of intellectual properties has become a necessity for prevention of illegal copying and verification of content integrity. Here wavelet transform plays the role of an efficient and robust tool due to its multi-resolution capability along with singular value decomposition (SVD) for watermarking. Both of these when implemented with coded fingerprinting not only resist collusion attacks but can also help tracing colluders. This work here by focuses implementation of a hybrid watermarking scheme using SVD and wavelet transform along with coded fingerprinting developed for protection of the intellectual property.


international conference on advances in computing, control, and telecommunication technologies | 2009

SVD and Error Control Coding Based Digital Image Watermarking

Swanirbhar Majumder; Tirtha Sankar Das; V. H. Mankar; Subir Kumar Sarkar

Digital media is a craze these days. With the present day internet connectivity the world has become smaller. The copyright protections of intellectual properties have become a necessity for prevention of illegal copying and content integrity verification. Newer data hiding techniques that satisfy the requirements of imperceptibility, robustness, capacity, or data hiding rate and security of the hidden data etc. are being developed. Therefore the preference to go for digital image watermarking, to show resiliency against various unintentional or deliberate attacks has increased. Watermarking is a method of data authentication by embedding a watermark in image characteristics with expectation. Here in this work, this is done using a mathematical tool called the singular value decomposition (SVD). Earlier SVD had been used individually, as a tool for watermarking of digital media, but this work incorporates error control coding to it, by a novel zig-zag scan operation on pixels done before coding, thereby increasing the robustness. This work here by focuses on using both of them together to provide a robust technique developed for protection of the intellectual property against the popular malicious attacks. The algorithm is later applied and tested on the standard checkmark techniques practically by attacking the watermarked image against standard simulated attacks and recovering the watermarked logo from it.


international conference on recent trends in information technology | 2011

DWT and SVD based image watermarking scheme using noise visibility and contrast sensitivity

Swanirbhar Majumder; Tirtha Sankar Das; Subir Kumar Sarkar

This paper presents a robust and imperceptible methodology of watermark embedding in the transform domain using Discrete Wavelet Transform (DWT). The robustness is brought about by hiding the watermark in the Eigen values after computing the Singular Value Decomposition (SVD) on low frequency sub-band after DWT. While for the imperceptibility the Contrast Sensitivity Function (CSF) has been employed here along with the Noise Visibility Function (NVF). Human beings are sensitive to visual contrasts so CSF is used to take care of that while NVF characterizes the local image properties of texture, edge and smoothness to determine the optimal watermark locations and strength at the wavelet sub-bands for watermark embedding. The algorithm has been tested on 16 metrics out of which 10 are for imperceptibility and 6 for robustness for some popular attacks and the result has been found encouraging.


ieee india conference | 2010

FPGA prototype of visual information hiding

Abhishek Basu; Tirtha Sankar Das; Subir Kumar Sarkar; Abhik Roy; Nurul Islam

The current explosion of digital media creates threats towards the security in multimedia data broadcasting. Watermarking technique becomes a prospective solution to this coercion by means of Intellectual Property Right Protection, Authentication and Integrity Verification of digital media. In this paper we introduce an approach that enables us to develop a low power, real time, reliable and secure data hiding system. As an effort towards the power efficient system, here we present an oblivious, spatial domain watermarking based authentication algorithm and its FPGA implementation. The low cost data embedding algorithm can hide watermark into original cover image coming from a sensor much faster than software implementation and the embedded image is easily transmitted to PC by using appropriate interface.


international conference on computer and communication technology | 2011

Hybrid image watermarking scheme using SVD and PDFB based contourlet transform

Swanirbhar Majumder; Monjul Saikia; Tirtha Sankar Das; Subir Kumar Sarkar

Copyright protection of intellectual property is a very large and growing business. This is due to the easier availability of all multimedia data with just a click of a mouse, resulting to the increase of piracy. Watermarking is one of the popular methods of authentication to help protect intellectual property rights. Of the various forms of multimedia data image is one of the most popular variant. Here a method of digital image watermarking is presented using singular value decomposition (SVD) which one of the very popular mathematical computation tools. Along with it a lot of transforms have been used earlier like discrete wavelet transform (DWT), DCT, Fourier transform, etc. to provide hybrid techniques. But here an unconventional transform introduced in the middle of this decade, called contourlet transform (CT) has been used. This transform being similar to DWT fits well to provide a robust watermarking scheme along with the SVD. Here the combination of pyramidal and directional filter bank (PDFB) in CT has been used.


ieee international conference on image information processing | 2011

On the implementation of a information hiding design based on saliency map

Abhishek Basu; Tirtha Sankar Das; Subir Kumar Sarkar; Swanirbhar Majumder

In this paper, an adaptive spatial domain image watermarking scheme is proposed which embeds watermark information to the uneven bit depth salient image pixels. Watermarked image thus produced has better visual transparency with respect to human visual system (HVS) with high payload capacity. In proposed scheme, salient pixels are determined using the bottom-up Graph-Based Visual Saliency (GBVS) model. Experimental results reveal that proposed scheme has less perceptual error as well as improved robustness than existing spatial domain embedding scheme.


International journal of imaging and robotics | 2011

Robust Visual Information Hiding Framework Based on HVS Pixel Adaptive LSB Replacement (HPALR) Technique

Abhishek Basu; Tirtha Sankar Das; Subir Kumar Sarkar


Archive | 2007

Spread Spectrum based M-ary Modulated Robust Image Watermarking

Tirtha Sankar Das; V. H. Mankar; Subir Kumar Sarkar


international conference on computers and devices for communication | 2009

FPGA based implementation of robust spatial domain image watermarking algorithm

Abhishek Basu; Tirtha Sankar Das; Somnath Maiti; Nurul Islam; Subir Kumar Sarkar


Archive | 2011

FPGA IMPLEMENTATION OF IP PROTECTION THROUGH VISUAL INFORMATION HIDING

Abhishek Basu; Debapriya Basu Roy; Deep Banerjee; Archan Sengupta; Aniket Saha; Tirtha Sankar Das

Collaboration


Dive into the Tirtha Sankar Das's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Abhishek Basu

RCC Institute of Information Technology

View shared research outputs
Top Co-Authors

Avatar

Swanirbhar Majumder

North Eastern Regional Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Monjul Saikia

North Eastern Regional Institute of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Nurul Islam

Ramakrishna Mission Residential College

View shared research outputs
Top Co-Authors

Avatar

Anwar Hussain

North Eastern Regional Institute of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge