Prof. Biswapati Jana
Professor
HOD
Department
COMPUTER SCIENCE
Contact
+91 3222 298-274 / Centrex-274
Biographical Sketch
I am currently serving as a Distinguished Professor in the Department of Computer Science at Vidyasagar University, Paschim Medinipur, India. My academic journey began with a B.Tech. and M.Tech. in Computer Science and Engineering from the University of Calcutta, followed by a Ph.D. from Vidyasagar University. Each stage of this journey strengthened not only my technical foundation but also my commitment to teaching and research.
Over the years, my research interests have centered on Image Processing, Steganography, Data Hiding, and Digital Watermarking. I have always been fascinated by the challenge of protecting digital information without compromising its quality or usability. Much of my work explores how data can be securely embedded, transmitted, and authenticated in an increasingly connected world. Guiding research scholars has been one of the most fulfilling aspects of my career. Four of my Ph.D. students have successfully completed their doctoral degrees under my supervision, and eight more are currently pursuing their research. Working closely with them—discussing ideas, solving problems, and celebrating milestones—remains a deeply rewarding experience.
My research contributions are reflected in more than ninety-five publications in reputed national and international journals and conference proceedings. I have also had the opportunity to present over thirty-five research papers at international conferences in countries such as Japan, Thailand, and Dubai. These experiences allowed me to exchange ideas with global researchers and bring fresh perspectives back to my department. In addition, I have been invited to deliver talks and serve as a resource person in various seminars and academic programs, where I enjoy sharing knowledge and learning from diverse audiences.
Beyond research and teaching, I have taken on several academic leadership roles at Vidyasagar University. I served as the Head of the Department of Computer Science for eight years, a period during which I worked closely with colleagues to strengthen academic programs and research culture. Earlier, I held the position of Teacher-in-Charge at HIT, Haldia. I am also a member of the Executive Council of Vidyasagar University, contributing to important decisions that shape the institution’s future.
My engagement extends beyond the classroom and research laboratory. As the Program Officer of NSS Unit VIII, I remain involved in community-oriented activities that connect students with social responsibility. Within the department, I serve as the Secretary of the Ph.D. Committee, helping guide research policies and academic standards.
Throughout my career, I have tried to balance research excellence, academic leadership, and community engagement. More than titles or numbers, what matters most to me is the opportunity to mentor students, collaborate with colleagues, and contribute meaningfully to the academic community.
Academic Interest
My academic journey in Computer Science has grown naturally from curiosity into a deep commitment to building secure and intelligent digital systems. Over the years, my research interests have evolved across multimedia security, reversible data hiding, digital watermarking, artificial intelligence, fuzzy systems, IoT security, and smart applications. What connects all these areas is a simple concern: how can we protect information while making our systems more intelligent and trustworthy?
A significant part of my work focuses on reversible data hiding, especially for sensitive domains such as medical and forensic imaging. In these fields, even a minor distortion can be unacceptable. I have worked on embedding techniques that preserve image quality while allowing complete recovery of the original data. The challenge has always been balancing capacity, security, and fidelity. Each solution demanded careful experimentation and refinement, but the goal remained constant—to design systems that are both practical and reliable.
Closely related is my work on digital watermarking and multimedia authentication. With the rapid rise of image manipulation and deepfakes, ensuring authenticity has become crucial. My research explores fragile and robust watermarking schemes for tamper detection, localization, and recovery. I am particularly interested in combining classical signal processing methods with intelligent models to make authentication systems more adaptive and resilient.
In recent years, artificial intelligence has become central to my academic direction. I have worked on fake news and fake image detection, integrating machine learning with semantic and fuzzy reasoning techniques. AI, to me, is not just about automation; it is about building systems that can learn patterns, interpret uncertainty, and assist human decision-making. I believe AI must be developed responsibly, especially in areas that influence public opinion and social trust.
My research also extends to optimization under uncertainty using fuzzy models. Real-world problems rarely follow exact mathematical rules. Whether in logistics, resource allocation, or sustainability planning, uncertainty must be acknowledged and modeled carefully. Soft computing approaches allow us to design solutions that reflect practical complexity rather than ideal assumptions.
Recently, I have explored IoT security and smart agriculture applications, including AI-based crop health monitoring systems. Technology should not remain confined to laboratories; it should improve everyday life. Designing secure, lightweight systems for interconnected devices remains an important direction for me.
Overall, my academic interest lies in integrating security, intelligence, and societal relevance. I aim to contribute to a future where digital systems are not only powerful but also dependable, ethical, and human-centered.
