Blockchain Technology for Emerging Applications: A Comprehensive Approach
Editors: SK Hafizul Islam, Arup Kumar Pal, Debabrata Samanta, Siddhartha Bhattacharyya
Publisher: Academic Press
ISBN: 978-0-323-90193-2
Proceedings of 4th International Conference on Recent Advances in Information Technology (RAIT)
Editors: Sachin Tripathy, Arup Kumar Pal
Publisher: IEEE
ISBN: 978-1-5386-3039-6
4th ISEA International Conference on Security and Privacy (ISEA-ISAP2021)
Editors: Sachin Tripathy, Arup Kumar Pal, Dharavath Ramesh
Publisher: IEEE
J. Pradhan, A. K. Pal, and H. Banka, “A CBIR system based on saliency driven local image features and multi orientation texture features,” Journal of Visual Communication and Image Representation, vol. 83, p. 103396, Feb. 2022, doi: 10.1016/j.jvcir.2021.103396.
P. Soni, A. K. Pal, S. H. Islam, A. Singh, and P. Kumar, “Provably secure and biometric-based secure access of e-Governance services using mobile devices,” Journal of Information Security and Applications, vol. 63, p. 103016, Dec. 2021, doi: 10.1016/j.jisa.2021.103016.
V. Rathore and A. K. Pal, “An image encryption scheme in bit plane content using Henon map based generated edge map,” Multimed Tools Appl, vol. 80, no. 14, pp. 22275–22300, Jun. 2021, doi: 10.1007/s11042-021-10719-0.
J. Pradhan, A. K. Pal, H. Banka, and P. Dansena, “Fusion of region based extracted features for instance- and class-based CBIR applications,” Applied Soft Computing, vol. 102, p. 107063, Apr. 2021, doi: 10.1016/j.asoc.2020.107063.
P. Mishra, C. Bhaya, A. K. Pal, and A. K. Singh, “A novel binary operator for designing medical and natural image cryptosystems,” Signal Processing: Image Communication, vol. 98, p. 116377, Oct. 2021, doi: 10.1016/j.image.2021.116377.
P. Mishra, C. Bhaya, A. K. Pal, and A. K. Singh, “A medical image cryptosystem using bit-level diffusion with DNA coding,” J Ambient Intell Human Comput, Aug. 2021, doi: 10.1007/s12652-021-03410-7.
M. Majhi, A. K. Pal, J. Pradhan, S. H. Islam, and M. K. Khan, “Computational intelligence based secure three-party CBIR scheme for medical data for cloud-assisted healthcare applications,” Multimed Tools Appl, Feb. 2021, doi: 10.1007/s11042-020-10483-7.
M. Majhi, A. K. Pal, S. H. Islam, and M. Khurram Khan, “Secure content-based image retrieval using modified Euclidean distance for encrypted features,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 2, p. e4013, 2021, doi: 10.1002/ett.4013.
M. Majhi and A. K. Pal, “An image retrieval scheme based on block level hybrid dct-svd fused features,” Multimed Tools Appl, vol. 80, no. 5, pp. 7271–7312, Feb. 2021, doi: 10.1007/s11042-020-10005-5.
S. Kumar, J. Pradhan, A. K. Pal, S. H. Islam, and M. K. Khan, “Radiological image retrieval technique using multi-resolution texture and shape features,” Multimed Tools Appl, Feb. 2021, doi: 10.1007/s11042-021-10525-8.
S. Kumar, J. Pradhan, and A. K. Pal, “Adaptive tetrolet based color, texture and shape feature extraction for content based image retrieval application,” Multimed Tools Appl, vol. 80, no. 19, pp. 29017–29049, Aug. 2021, doi: 10.1007/s11042-021-10835-x.
S. Kumar, A. K. Pal, S. H. Islam, and M. Hammoudeh, “Secure and efficient image retrieval through invariant features selection in insecure cloud environments,” Neural Comput & Applic, Jun. 2021, doi: 10.1007/s00521-021-06054-y.
