Ghoshal N., Mandal, J. K. et al., “Masking based Data Hiding and Image Authentication Technique (MDHIAT)”, Proceedings of 16th International Conference of IEEE on Advanced Computing and Communications ADCOM-2008, ISBN: 978-1-4244-2962-2, Anna University, Chennai, India, pp. 119-122, December 14-17th, 2008.
Ghoshal N., Mandal, J. K. et al., “Image Authentication by Hiding Large Volume of Data and Secure Message Transmission Technique using Mask (IAHLVDSMTTM)”, Proceedings of IEEE International Advanced Computing Conference IACC’09, ISBN: 978-1-4244-2928-8, Thapar University, Patiala, India, pp. 3177-3182, March 6-7th, 2009.
Ghoshal N., Mandal, J. K. et al., “A Framework for Block based Image Authentication (FBIA)”, Proceedings of 4th IEEE International Conference on Industrial and Information Systems, ICIIS09, ISBN: 978-1-4244-4837-1, Peradeniya University, Sri Lanka, pp. 343-348, December 28th -31st, 2009.
Ghoshal N., Mandal, J. K. “Discrete Fourier transform based Multimedia Color Image Authentication for Wireless Communication (DFTMCIAWC)”,2nd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology, ISBN: 978-1-4577-0787-2/11, Le Royal Meridian Chennai, India, 28th Feb.- 3rd March, 2011.
Ghoshal N., Mandal, J. K., “Controlled Data Hiding Technique for Color Image Authentication in Frequency Domain (CDHTCIAFD)”, 2nd International Conference on Emerging Applications of Information Technology, EAIT-2011, ISBN: 978-1-4244-9683-9, CSI Kolkata Chapter at Science City, Kolkata, India, February 19-20th, pp. 284-287, 2011.
Ghoshal N., Mandal, J. K., “A Steganographic Scheme for Colour Image Authentication (SSCIA)”, International Conference on Recent Trends in Information Technology, ICRTIT-2011, ISBN: 978-1-4577-0590-8/11, Madras Institute of Technology, Anna University, Chennai, India, June 03-05, pp. 826-831, 2011.
Ghoshal N. et al., “A Graph Theoretic Approach to Minimize Total Wire Length in Channel Routing”, Proceedings of 18th IEEE Region 10 International Conference on convergent Technologies for the Asia-Pacific (IEEE TENCON 2003), ISBN: 0-7803-8162-9, Bangalore, India, Vol.1, pp. 414-418, Oct. 14-17, 2003.
Ghoshal N., Chowdhury S., Mandal J. K., “A Steganographic Scheme for Colour Image Authentication using Z-transform (SSCIAZ)”, Springer International Conference on Information system design and Intelligent Applications, INDIA-2012, Print ISBN: 978-3-642-27442-8, On Line ISBN: 978-3-642-27443-5, Vol. 132, CSI, Visakhapatnam Chapter in association with Visakhapatnam Steel Plant, January 05-07, pp. 209-216, 2012.
Ghoshal N., Chowdhury S., Mandal J. K., “Z Transform based Digital Image Authentication using quantization Index Modulation (Z-DIAQIM)”, Springer International Conference on Communications Security & Information Assurance, CSIA- 2012, Print ISBN: 978-3-642-30110-0, On Line ISBN: 978-3-642-30111-7, Vol. 167, Delhi, May 25th – 27th, pp. 745-752, 2012.
Ghoshal N., Goswami A., Pal D., Mandal J. K., “Image Authentication Technique based on DCT(IATDCT)”, Springer International Conference on Communications Security & Information Assurance, CSIA- 2012,Print ISBN: 978-3-642-30110-0, On Line ISBN: 978-3-642-30111-7, Vol. 167,Delhi, May 25th – 27th, pp. 863-871, 2012.
Ghoshal N., Mandal J. K., “Image Authentication Technique in Frequency Domain based on Discrete Fourier Transformation (IATFDDFT)”, International Conference on Computer and Systems, ICCS-2010, ISBN: 93-80813-01-5, University of Burdwan, West Bengal, India, pp. 144-150, November 19-20, 2010.
Ghoshal N. et al., “A Two- and Three- Layer Dogleg Channel Routing Algorithm for Minimizing Total Wire Length”, Proceedings of International Conference on Computers and Devices for Communication (CODEC 2004), CD: Paper ID: CNA_0435_CO (Four Pages), Kolkata, India, January 1-3, 2004.