Educational Qualification
| Degree Name | Institute | Year of passing/awarded |
|---|---|---|
| Ph.D. in Computer Science | Vidyasagar University | 2017 |
| M.Tech. in Computer Science & Engineering | Calcutta University | 2002 |
| B.Tech. in Computer Science & Engineering | Calcutta University | 1999 |
| B.Sc. in Physics [Hons] | Calcutta University | 1996 |
Title of the Ph. D. Thesis
| Title of the Ph. D. Thesis |
|---|
| Design and Implementation of Dual Image-based Reversible Data Hiding Techniques |
Career Profile / Teaching Experience
| Description of Experience |
|---|
| Professor, Department of Computer Science, Vidyasagar University, P.O:-Vidyasagar University, Dist:- Paschim Medinipur, Pin:-721102. from March, 2021 |
| Associate Professor, Department of Computer Science, Vidyasagar University, P.O:-Vidyasagar University, Dist:- Paschim Medinipur, Pin:-721102.from March 2018 |
| Assistant Professor, Department of Computer Science, Vidyasagar University, P.O:-Vidyasagar University, Dist:- Paschim Medinipur, Pin:-721102. from 2004 to 2018 |
| Lecturer, Department of Computer Science & Engineering , Haldia Institute of Technology (HIT), P.O. – HIT Campus, Dist:- Purba Medinipur. Pin:-721657. from 2001 to 2004. |
Specialization/Research Area
| Type (Specialization / Research Area / Areas of Interest) | Detailed Description |
|---|---|
| Field of Specialization | Image Processing, Data Hiding, Security, Watermarking, Steganography |
| Research Area/ Areas of Interest | Machine Learning, Artificial Intellegence, Quantum Computing |
Course/ Subject Taught
| Course Name |
|---|
| Multimedia Security, Research Methodology , Cryptography and Steganography, Image Processing, Compiler Design |
Publications in Journal / Magazines / Newspaper
| Author' Name | Title | Publication Type | Published in | Published on | Publisher's Name | Role | Details |
|---|---|---|---|---|---|---|---|
| Sabari Pramanik & Biswapati Jana | A Clustering-Induced Opposition-Based Grasshopper Optimization Algorithm | International | Proceedings of the Eleventh International Conference on Mathematics and Computing | Jan, 2026 | Springer | Corresponding Author | Impact Factor: 0.0Indexing: OthersArticle's Web Link: https://doi.org/10.1007/978-981-96-6351-4_27 |
| Santa Singh, Partha Chowdhuri, Pabitra Pal & Biswapati Jana | An Image Watermarking Approach Using Hybrid GWO-GA in IWT Domain | International | Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 1405)) | Oct, 2025 | Springer | Co-Author | Impact Factor: 0.0Indexing: SCOPUS,UGC CAREArticle's Web Link: https://link.springer.com/chapter/10.1007/978-981-96-6348-4_9 |
| Alok Haldar, Manasi Jana, Debkumar Bera, Sharmistha Jana, Priyanka RoyGupta, Biswapati Jana | Reversible Data Hiding for Image Authentication and Tamper Detection Exploiting LBP and Interpolation | International | International Conference on Intelligent Systems and Security | Sep, 2025 | Springer | Corresponding Author | Impact Factor: 0.0Indexing: OthersArticle's Web Link: https://doi.org/10.1007/978-981-96-4273-1_28 |
| Debraj Roy, Prasenjit Bera, Debasis Patra, Rakesh Dutta, Biswapati Jana | Predicting and Identifying Potato Blight Disease Through Deep Learning with Fuzzy Approaches | International | Book International Conference on Intelligent Systems and Security | Sep, 2025 | Springer | Co-Author | Impact Factor: 0.0Indexing: OthersArticle's Web Link: https://link.springer.com/chapter/10.1007/978-981-96-4273-1_18 |
| Dola Saha, Pradipta Paul, Debasis Dhal, Biswapati Jana | A Deep Learning Framework for Insect Sound Classification Integrating STFT and Log Mel Spectrogram with CNN | International | International Conference on Intelligent Systems and Security | Sep, 2025 | Springer | Co-Author | Impact Factor: 0.0Indexing: OthersArticle's Web Link: https://link.springer.com/chapter/10.1007/978-981-96-4273-1_10 |
| Manasi Jana · Biswapati Jana · Subhankar Joardar | Self-embedding tampered image localization and restoration scheme exploiting DCT, LBP with fuzzy logic | International | Multimedia Tools and Applications (2025) 84:49071–49107 | Aug, 2025 | Springer | First Author | Impact Factor: 3.50000Indexing: SCOPUS,SCIArticle's Web Link: https://link.springer.com/article/10.1007/s11042-025-21096-3 |