K. Chowdhury, D. Chaudhuri, and A. K. Pal, “An entropy-based initialization method of K-means clustering on the optimal number of clusters,” Neural Comput & Applic, vol. 33, no. 12, pp. 6965–6982, Jun. 2021, doi: 10.1007/s00521-020-05471-9.
N. Varish et al., “Image Retrieval Scheme Using Quantized Bins of Color Image Components and Adaptive Tetrolet Transform,” IEEE Access, vol. 8, pp. 117639–117665, 2020, doi: 10.1109/ACCESS.2020.3003911.
S. Prasad and A. K. Pal, “Stego-key-based image steganography scheme using edge detector and modulus function,” IJCVR, vol. 10, no. 3, p. 223, 2020, doi: 10.1504/IJCVR.2020.107245.
S. Prasad and A. K. Pal, “Stego-key-based image steganography scheme using edge detector and modulus function,” International Journal of Computational Vision and Robotics, vol. 10, no. 3, pp. 223–241, Jan. 2020, doi: 10.1504/IJCVR.2020.107245.
S. Prasad and A. K. Pal, “Hamming code and logistic-map based pixel-level active forgery detection scheme using fragile watermarking,” Multimed Tools Appl, vol. 79, no. 29, pp. 20897–20928, Aug. 2020, doi: 10.1007/s11042-020-08715-x.
S. Prasad and A. K. Pal, “A tamper detection suitable fragile watermarking scheme based on novel payload embedding strategy,” Multimed Tools Appl, vol. 79, no. 3, pp. 1673–1705, Jan. 2020, doi: 10.1007/s11042-019-08144-5.
S. Prasad and A. K. Pal, “A Secure Fragile Watermarking Scheme for Protecting Integrity of Digital Images,” Iran J Sci Technol Trans Electr Eng, vol. 44, no. 2, pp. 703–727, Jun. 2020, doi: 10.1007/s40998-019-00275-7.
J. Pradhan, S. Kumar, A. K. Pal, and H. Banka, “Texture and colour region separation based image retrieval using probability annular histogram and weighted similarity matching scheme,” IET Image Processing, vol. 14, no. 7, pp. 1303–1315, 2020, doi: 10.1049/iet-ipr.2018.6619.
J. Pradhan, A. Ajad, A. K. Pal, and H. Banka, “Multi-level colored directional motif histograms for content-based image retrieval,” Vis Comput, vol. 36, no. 9, pp. 1847–1868, Sep. 2020, doi: 10.1007/s00371-019-01773-9.
P. Mishra, C. Bhaya, A. K. Pal, and A. K. Singh, “Compressed DNA Coding Using Minimum Variance Huffman Tree,” IEEE Communications Letters, vol. 24, no. 8, pp. 1602–1606, Aug. 2020, doi: 10.1109/LCOMM.2020.2991461.
P. Soni, A. K. Pal, and S. H. Islam, “An improved three-factor authentication scheme for patient monitoring using WSN in remote health-care system,” Computer Methods and Programs in Biomedicine, vol. 182, p. 105054, Dec. 2019, doi: 10.1016/j.cmpb.2019.105054.
S. Roy and A. K. Pal, “A Hybrid Domain Color Image Watermarking Based on DWT–SVD,” Iran J Sci Technol Trans Electr Eng, vol. 43, no. 2, pp. 201–217, Jun. 2019, doi: 10.1007/s40998-018-0109-x.
J. Pradhan, A. K. Pal, and H. Banka, “Principal texture direction based block level image reordering and use of color edge features for application of object based image retrieval,” Multimed Tools Appl, vol. 78, no. 2, pp. 1685–1717, Jan. 2019, doi: 10.1007/s11042-018-6246-4.
A. K. Pal, K. Naik, and R. Agrawal, “A steganography scheme on JPEG compressed cover image with high embedding capacity,” Int. Arab J. Inf. Technol., vol. 16, pp. 116–124, 2019.
K. Chowdhury, D. Chaudhuri, A. K. Pal, and A. Samal, “Seed selection algorithm through K-means on optimal number of clusters,” Multimed Tools Appl, vol. 78, no. 13, pp. 18617–18651, Jul. 2019, doi: 10.1007/s11042-018-7100-4.