Ghoshal N. et al., “TAH based Total Wire Length Minimization in Two-Layer Channel Routing”, Proceeding of National Conference on Emerging Trends in VLSI Design and Testing (NCVDAT 2003), Coimbatore, India, pp. 428-437 (In CD), February 21-22, 2003.
Ghoshal N. et al., “Total Wire Length Minimization in Channel Routing”, Proceeding of National Conference on Horizons of Telecommunication (HOT 2003), Kolkata, India, Page 60 (Abstract), February 3-5, 2003.
Ghoshal N., Chowdhury S. Mandal J. K., “An Image Authentication in Z-Domain (IAZ-D)”, UGC sponsored national symposium on Emerging Trends in Computer Science (ETCS 2011), Organized by Barrackpore Rastraguru Surendranath College, Dept. of Computer Science, Barrackpore, January 20-21, 2012.
Ghoshal N., Goswami A., Pal D., “Authentication Technique for Gray Images Using DCT (ATGIDCT)”, IEEE 3rd international Conference on Emerging Applications of Information Technology, EAIT 2012, Print ISBN: 978-1-4673-1828-0, CSI Kolkata Chapter, Kolkata, November 30th - December 1st, pp. 421-424, 2012.
Ghoshal N., Mukherjee R., “Steganography Based Visual Cryptography (SBVC)”, Springer International Conference on Frontiers of Intelligent Computing Theory and applications, FICTA 2012, Print ISBN: 978-3-642-35313-0, On Line ISBN: 978-3-642-35314-7, Vol.199, Bhubaneswar, December 22nd – 23rd, pp. 559 - 566, 2012.
Ghoshal N., Goswami A., Pal D., “Lossless Audio Steganography in Spatial Domain (LASSD)”, Springer International Conference on Frontiers of Intelligent Computing Theory and applications, FICTA 2012, Print ISBN: 978-3-642-35313-0, On Line ISBN: 978-3-642-35314-7,Vol. 199, Bhubaneswar, December 22nd – 23rd,pp. 575 - 582, 2012.
Ghoshal N., Goswami A., Lallie H. S. “Adaptive Steganography for Image Authentication Based on Chromatic Property (ASIACP)”, Springer International Conference on Frontiers of Intelligent Computing Theory and applications, FICTA 2012, Print ISBN: 978-3-642-35313-0, On Line ISBN: 978-3-642-35314-7, Vol. 199, Bhubaneswar, December 22nd – 23rd, pp.631- 638, 2012.
Ghoshal N., Chowdhury S., Nag D., Sadhu K., “Encryption Based Image Authentication Technique Using Random Circular Insertion and Adjustment (EIATRCIA)”, Springer International Conference on Frontiers of Intelligent Computing Theory and applications, FICTA 2012, Print ISBN: 978-3-642-35313-0, On Line ISBN: 978-3-642-35314-7, Vol. 199, Bhubaneswar, December 22nd – 23rd, pp.667 - 674, 2012.
Ghoshal N., Goswami A., Pal D., “DCT Based Image Authentication with Partial Noise Reduction (DCTIAPNR)”, Springer International Conference on Frontiers of Intelligent Computing Theory andapplications, FICTA 2012, Print ISBN: 978-3-642-35313-0, On Line ISBN: 978-3-642-35314-7, Vol. 199, Bhubaneswar, December 22nd – 23rd, pp. 621 - 629, 2012.
Ghoshal N., Goswami A., Pal D., “Two Stage Color Image Steganography Using DCT (TSCIS-DCT)”, Springer International Conference on Frontiers of Intelligent Computing Theory and applications, FICTA 2012, Print ISBN: 978-3-642-35313-0, On Line ISBN: 978-3-642-35314-7,Vol. 199, Bhubaneswar, December 22nd – 23rd, pp. 755-763, 2012.
Ghoshal N., Das S., Mondal S. N., “An Innovative Approach in Image Encryption”, 5th International Conference on Recent Trends in Information, Telecommunication and Computing ITC-2014, March 21-22, pp. 158-166, 2014.
Ghoshal N., Das S., Mondal S. N., “Diffusion Encryption of Digital Image using Genetic Algorithm”, Springer 3rd International Conference on Frontiers of Intelligent Computing Theory and applications, FICTA 2014, Print ISBN: 978-3-319-11932-8, On Line ISBN: 978-3-319-11933-5, Vol. 327, Bhubaneswar, November 14th – 15th, pp. 729 - 736, 2014.