| Kankana Datta, Biswapati Jana, Mamata Dalui | A Weighted Matrix-Based Reversible Data Hiding Scheme with Dual-Image by Exploiting BWT Encoding Technique | International | Proceedings of International Conference on Network Security and Blockchain Technology: ICNSBT 2024 | Feb, 2025 | Springer | Co-Author | Impact Factor: 0.0Indexing: SCOPUS,OthersArticle's Web Link: https://link.springer.com/chapter/10.1007/978-981-97-8051-8_1 |
| Sudipta Meikap, Biswapati Jana | High-Payload RDH Technique for Secure Data Transmission Through Improved Context Pixel-Based PVO Exploiting Center-Folding Strategy | International | Proceedings of International Conference on Network Security and Blockchain Technology (ICNSBT 2024) | Feb, 2025 | Springer | Co-Author | Impact Factor: 0.0Indexing: OthersArticle's Web Link: https://link.springer.com/chapter/10.1007/978-981-97-8051-8_29 |
| Biswapati Jana; Sabari Pramanik; Sharmistha Jana | The Global Impact of Artificial Intelligence on Society, Economy, and Environment | International | Artificial Intelligence in Agriculture and Environmental Sustainability: A Global Perspective | Jan, 2025 | Emerald Publishing Limited | First Author | Impact Factor: 0.0Indexing: OthersArticle's Web Link: https://doi.org/10.1108/978-1-83662-570-420251007 |
| Tzu Chuen Lu, Thanh Nhan Vo, Biswapati Jana | Image Interpolation Utilizing Neighboring Pixels as References in Conjunction with Multilayer Perceptron Neural Networks | International | International Conference on Security and Information Technologies with AI, Internet Computing and Big-data Applications | Dec, 2024 | Springer Nature Singapore | Co-Author | Impact Factor: 0.0Indexing: OthersArticle's Web Link: https://doi.org/10.1007/978-981-97-7786-0_1 |
| Biswapati Jana, Sharmistha Jana and Tzu Chuen Lu | Data Hiding Scheme Combining Coding Table With Enryption | International | Amitrakshar International Journal | Oct, 2024 | Amitrakshar International Journal | First Author | Impact Factor: 0.0Indexing: OthersArticle's Web Link: https://amitrakshar.co.in/journal/images/172914949268.pdf |
| Kankana Datta, Biswapati Jana, Mamata Dalui Chakraborty | A cellular automata based secured reversible data hiding scheme for dual images using bit-reversal permutation technique | International | Computer Standards & Interfaces | Aug, 2024 | Elsevier | Co-Author | Impact Factor: 3.1Indexing: SCOPUS,SCIArticle's Web Link: https://www.sciencedirect.com/science/article/pii/S0920548924000886 |
| Kankana Dattal, Som Banerjee, Biswapati Jana, Mamata Dalui | A Dual-Image Based Secured Reversible Data Hiding Scheme Exploiting Weighted | International | Cellular Automata Technology: Third Asian Symposium, ASCAT 2024 | Apr, 2024 | Springer Nature | Co-Author | Impact Factor: 0.0Indexing: OthersArticle's Web Link: https://books.google.co.in/books?hl=en&lr=&id=1BQDEQAAQBAJ&oi=fnd&pg=PA123&dq=info:4hvXcmaT1TsJ:scholar.google.com&ots=wNpXL2NlZX&sig=Jf712nZBvrBbkKqntDW0ONNbPSQ&redir_esc=y#v=onepage&q&f=false |
| Kankana Datta, Biswapati Jana, Mamata Dalui Chakraborty | Dual image based secured reversible data hiding scheme exploiting huffman compression tree combining bit-reversal permutation technique | International | Multimedia Tools and Applications | Apr, 2024 | Springer | Co-Author | Impact Factor: 3.1Indexing: SCOPUS,SCIEArticle's Web Link: https://link.springer.com/article/10.1007/s11042-024-19029-7 |
| Kankana Datta, Som Banerjee, Biswapati Jana, Mamata Dalui | A dual-image based secured reversible data hiding scheme exploiting weighted matrix and cellular automata | International | Asian Symposium on Cellular Automata Technology | Feb, 2024 | Springer Nature Switzerland | Co-Author | Impact Factor: 0.0Indexing: OthersArticle's Web Link: https://link.springer.com/chapter/10.1007/978-3-031-56943-2_10 |
| Manasi Jana, Biswapati Jana, Subhankar Joardar | AMBTC-Based High Capacity Data Hiding Scheme Exploiting PVD and BRP | International | International Conference on Advanced Computing and Applications | Feb, 2024 | Springer | Co-Author | Impact Factor: 0.0Indexing: OthersArticle's Web Link: https://link.springer.com/chapter/10.1007/978-981-97-4799-3_16 |
| Sudipta Meikap, Biswapati Jana | High-Payload RDH Technique for Secure Data Transmission Through Improved Context Pixel-Based PVO Exploiting Center-Folding Strategy | International | Proceedings of International Conference on Network Security and Blockchain Technology: ICNSBT 2024 | Feb, 2024 | Springer | Co-Author | Impact Factor: 0.0Indexing: SCOPUS,UGC CAREArticle's Web Link: https://link.springer.com/chapter/10.1007/978-981-97-8051-8_29 |