N. Varish and A. K. Pal, “A novel image retrieval scheme using gray level co-occurrence matrix descriptors of discrete cosine transform based residual image,” Appl Intell, vol. 48, no. 9, pp. 2930–2953, Sep. 2018, doi: 10.1007/s10489-017-1125-7.
S. Roy and A. K. Pal, “An SVD Based Location Specific Robust Color Image Watermarking Scheme Using RDWT and Arnold Scrambling,” Wireless Pers Commun, vol. 98, no. 2, pp. 2223–2250, Jan. 2018, doi: 10.1007/s11277-017-4971-z.
S. Roy and A. K. Pal, “A robust reversible image watermarking scheme in DCT domain using Arnold scrambling and histogram modification,” International Journal of Information and Computer Security, vol. 10, no. 2–3, pp. 216–236, Jan. 2018, doi: 10.1504/IJICS.2018.091469.
J. Pradhan, S. Kumar, A. K. Pal, and H. Banka, “A hierarchical CBIR framework using adaptive tetrolet transform and novel histograms from color and shape features,” Digital Signal Processing, vol. 82, pp. 258–281, Nov. 2018, doi: 10.1016/j.dsp.2018.07.016.
A. K. Pal and S. Roy, “A robust and blind image watermarking scheme in DCT domain,” International Journal of Information and Computer Security, vol. 10, no. 4, pp. 321–340, Jan. 2018, doi: 10.1504/IJICS.2018.095296.
K. Naik, S. Trivedy, and A. K. Pal, “An IWT based blind and robust image watermarking scheme using secret key matrix,” Multimed Tools Appl, vol. 77, no. 11, pp. 13721–13752, Jun. 2018, doi: 10.1007/s11042-017-4986-1.
K. Naik, A. K. Pal, and R. Agrawal, “Selective image encryption using singular value decomposition and arnold transform,” Int. Arab J. Inf. Technol., vol. 15, pp. 739–747, 2018.
K. Naik and A. K. Pal, “A cryptosystem for lossless/lossy grayscale images in IWT domain using chaotic map-based generated key matrices,” Int. J. Wavelets Multiresolut Inf. Process., vol. 16, no. 04, p. 1850024, Jul. 2018, doi: 10.1142/S0219691318500248.
K. Chowdhury, D. Chaudhuri, and A. K. Pal, “A new image segmentation technique using bi-entropy function minimization,” Multimed Tools Appl, vol. 77, no. 16, pp. 20889–20915, Aug. 2018, doi: 10.1007/s11042-017-5429-8.
R. Ali, A. K. Pal, S. Kumari, A. K. Sangaiah, X. Li, and F. Wu, “An enhanced three factor based authentication protocol using wireless medical sensor networks for healthcare monitoring,” J Ambient Intell Human Comput, Sep. 2018, doi: 10.1007/s12652-018-1015-9.
R. Ali, A. K. Pal, S. Kumari, M. Karuppiah, and M. Conti, “A secure user authentication and key-agreement scheme using wireless sensor networks for agriculture monitoring,” Future Generation Computer Systems, vol. 84, pp. 200–215, Jul. 2018, doi: 10.1016/j.future.2017.06.018.
R. Ali and A. K. Pal, “Cryptanalysis and Biometric-Based Enhancement of a Remote User Authentication Scheme for E-Healthcare System,” Arab J Sci Eng, vol. 43, no. 12, pp. 7837–7852, Dec. 2018, doi: 10.1007/s13369-018-3220-4.
R. Ali and A. K. Pal, “An efficient three factor–based authentication scheme in multiserver environment using ECC,” International Journal of Communication Systems, vol. 31, no. 4, p. e3484, 2018, doi: 10.1002/dac.3484.
N. Varish, J. Pradhan, and A. K. Pal, “Image retrieval based on non-uniform bins of color histogram and dual tree complex wavelet transform,” Multimed Tools Appl, vol. 76, no. 14, pp. 15885–15921, Jul. 2017, doi: 10.1007/s11042-016-3882-4.
