10. Jina Varghese, Praveen K., Sabyasachi Dutta & Avishek Adhikari. A novel approach for long-term secure storage of domain independent videos. Journal of Visual Communication and Image Representations 104, pp. 104279, Elsevier 2024.
9. Sabyasachi Dutta, Shaoquan Jiang & Rei Safavi-Naini. A New Lower Bound on the Share Size of Leakage Resilient Secret Sharing Schemes, New Advances in Designs, Codes and Cryptography, Charles J. Colbourn and Jeffrey H. Dinitz (Eds), Fields Institute Communications, vol. 86, Springer, pp. 125-139, 2024.
8. Ishak Meraouche, Sabyasachi Dutta, Haowen Tan & Kouichi Sakurai. Learning asymmetric encryption using adversarial neural networks. Engineering Applications of Artificial Intelligence 123 (Part B), pp. 106220, Elsevier, 2023.
7. Praveen K., Sabyasachi Dutta, Avishek Adhikari & M. Sethumadhavan. Proactive Visual Cryptographic Schemes for General Access Structures. Multimedia Tools and Applications 82(27), pp. 41987-42019, Springer, 2023.
6. Ishak Meraouche, Sabyasachi Dutta, Sraban Kumar Mohanty, Isaac Agudo & Kouichi Sakurai. Learning Multi-Party Adversarial Encryption and Its Application to Secret Sharing. IEEE Access 10, pp. 121329-121339, 2022.
5. Shion Samadder Chaudhury & Sabyasachi Dutta. Quantum multi-secret sharing via trap codes and discrete quantum walks. Quantum Information Processing 21(11), pp. 1-27, Springer US, 2022.
4. Suraj Kumar Sahoo, Avishek Adhikari & Sabyasachi Dutta. Practical Attacks on a Class of Secret Image Sharing Schemes based on Chinese Remainder Theorem, Computers and Electrical Engineering 100, pp. 107924, Elsevier, 2022.
3. Ishak Meraouche, Sabyasachi Dutta, Haowen Tan & Kouichi Sakurai. Neural Networks-Based Cryptography: A Survey, IEEE Access 9, pp. 124727-124740 , 2021.
2. Sabyasachi Dutta, Avishek Adhikari & Sushmita Ruj. Maximal contrast color visual secret sharing schemes, Des. Codes Cryptogr. 87(7), pp. 1699-1711, Springer, 2019.
1. Sabyasachi Dutta, R. S. Rohit & Avishek Adhikari. Constructions and Analysis of some Efficient t-(k, n) ∗ -Visual Cryptographic Schemes Using Linear Algebraic Techniques, Des. Codes Cryptogr. 80(1), pp. 165-196, Springer, 2016.