| Jyotsna Kumar Mandal Biswapati Jana Tzu-Chuen Lu Debashis De Editors | Secured Information Communication Exploiting Fuzzy Weight Strategy | International | Lecture Notes in Networks and Systems 738 | Feb, 2024 | Springer | Corresponding Author | Impact Factor: 0.0Indexing: SCOPUS,OthersArticle's Web Link: https://doi.org/10.1007/978-981-99-4433-0 |
| Sudipta Meikap, Biswapati Jana, Prabhash Kumar Singh, Debkumar Bera | Secure Data Communication Through Improved Multi-level Pixel Value Ordering Using Center-Folding Strategy | International | Springer | Feb, 2024 | Co-Author | Impact Factor: Indexing: Article's Web Link: | |
| Manasi Jana, Biswapati Jana, Shubhankar Joardar, Sharmistha Jana, and Tzu Chuen Lu | Secured Reversible Data Hiding Scheme with NMI Interpolation and Arnold Transformation | International | ICNSBT | Feb, 2024 | Springer | Co-Author | Impact Factor: Indexing: Article's Web Link: |
| Nandana Ghosh, Biswapati Jana, Sharmistha Jana, and Nguyen Kim Sao | Face Mask Detection Exploiting CNN and MobileNetV2 | International | Proceedings of International Conference on Network Security and Blockchain Technology: ICNSBT 2024 | Feb, 2024 | Springer | Co-Author | Impact Factor: Indexing: Article's Web Link: |
| Alok Haldar, Biswapati Jana, Sharmistha Jana, Nguyen Kim Sao, and Thanh Nhan Vo | Secured Information Communication Exploiting Fuzzy Weight Strategy | International | Proceedings of International Conference on Network Security and Blockchain Technology: ICNSBT 2024 | Feb, 2024 | Co-Author | Impact Factor: Indexing: OthersArticle's Web Link: | |
| Sharmistha Jana, Saraswati Dutta, Shovan Roy, Kousik Kundu, Alok Halder, Debkumar Bera, and Thanh Nhan Vo | Secured Covert Communication Through Blockchain Technology | International | Proceedings of International Conference on Network Security and Blockchain Technology: ICNSBT 2024 | Feb, 2024 | Springer | Co-Author | Impact Factor: Indexing: Article's Web Link: |
| JS Bharti, Jana Biswapati, Kaity Sourav, Vardhan Aditya | Position Finding of Airborne Object with Dynamic Electro Optics Using Triangulation | International | International Conference on Computational Technologies and Electronics | Nov, 2023 | Co-Author | Impact Factor: Indexing: Article's Web Link: | |
| Kankana Datta, Biswapati Jana, Mamata Dalui Chakraborty | A dual-image based robust reversible data hiding scheme based on weighted matrix and LZW algorithm | International | nternational Conference on Computational Technologies and Electronics | Nov, 2023 | Springer Nature Switzerland | Co-Author | Impact Factor: Indexing: SCI,OthersArticle's Web Link: |
| Manasi Jana, Biswapati Jana, Subhankar Joardar | Reversible data hiding strategy exploiting circular distance interpolation utilizing optimal pixel adjustment with error substitution | International | Multimedia Tools and Applications | Nov, 2023 | Springer | Co-Author | Impact Factor: 0.0Indexing: OthersArticle's Web Link: https://doi.org/10.1007/s11042-023-17014-0 |
| Sharmistha Halder Jana, Biswapati Jana, Tzu Chuen Lu | Multimedia Authentication Through Digital Tattooing Scheme at IoT Perception Layer for Smart City | International | IETE Journal of Research | Sep, 2023 | IETE Journal of Research | Co-Author | Impact Factor: Indexing: OthersArticle's Web Link: |
| Sudipta Meikap, Biswapati Jana & Tzu-Chuen Lu | Context Pixel-based Reversible Data Hiding Scheme usingPixel Value Ordering | International | The Visual Computer | Jul, 2023 | Springer | Co-Author,Corresponding Author | Impact Factor: 3.50000Indexing: SCOPUS,SCIEArticle's Web Link: HTTPS://DOI.ORG/10.1007/S00371-023-03050-2 |
| Sudipta Meikap & Biswapati Jana | Reference Pixel-Based Reversible Data Hiding Scheme Using Multi-Level Pixel Value Ordering | International | Multimedia Tools and Applications, Springer | Jul, 2023 | Springer | Co-Author,Corresponding Author | Impact Factor: 3.60000Indexing: SCOPUS,SCIEArticle's Web Link: HTTPS://LINK.SPRINGER.COM/ARTICLE/10.1007/S11042-023-16171-6 |
| Tzu Chuen Lu, Shi-Yao Lin, Yu-Xuan Zhou, Biswapati Jana | Serious games applied to the study of the" Substance Structure and Atom" units in chemistry | International | 12th International Conference on Awareness Science and Technology (iCAST) | Jun, 2023 | Co-Author | Impact Factor: Indexing: Article's Web Link: | |