N. Varish, S. Kumar, and A. K. Pal, “A Novel Similarity Measure for Content Based Image Retrieval in Discrete Cosine Transform Domain,” Fundamenta Informaticae, vol. 156, no. 2, pp. 209–235, Jan. 2017, doi: 10.3233/FI-2017-1605.
S. Trivedy and A. K. Pal, “A Logistic Map-Based Fragile Watermarking Scheme of Digital Images with Tamper Detection,” Iran J Sci Technol Trans Electr Eng, vol. 41, no. 2, pp. 103–113, Jun. 2017, doi: 10.1007/s40998-017-0021-9.
S. Roy and A. K. Pal, “An indirect watermark hiding in discrete cosine transform–singular value decomposition domain for copyright protection,” Royal Society Open Science, vol. 4, no. 6, p. 170326, Jun. 2017, doi: 10.1098/rsos.170326.
S. Roy and A. K. Pal, “A robust blind hybrid image watermarking scheme in RDWT-DCT domain using Arnold scrambling,” Multimed Tools Appl, vol. 76, no. 3, pp. 3577–3616, Feb. 2017, doi: 10.1007/s11042-016-3902-4.
S. Roy and A. K. Pal, “A blind DCT based color watermarking algorithm for embedding multiple watermarks,” AEU - International Journal of Electronics and Communications, vol. 72, pp. 149–161, Feb. 2017, doi: 10.1016/j.aeue.2016.12.003.
S. Prasad and A. K. Pal, “An RGB colour image steganography scheme using overlapping block-based pixel-value differencing,” Royal Society Open Science, vol. 4, no. 4, p. 161066, Apr. 2017, doi: 10.1098/rsos.161066.
R. Ali and A. K. Pal, “Three-Factor-Based Confidentiality-Preserving Remote User Authentication Scheme in Multi-server Environment,” Arab J Sci Eng, vol. 42, no. 8, pp. 3655–3672, Aug. 2017, doi: 10.1007/s13369-017-2665-1.
R. Ali and A. K. Pal, “A Secure and Robust Three-Factor Based Authentication Scheme Using RSA Cryptosystem,” International Journal of Business Data Communications and Networking (IJBDCN), vol. 13, no. 1, pp. 74–84, 2017, doi: 10.4018/IJBDCN.2017010107.
N. Varish and A. K. Pal, “Content-based image retrieval using SVD-based Eigen images,” International Journal of Image Mining, vol. 2, no. 1, pp. 68–83, Jan. 2016, doi: 10.1504/IJIM.2016.079117.
R. Sharma, N. K. Agrawal, A. Khare, and A. K. Pal, “An Improved Size Invariant (n, n) Extended Visual Cryptography Scheme,” International Journal of Business Data Communications and Networking (IJBDCN), vol. 12, no. 2, pp. 80–88, 2016, doi: 10.4018/IJBDCN.2016070105.
K. Naik and A. K. Pal, “Design of a cryptosystem for DCT compressed image using Arnold transform and fractional Fourier transform,” International Journal of Computational Vision and Robotics, vol. 5, no. 3, pp. 335–346, Jan. 2015, doi: 10.1504/IJCVR.2015.071337.
A. Sheikh, J. Pradhan, A. Dhuriya, and A. K. Pal, “Medical Image Fusion Using Deep Learning,” in Deep Learning for Biomedical Data Analysis: Techniques, Approaches, and Applications, M. Elloumi, Ed. Cham: Springer International Publishing, 2021, pp. 129–152. doi: 10.1007/978-3-030-71676-9_6.
J. Pradhan, A. K. Pal, and H. Banka, “Medical Image Retrieval System Using Deep Learning Techniques,” in Deep Learning for Biomedical Data Analysis: Techniques, Approaches, and Applications, M. Elloumi, Ed. Cham: Springer International Publishing, 2021, pp. 101–128. doi: 10.1007/978-3-030-71676-9_5.
S. H. Islam, A. K. Pal, S. Prasad, S. Roy, R. Rungta, and S. Verma, “Digital watermarking algorithms for multimedia data,” Authentication Technologies for Cloud Computing, IoT and Big Data, pp. 107–123, Mar. 2019, doi: 10.1049/PBSE009E_ch5.
