A robust image encryption scheme using chaotic tent map and cellular automata PK Naskar, S Bhattacharyya, D Nandy, A Chaudhuri Nonlinear Dynamics 100 (3), 2877–2898, 2020 | 97 | 2020 |
DNA encoding and channel shuffling for secured encryption of audio data PK Naskar, S Paul, D Nandy, A Chaudhuri Multimedia Tools and Applications 78, 25019-25042, 2019 | 46 | 2019 |
An efficient block-level image encryption scheme based on multi-chaotic maps with DNA encoding PK Naskar, S Bhattacharyya, KC Mahatab, KG Dhal, A Chaudhuri Nonlinear Dynamics 105, 3673–3698, 2021 | 24 | 2021 |
Cauchy with whale optimizer based eagle strategy for multi-level color hematology image segmentation S Ray, A Das, KG Dhal, J Gálvez, PK Naskar Neural Computing and Applications 33 (11), 5917-5949, 2021 | 24 | 2021 |
A secure symmetric image encryption based on bit-wise operation PK Naskar, A Chaudhuri International Journal of Image, Graphics and Signal Processing 6 (2), 30, 2014 | 18 | 2014 |
An audio encryption based on distinct key blocks along with PWLCM and ECA PK Naskar, S Bhattacharyya, A Chaudhuri Nonlinear Dynamics 103, 2019–2042, 2021 | 16 | 2021 |
Shared cryptography with embedded session key for secret audio PK Naskar, HN Khan, U Roy, A Chaudhuri, A Chaudhuri International Journal of Computer Applications 26 (8), 5-9, 2011 | 16 | 2011 |
Secured image encryption scheme based on DNA encoding and chaotic map S Paul, P Dasgupta, PK Naskar, A Chaudhuri REVIEW OF COMPUTER ENGINEERING STUDIES 4 (2), 70-75, 2017 | 15 | 2017 |
Image Secret Sharing Scheme Using a Novel Secret Sharing Technique with Steganography PK Naskar, A Chaudhuri, A Chaudhuri IEEE CASCOM Post Graduate Student Paper Conference, 62, 2010 | 15 | 2010 |
A secure symmetric image encryption based on linear geometry PK Naskar, A Chaudhuri, A Chaudhuri 2014 Applications and Innovations in Mobile Computing (AIMoC), 67-74, 2014 | 13 | 2014 |
Cuckoo search with differential evolution mutation and Masi entropy for multi-level image segmentation S Ray, S Parai, A Das, KG Dhal, PK Naskar Multimedia Tools and Applications 81 (3), 4073-4117, 2022 | 12 | 2022 |
A robust image encryption technique using dual chaotic map PK Naskar, A Chaudhuri International Journal of Electronic Security and Digital Forensics 7 (4 …, 2015 | 11 | 2015 |
Secured secret sharing technique based on chaotic map and DNA encoding with application on secret image PK Naskar, A Chaudhuri The Imaging Science Journal 64 (8), 460-470, 2016 | 10 | 2016 |
Minimization of handoff failure by introducing a new cell coverage area in the handoff region D Sarddar, S Chatterjee, R Jana, SS Babu, PK Naskar, U Biswas, ... International Journal of Computer Science Issues (IJCSI) 8 (3), 577, 2011 | 10 | 2011 |
A novel image secret sharing scheme PK Naskar, A Chaudhuri, D Basu, A Chaudhuri 2011 Second International Conference on Emerging Applications of Information …, 2011 | 10 | 2011 |
Ultra secured and authentic key distribution protocol using a novel secret sharing technique PK Naskar, HN Khan, A Chaudhuri, A Chaudhuri International Journal of Computer Applications 19 (7), 12-15, 2011 | 9 | 2011 |
A Key Based Secure Threshold Cryptography for Secret Image PK Naskar, HN Khan, A Chaudhuri International Journal of Network Security 18 (1), 68-81, 2016 | 6 | 2016 |
Secret image sharing with embedded session key PK Naskar, HN Khan, U Roy, A Chaudhuri, A Chaudhuri Computer Information Systems–Analysis and Technologies: 10th International …, 2011 | 6 | 2011 |
Rough cuckoo search: A novel mathematics based optimization approach based on rough set S Ray, KG Dhal, PK Naskar Pattern Recognition and Image Analysis 32 (1), 228-247, 2022 | 4 | 2022 |
Whale optimizer-based clustering for breast histopathology image segmentation S Ray, A Das, KG Dhal, J Gálvez, PK Naskar International Journal of Swarm Intelligence Research (IJSIR) 13 (1), 1-29, 2022 | 3 | 2022 |