| Prabhash Kumar Singh, Biswapati Jana, Kakali Datta, Partha Chowdhuri, Pabitra Pal | RIWT generative feedback residual network for secure clinical data communication in healthcare unit | International | Frontiers of ICT in Healthcare: Proceedings of EAIT 2022 | Apr, 2023 | Frontiers of ICT in Healthcare: Proceedings of EAIT 2022 | Co-Author | Impact Factor: Indexing: SCOPUSArticle's Web Link: |
| K Datta, B Jana, PK Singh, MD Chakraborty | Robust Data Hiding Scheme for Highly Compressed Image Exploiting BTC with Hamming Code | International | Multimedia Tools and Applications10.1007/s11042-023-15727-w | Apr, 2023 | Springer | Co-Author,Corresponding Author | Impact Factor: 3.60000Indexing: SCOPUS,SCIEArticle's Web Link: https://link.springer.com/article/10.1007/s11042-023-15727-w |
| Sourav Kaity, Lalatendu Das, Biswapati Jana, JS Bharti, Shilpa Gupta, Ajay Matharia | Multi-sensor data fusion using triangulation method and K-means algorithm | International | 3rd International Conference on Range Technology (ICORT) | Feb, 2023 | Springer | Co-Author | Impact Factor: Indexing: SCIArticle's Web Link: |
| M Jana, B Jana, S Joardar, S Jana, TC Lu | Secured Reversible Data Hiding Scheme with NMI Interpolation and Arnold Transformation | International | International Conference on Network Security and Blockchain Technology, 57-66 | Feb, 2023 | International Conference on Network Security and Blockchain Technology, 57-66 | Co-Author | Impact Factor: Indexing: SCI,OthersArticle's Web Link: |
| Halder (Jana), Sharmistha; Jana, Biswapati | Application of Type-2 Defuzzification Method to Solve Profit Maximization Solid Transportation Problem Considering Carbon Emission. | International | International Journal of Information & Management Sciences, 2023, Vol 34, Issue 2, p99 | Feb, 2023 | International Journal of Information & Management Sciences, | Co-Author | Impact Factor: Indexing: SCIArticle's Web Link: |
| Tzu Chuen Lu, Thanh Nhan Vo, Biswapati Jana | Dual-image reversible data hiding based on encoding the numeral system of concealed information | International | 15th International Conference on Advanced Computational Intelligence (ICACI) | Feb, 2023 | 15th International Conference on Advanced Computational Intelligence (ICACI) | Co-Author | Impact Factor: Indexing: SCOPUSArticle's Web Link: |
| Rakesh Dutta, Nilanjana Das, Mukta Majumder, Biswapati Jana | Aspect based sentiment analysis using multi-criteria decision-making and deep learning under COVID-19 pandemic in India | International | CAAI Transactions on Intelligence Technology | Oct, 2022 | The Institute of Engineering and Technology | Co-Author | Impact Factor: 7.98500Indexing: SCOPUSArticle's Web Link: HTTPS://DOI.ORG/10.1049/CIT2.12144 |
| Prabhash Kumar Singh, Biswapati Jana, Kakali Datta | Fuzzy Proximity based Robust Data HidingScheme with Interval Threshold | International | Soft Computing | Oct, 2022 | Springer | Corresponding Author | Impact Factor: 3.73200Indexing: SCIArticle's Web Link: HTTPS://DOI.ORG/10.1007/S00500-022-07552-4 |
| S Jana, B Jana, TC Lu, TN Vo | Reversible Data Hiding SchemeExploiting Center Folding with Fuzzy Weight Strategy | International | Journal of Information Security and Applications (JISA) , Volume 69, September 2022, 103276 | Jul, 2022 | Elsevier | Corresponding Author | Impact Factor: 4.96000Indexing: SCIArticle's Web Link: |
| Prabhas Kumar Singh, Biswapati Jana, Kakali Datta | Robust data hiding scheme through distinct keypoint selection exploiting modified Bilateral-Laplacian SIFT with encoding pipeline | International | Displays 74(1):102268 | Jul, 2022 | Elsevier | Corresponding Author | Impact Factor: 3.07400Indexing: SCOPUS,SCIArticle's Web Link: |
| A Dual Image Based Data Hiding Scheme Based on Difference of Pixel Values in Integer Wavelet Transform Domain | International | CICBA | Jul, 2022 | Springer | Impact Factor: 0.00000Indexing: Article's Web Link: | ||
| Application of type-2 defuzzification method to solve profit maximization solid transportation problem considering carbon emission | International | International Journal of Information and Management Sciences (IJIMS) | Jun, 2022 | International Journal of Information and Management Sciences (IJIMS) | Corresponding Author | Impact Factor: 0.00000Indexing: SCOPUSArticle's Web Link: | |