C. Bhaya, M. S. Obaidat, A. K. Pal, and S. H. Islam, “Encrypted Medical Image Storage in DNA Domain,” in ICC 2021 - IEEE International Conference on Communications, Jun. 2021, pp. 1–7. doi: 10.1109/ICC42927.2021.9500718.
J. Pradhan, A. Raj, A. Kumar Pal, and H. Banka, “Multi-scale Image Fusion Scheme Based on Gray-Level Edge Maps and Adaptive Weight Maps,” Advances in Intelligent Systems and Computing, vol. 1024, pp. 445–459, 2020, doi: 10.1007/978-981-32-9291-8_35.
J. Pradhan, A. K. Pal, M. S. Obaidat, and S. K. H. Islam, “A Post Dynamic Clustering Approach for Classification-based Image Retrieval,” presented at the Proceedings of the 2020 IEEE International Conference on Communications, Computing, Cybersecurity, and Informatics, CCCI 2020, 2020. doi: 10.1109/CCCI49893.2020.9256646.
K. Chowdhury, D. Chaudhuri, and A. K. Pal, “Optimal Number of Seed Point Selection Algorithm of Unknown Dataset,” Advances in Intelligent Systems and Computing, vol. 1024, pp. 257–269, 2020, doi: 10.1007/978-981-32-9291-8_21.
R. Ali, P. Chandrakar, M. S. Obaidat, K.-F. Hsiao, A. K. Pal, and S. K. Hafizul Islam, “A Secure Authentication Mechanism for Wireless Sensor Networks,” presented at the Proceedings of the 2020 International Conference on Computer, Information and Telecommunication Systems, CITS 2020, 2020. doi: 10.1109/CITS49457.2020.9232633.
P. Soni, A. K. Pal, and K. Khushboo, “A User Convenient Secure Authentication Scheme for Accessing e-Governance Services,” presented at the 2019 10th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2019, 2019. doi: 10.1109/ICCCNT45670.2019.8944393.
S. Prasad and A. K. Pal, “Logistic map-based image steganography scheme using combined LSB and PVD for security enhancement,” Advances in Intelligent Systems and Computing, vol. 814, pp. 203–214, 2019, doi: 10.1007/978-981-13-1501-5_17.
S. Paul and A. K. Pal, “An Efficient Surveillance Video Coding Scheme for Static Camera Based Captured Video Data,” 2019, pp. 868–873. doi: 10.1109/SPIN.2019.8711754.
M. Majhi, J. Pradhan, and A. K. Pal, “An Efficient Content Based Image Retrieval Scheme with Preserving the Security of Images∗,” 2019, pp. 874–879. doi: 10.1109/SPIN.2019.8711651.
A. Raj, J. Pradhan, A. K. Pal, and H. Banka, “Multi-scale image fusion scheme based on non-sub sampled contourlet transform and four neighborhood Shannon entropy scheme,” 2018, pp. 1–6. doi: 10.1109/RAIT.2018.8389036.
V. Rathore, A. Verma, A. Kumar, and A. K. Pal, “A H’enon Map Based Cryptosystem for VQ Based Compressed Video Data,” Social Science Research Network, Rochester, NY, SSRN Scholarly Paper ID 3171519, May 2018. doi: 10.2139/ssrn.3171519.
J. Pradhan, S. Kumar, A. K. Pal, and H. Banka, “Texture and color visual features based CBIR using 2D DT-CWT and histograms,” Communications in Computer and Information Science, vol. 834, pp. 84–96, 2018, doi: 10.1007/978-981-13-0023-3_9.
S. Kumar, J. Pradhan, and A. K. Pal, “A CBIR technique based on the combination of shape and color features,” Advances in Intelligent Systems and Computing, vol. 706, pp. 737–744, 2018, doi: 10.1007/978-981-10-8237-5_71.
S. Kumar, J. Pradhan, and A. K. Pal, “A CBIR Scheme Using GLCM Features in DCT Domain,” presented at the 2017 IEEE International Conference on Computational Intelligence and Computing Research, ICCIC 2017, 2018. doi: 10.1109/ICCIC.2017.8524205.
