Follow
Prabir Kr. Naskar
Prabir Kr. Naskar
Govt. College of Engineering & Textile Technology, Serampore
No verified email - Homepage
Title
Cited by
Cited by
Year
A robust image encryption scheme using chaotic tent map and cellular automata
PK Naskar, S Bhattacharyya, D Nandy, A Chaudhuri
Nonlinear Dynamics 100 (3), 2877–2898, 2020
972020
DNA encoding and channel shuffling for secured encryption of audio data
PK Naskar, S Paul, D Nandy, A Chaudhuri
Multimedia Tools and Applications 78, 25019-25042, 2019
462019
An efficient block-level image encryption scheme based on multi-chaotic maps with DNA encoding
PK Naskar, S Bhattacharyya, KC Mahatab, KG Dhal, A Chaudhuri
Nonlinear Dynamics 105, 3673–3698, 2021
242021
Cauchy with whale optimizer based eagle strategy for multi-level color hematology image segmentation
S Ray, A Das, KG Dhal, J Gálvez, PK Naskar
Neural Computing and Applications 33 (11), 5917-5949, 2021
242021
A secure symmetric image encryption based on bit-wise operation
PK Naskar, A Chaudhuri
International Journal of Image, Graphics and Signal Processing 6 (2), 30, 2014
182014
An audio encryption based on distinct key blocks along with PWLCM and ECA
PK Naskar, S Bhattacharyya, A Chaudhuri
Nonlinear Dynamics 103, 2019–2042, 2021
162021
Shared cryptography with embedded session key for secret audio
PK Naskar, HN Khan, U Roy, A Chaudhuri, A Chaudhuri
International Journal of Computer Applications 26 (8), 5-9, 2011
162011
Secured image encryption scheme based on DNA encoding and chaotic map
S Paul, P Dasgupta, PK Naskar, A Chaudhuri
REVIEW OF COMPUTER ENGINEERING STUDIES 4 (2), 70-75, 2017
152017
Image Secret Sharing Scheme Using a Novel Secret Sharing Technique with Steganography
PK Naskar, A Chaudhuri, A Chaudhuri
IEEE CASCOM Post Graduate Student Paper Conference, 62, 2010
152010
A secure symmetric image encryption based on linear geometry
PK Naskar, A Chaudhuri, A Chaudhuri
2014 Applications and Innovations in Mobile Computing (AIMoC), 67-74, 2014
132014
Cuckoo search with differential evolution mutation and Masi entropy for multi-level image segmentation
S Ray, S Parai, A Das, KG Dhal, PK Naskar
Multimedia Tools and Applications 81 (3), 4073-4117, 2022
122022
A robust image encryption technique using dual chaotic map
PK Naskar, A Chaudhuri
International Journal of Electronic Security and Digital Forensics 7 (4 …, 2015
112015
Secured secret sharing technique based on chaotic map and DNA encoding with application on secret image
PK Naskar, A Chaudhuri
The Imaging Science Journal 64 (8), 460-470, 2016
102016
Minimization of handoff failure by introducing a new cell coverage area in the handoff region
D Sarddar, S Chatterjee, R Jana, SS Babu, PK Naskar, U Biswas, ...
International Journal of Computer Science Issues (IJCSI) 8 (3), 577, 2011
102011
A novel image secret sharing scheme
PK Naskar, A Chaudhuri, D Basu, A Chaudhuri
2011 Second International Conference on Emerging Applications of Information …, 2011
102011
Ultra secured and authentic key distribution protocol using a novel secret sharing technique
PK Naskar, HN Khan, A Chaudhuri, A Chaudhuri
International Journal of Computer Applications 19 (7), 12-15, 2011
92011
A Key Based Secure Threshold Cryptography for Secret Image
PK Naskar, HN Khan, A Chaudhuri
International Journal of Network Security 18 (1), 68-81, 2016
62016
Secret image sharing with embedded session key
PK Naskar, HN Khan, U Roy, A Chaudhuri, A Chaudhuri
Computer Information Systems–Analysis and Technologies: 10th International …, 2011
62011
Rough cuckoo search: A novel mathematics based optimization approach based on rough set
S Ray, KG Dhal, PK Naskar
Pattern Recognition and Image Analysis 32 (1), 228-247, 2022
42022
Whale optimizer-based clustering for breast histopathology image segmentation
S Ray, A Das, KG Dhal, J Gálvez, PK Naskar
International Journal of Swarm Intelligence Research (IJSIR) 13 (1), 1-29, 2022
32022
The system can't perform the operation now. Try again later.
Articles 1–20