| Fuzzy Logic with Superpixel-Based Block Similarity Measures for Secured Data Hiding Scheme | International | https://doi.org/10.1007/978-981-19-0105-8_44 | Jun, 2022 | Lecture Notes in Networks and Systems, vol 404. Springer, Singapore. https://doi.org/10.1007/978-981-19-0105-8_44 | Corresponding Author | Impact Factor: 0.00000Indexing: SCOPUSArticle's Web Link: https://doi.org/10.1080/19393555.2021.1956023 | |
| Two-layers robust data hiding scheme for highly compressed image exploiting AMBTC with difference expansion | International | Journal of King Saud University - Computer and Information Sciences Volume 34, Issue 8, Part A, September 2022, Pages 5240-5260 | May, 2022 | Elsevier | Corresponding Author | Impact Factor: 9.00600Indexing: SCOPUS, SCIArticle's Web Link: https://doi.org/10.1016/j.jksuci.2022.05.013 | |
| Active Queue Management in RED Considering Critical Point on Target Queue | International | Journal of Interconnection Networks, Vol. 21, No. 03, 2150017 (2021) | Sep, 2021 | World Scientific Publishing Co Pte Ltd | Co-Author | Impact Factor: 0.00000Indexing: SCOPUSArticle's Web Link: https://doi.org/10.1142/S0219265921500171 | |
| A new DCT based robust image watermarking scheme using cellular automata | International | Information Security Journal: A Global Perspective Volume 31, 2022 - Issue 5 | Aug, 2021 | Taylor and Francis | Corresponding Author | Impact Factor: 0.00000Indexing: SCOPUSArticle's Web Link: https://doi.org/10.1080/19393555.2021.1956023 | |
| FCSTP with possibility and expected value approaches in hybrid uncertain environments | International | TWMSJournal Of Applied And Engineering Mathematics, 11(4), 998-1011. | Jul, 2021 | TWMS Journal Of Applied And Engineering Mathematics | Co-Author | Impact Factor: 0.00000Indexing: SCOPUSArticle's Web Link: https://hdl.handle.net/11729/3249 http://jaem.isikun.edu.tr/web/index.php/archive/113-vol11-no4/759 | |
| Application of Fuzzy Logic based GA and PSO to solve 4D Multi-item transportation problem for substitute and complementary items | International | Evolutionary Intelligence , 15, pages 2187–2206 (2022) | Jun, 2021 | Springer | Corresponding Author | Impact Factor: 2.57700Indexing: SCOPUS, SCIArticle's Web Link: https://doi.org/10.1007/s12065-021-00630-w | |
| Application of fuzzy logic based GA and PSO to solve 4D multi-item transportation problem for substitute and complementary items | International | Evolutionary Intelligence volume 15, pages 2187–2206 (2022) | Jun, 2021 | Springer Nature | Co-Author,Corresponding Author | Impact Factor: 2.60000Indexing: SCOPUS, SCIEArticle's Web Link: https://doi.org/10.1007/s12065-021-00630-w | |
| An Image Authentication and Tampered Detection Scheme Exploiting Local Binary Pattern Along with Hamming Error Correcting Code | International | Wireless Personal Communications | Issue 1/2021 | Jun, 2021 | Springer | Corresponding Author | Impact Factor: 0.00000Indexing: SCOPUSArticle's Web Link: https://www.springerprofessional.de/en/an-image-authentication-and-tampered-detection-scheme-exploiting/19291660 | |
| Improving the Reversible LSB MatchingScheme Based on the Likelihood Re-encoding Strategy | International | Entropy, 23(5), 577. | May, 2021 | Entropy | Co-Author | Impact Factor: 2.52400Indexing: SCOPUSArticle's Web Link: https://doi.org/10.3390/e23050577 | |
| A secure reversible color image watermarking scheme based on LBP, lagrange interpolation polynomial and weighted matrix | International | Multimedia Tools and Applications | Mar, 2021 | Springer | Corresponding Author | Impact Factor: 2.57700Indexing: SCOPUS, SCIArticle's Web Link: https://doi.org/10.1007/s11042-021-10651-3 | |
| Application of Dynamic Weight with Distance to Reduce Packet Loss in RED based Algorithm | International | EAIT-2020 | Jan, 2021 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| Comparative analysis of bio- inspired dragonfly and honeybee algorithm-based routing protocols with the ant colony algorithm for MANET | International | EAIT-2020 | Jan, 2021 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| A Nobel Congestion Control Algorithm Using Buffer Occupancy RED | International | CIPR-2021 | Jan, 2021 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| A Novel Data Hiding Technique Based on QR Code Decomposition in Transform Domain | International | CIPR-2021 | Jan, 2021 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| A Predictable Active Queue Management to Reduce Sensitivity of RED Parameter | International | International Journal of Engineering &Technology | Dec, 2020 | Science Publishing Corporation, Dubai, UAE | Impact Factor: 0.00000Indexing: Article's Web Link: | ||