K. Chowdhury, D. Chaudhuri, and A. K. Pal, “Seed Point Selection Algorithm in Clustering of Image Data,” in Progress in Intelligent Computing Techniques: Theory, Practice, and Applications, Singapore, 2018, pp. 119–126. doi: 10.1007/978-981-10-3376-6_13.
R. Ali and A. K. Pal, “A secure three-factor remote user authentication scheme using elliptic curve cryptosystem,” Lecture Notes in Electrical Engineering, vol. 453, pp. 9–24, 2018, doi: 10.1007/978-981-10-5565-2_2.
P. Soni, R. Ali, and A. K. Pal, “A Two-factor based Remote User Authentication Scheme using ElGamal Cryptosystem,” in Proceedings of the ACM Workshop on Internet of Things (IoT) Security: Issues and Innovations, New York, NY, USA, Jul. 2017, pp. 1–6. doi: 10.1145/3084030.3084031.
N. Varish and A. K. Pal, “A Content Based Image Retrieval using Color and Texture Features,” in Proceedings of the International Conference on Advances in Information Communication Technology & Computing, New York, NY, USA, Aug. 2016, pp. 1–7. doi: 10.1145/2979779.2979787.
J. Pradhan, A. K. Pal, and H. Banka, “A prominent object region detection based approach for CBIR application,” in 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC), Dec. 2016, pp. 447–452. doi: 10.1109/PDGC.2016.7913237.
N. Varish and A. K. Pal, “Content based image retrieval using statistical features of color histogram,” in 2015 3rd International Conference on Signal Processing, Communication and Networking (ICSCN), Mar. 2015, pp. 1–6. doi: 10.1109/ICSCN.2015.7219922.
K. Naik, S. Prasad, and A. K. Pal, “A Steganography Scheme Using SVD Compressed Cover Image,” in Computational Vision and Robotics, New Delhi, 2015, pp. 97–104. doi: 10.1007/978-81-322-2196-8_12.
K. Rahul, R. Agrawal, and A. K. Pal, “Color Image Quantization Scheme Using DBSCAN with K-Means Algorithm,” in Intelligent Computing, Networking, and Informatics, New Delhi, 2014, pp. 1037–1045. doi: 10.1007/978-81-322-1665-0_106.
K. Naik and A. K. Pal, “A Partial Image Cryptosystem Based on Discrete Cosine Transform and Arnold Transform,” in Recent Advances in Information Technology, New Delhi, 2014, pp. 65–73. doi: 10.1007/978-81-322-1856-2_8.
K. Naik and A. K. Pal, “An image cryptosystem based on diffusion of significant bit-planes of a scrambled image with generated binary key matrices,” in 2013 IEEE International Conference on Computational Intelligence and Computing Research, Dec. 2013, pp. 1–4. doi: 10.1109/ICCIC.2013.6724201.
S. Mukherjee and A. K. Pal, “A DCT-SVD based robust watermarking scheme for grayscale image,” in Proceedings of the International Conference on Advances in Computing, Communications and Informatics, New York, NY, USA, Aug. 2012, pp. 573–578. doi: 10.1145/2345396.2345490.
A. K. Pal, G. P. Biswas, and S. Mukhopadhyay, “An Efficient Compression-Encryption Scheme for Batch-Image,” in Technology Systems and Management, Berlin, Heidelberg, 2011, pp. 85–90. doi: 10.1007/978-3-642-20209-4_12.
A. K. Pal, G. P. Biswas, and S. Mukhopadhyay, “Designing of High-Speed Image Cryptosystem Using VQ Generated Codebook and Index Table,” in 2010 International Conference on Recent Trends in Information, Telecommunication and Computing, Mar. 2010, pp. 39–43. doi: 10.1109/ITC.2010.46.
A. K. Pal, G. P. Biswas, and S. Mukhopadhyay, “A hybrid DCT-VQ based approach for efficient compression of color images,” in 2010 International Conference on Computer and Communication Technology (ICCCT), Sep. 2010, pp. 177–181. doi: 10.1109/ICCCT.2010.5640445.