Ghoshal N., Pal D., “Secured Data Transmission Through Audio Signal (SDTAS)”, 9th International Conference on Industrial and Information Systems (ICIIS2014), ABV-Indian Institute of Information Technology and Management, Electronic ISBN:978-1-4799-6500-7Print ISBN:978-1-4799-6499-4, Gwalior, India.15th – 17th December, 2014.
Ghoshal N., Das S., Mondal S. N., “Multiple Image Encryptions using Genetic Algorithm”, International Conference on Intelligent Computing & Applications ICICA 2014, Print ISBN:978-81-322-2267-5, Online ISBN: 978-81-322-2268-2, Vol. 343, NIT, Durgapur,December 22nd – 24th,pp. 155-165, 2014.
Ghoshal N., Chakraborty S., Pal C., Chatterjee S., Chakraborty B., “Knowledge Base System Architecture on CBR for Detection of Cholera Disease”, International Conference on Intelligent Computing &Applications ICICA 2014, Print ISBN: 978-81-322-2267-5, Online ISBN:978-81-322-2268-2, Vol. 343, NIT, Durgapur, December 22nd – 24th,pp. 145-153, 2014.
Ghoshal N., Pal D., “Secret Transmission through Audio Signal with Reduced Distortion for Wireless Communication (STASRD)”, IEEE 5th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems, Wireless Vitae – 2015, Hyderabad, December 13th – 16th, 2015.
Ghoshal N., Chowdhury S., “Variable Encoding and Sequencing Pattern Driven Multiple Image Bit Watermarking for Wireless Domain (VESPDMIBWWD)”, IEEE 5th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems, Wireless Vitae – 2015, Hyderabad, December 13th – 16th, 2015.
Ghoshal N., Goswami A., “Daubechies Wavelet based Effective Data Authentication in Wireless Domain (DWEDAWD)”, IEEE 5th International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems, Wireless Vitae – 2015, Hyderabad, December 13th – 16th, 2015. Hyderabad, December 13th – 16th, 2015.
Ghoshal N., Goswami A., “Block Based Imperceptible Data Hiding Using Wavelets in Wireless Communication”, IEEE International Conference on Microelectronics, Computing and Communication MicroCom 2016, NIT, Durgapur, January 23rd – 25th,2016.
Ghoshal N., Chowdhury S., “Block Transformed with Distinctly Coded Multiple Image Bit Watermarking for Secure Mobile communication”, IEEE International Conference on Microelectronics, Computing and Communication MicroCom 2016, NIT, Durgapur, January 23rd – 25th, 2016.
N. Ghoshal et al., "Job Scheduling in Computational Grid Using a Hybrid Algorithm based on Genetic Algorithm and Particle Swarm Optimization", International conference on Recent Advances in Intelligent Information Systems and Applied Mathematics(ICITAM 2019), pp. 873- 885, HIT, March 7th - 9th. 2019
N Ghoshal et al., "Multi Data Driven Validation of E-Document Using Concern Authentic Multi-signature Combinations", International Conference on Frontiers in Computing and Systems (COMSYS 2020), pp. 731-743, 2020.
N Ghoshal et al., "A novel high-density multilayered audio steganography technique in hybrid domain", International Conference on Frontiers in Computing and Systems (COMSYS 2020), pp. 721-730, 2020.
N Ghoshal et al., "Robust Fabrication of Share to Assure Error Free Dissemination of Secret Data (RFSAEFDSD)", 2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), March 22-24, Chennai, 2018.
N Ghoshal et al., "Dynamical Digital Authentication for Wireless Domain With Randomized Dispersing of Multiple Secret Signatures", 2018 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), March 22-24, Chennai, 2018.
N Ghoshal, A Mallick, A K Das, "Network Based Analysis for Hiv-1 Significant Protein Through Drug-Target Interaction: Bioinformatics Practices", IEEE Fifth International Conference on Advances in Electronics, Computers and Communications (ICAECC), 2023.
Ghoshal N.,Goswami A., Mondal J K., Pal D., “Image Authentication Technique Based on DCT”, Proceedings of the Second International Conference on Computer Science, Engineering & Applications (ICCSEA 2012), May 25-27, 2012, New Delhi, India. Advances in Intelligent Systems and Computing, Online ISBN: 978-3-642-30111-7, vol 167, pp 863-871, Springer, Berlin, Heidelberg.