| Hiding data in dual color images reversibly via weighted matrix | International | Journal of Information Security and Applications,50,2020 | Jan, 2020 | Elsevier | Impact Factor: Indexing: Article's Web Link: | ||
| Robust Watermarking scheme for compressed image through DCT exploiting Superpixel and Arnold transform | International | Conference Proceeding | Jan, 2020 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| Multi-Sensor Tracking Simulator Design and its Challenges | International | Conference Proceeding | Jan, 2020 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| Weighted matrix based random data hiding scheme within a pair of interpolated image | International | Conference Proceeding | Jan, 2020 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| Multiple Radar Data Fusion to Improve the Accuracy in Position Measurement Basedon K-means Algorithm | International | Conference Proceeding | Jan, 2020 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| High Payload RDH Through Directional PVO Exploiting Center- Folding Strategy. | International | Conference Proceeding | Jan, 2020 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| A Robust Audio Authentication Scheme Using (11,7) Hamming Error Correcting Code. | International | Conference Proceeding | Jan, 2020 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| Authentication on Interpolated Sub-Sampled based Image Steganography Exploiting Secret Sharing. | International | Conference Proceeding | Jan, 2020 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| Center-Symmetric Local Binary Pattern-Based Image Authentication Using Local and Global Features Vector. | International | Advances in Intelligent Systems and Computing | Jan, 2020 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| Data Hiding Based on Decagon-Shaped Shell | International | Advances in Intelligent Systems and Computing | Jan, 2020 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| A New Repeated Pixel Value Difference-Based Steganographic Scheme with Overlapped Pixel | International | Intelligent Computing: Image Processing Based Applications, | Jan, 2020 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| Application of fuzzy programming techniques to solve solid transportation problem with additional constraints | International | Operations Research And Decisions | Jan, 2020 | Operations Research And Decisions | Impact Factor: Indexing: Article's Web Link: | ||
| Superpixel based Robust Reversible Data Hiding Scheme Exploiting Arnold Transform with DCT and CA | International | Journal of King Saud University - Computer and Information Sciences | Jan, 2020 | Elsevier | Impact Factor: Indexing: Article's Web Link: | ||
| Improved center-folding based directional pixel value ordering for reversible data hiding scheme | International | Multimedia Tools and Applications | Jan, 2020 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| Improved center folding based directional pixel value ordering for reversible data hiding scheme | International | Multimedia Tools and Applications | Jan, 2020 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| Application of random triangular and Gaussian type-2 fuzzy variable to solve fixed charge multi-item four-dimensional transportation problem | International | Applied Soft Computing | Jan, 2020 | Elsevier | Impact Factor: Indexing: Article's Web Link: | ||
| A Survey to Analyse Routing Algorithms for Opportunistic Network | International | Procedia Computer Science | Jan, 2020 | Elsevier | Impact Factor: Indexing: Article's Web Link: | ||
| A New Efficient Swarm-based Routing Protocol for MANET Exploiting DRAGONFLY with HONEY BEE | International | VCIPECH-2020 | Jan, 2020 | KIET Group of Institutions Ghaziabad | Impact Factor: Indexing: Article's Web Link: | ||
| A Method of Building Ontology Based Information knowledgebase | International | International Journal of Computer Sciences and Engineering (IJCSE), 7(1), Jan 2019 | Jan, 2019 | IJCSE, (UGC Approved) | Impact Factor: Indexing: Article's Web Link: | ||
| Pixel Value Ordering with Prediction Error Expansion Based High Fidelity Reversible Data Hiding Scheme | International | International Journal of Applied Engineering Research (IJAER), 14(4), (2019) pp. 998-1006 | Jan, 2019 | IJAER, (UGC Approved) | Impact Factor: Indexing: Article's Web Link: | ||
| Watermarking Scheme using LBP for Image Authentication and Tamper Detection through dual image | International | Security and Privacy, Wiley Online Library | Jan, 2019 | Wiley Online Library | Impact Factor: Indexing: Article's Web Link: | ||
| A robust reversible data hiding scheme for Color Image using Reed-Solomon Code | International | Multimedia Tools and Application (MTA), Springer, 2019 | Jan, 2019 | Springer, (IF-1.541) | Impact Factor: Indexing: Article's Web Link: | ||
| LFSR-based Multi-ant Cellular Automation and Chaotic Map based Image Encryption | International | Security and Privacy, Wiley Online Library, 1(6), e52 | Jan, 2019 | Wiley Online Library. | Impact Factor: Indexing: Article's Web Link: | ||
| A Novel Method for High Capacity Reversible Data Hiding Scheme Using Difference Expansion | International | International Journal of Natural Computing Research (IJNCR), IGI Global. | Jan, 2019 | IGI Global. | Impact Factor: Indexing: Article's Web Link: | ||
| Robust Watermarking Scheme for Tamper Detection and Authentication Exploiting Cellular Automata | International | IET Image Processing, IEEE, DOI: 10.1049/iet-ipr.2018.6638 | Jan, 2019 | IEEE | Impact Factor: Indexing: Article's Web Link: | ||
| Directional Pixel Value Ordering Based Secret Sharing Using Sub-Sampled Image Exploiting Lagrange Polynomial | International | DOI :10.1007/s42452-019-0659-1, SN Applied Sciences, Springer | Jan, 2019 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| FC 4D MITPs in Crisp and Rough Environments for Substitutable and Complementary Items with Budget Constraints | International | MDPI-mathematics. Mathematics 7, no. 3 (2019): 281, IF-1.105 (SCI Journal) | Jan, 2019 | MDPI | Impact Factor: Indexing: Article's Web Link: | ||
| Fake Image and News Detection on Social Media ThroughTrust-ware Based Community Portal | International | Conference Proceeding | Jan, 2019 | YSC-2019 | Impact Factor: Indexing: Article's Web Link: | ||
| Improved data hiding capacity through repeated embedding using modified weighted matrix for color image | International | International Journal of Computers and Applications (IJCA) | Jan, 2018 | Taylor and Francis | Impact Factor: Indexing: Article's Web Link: | ||
| Weighted matrix based reversible watermarking scheme using color image | International | Multimedia Tools and Application (MTA), Springer | Jan, 2018 | Springer (IF-1.530) | Impact Factor: Indexing: Article's Web Link: | ||
| Directional PVO for Reversible Data Hiding Scheme withImage Interpolation | International | Multimedia Tools and Application (MTA), Springer | Jan, 2018 | Springer (IF-1.530) | Impact Factor: Indexing: Article's Web Link: | ||
| Secured Steganographic Scheme For Highly Compressed Color Image Using Weighted Matrix Through DCT | International | International Journal of Computers and Applications (IJCA) | Jan, 2018 | Taylor & Francis | Impact Factor: Indexing: Article's Web Link: | ||
| Analysis of Factors and their Impacts in Measurement Accuracy and Prioritization of Radars | International | International Journal of Research and Analytical Reviews (IJRAR), 5(4), December 2018 | Jan, 2018 | IJRAR, (UGC Approved) | Impact Factor: Indexing: Article's Web Link: | ||
| Copy Move Forgery Detection through Graph Neighborhood Degree | International | International Journal of Applied Engineering Research (IJAER), 13(18), pp. 13421-13427 | Jan, 2018 | IJAER, (UGC Approved) | Impact Factor: Indexing: Article's Web Link: | ||
| Analysis of Factors and their Impacts in Measurement Accuracy and Prioritization of Radars | International | International Journal of Research and Analytical Reviews (IJRAR),, Vol-5, Issue-4, December 2018, pp- 548-554. (UGC Approved). | Jan, 2018 | IJRAR | Impact Factor: Indexing: Article's Web Link: | ||
| Reversible Data Hiding Scheme Using Sub-Sampled ImageExploiting Lagrange’s Interpolating Polynomial | International | Multimedia Tools and Application (MTA), Springer. | Jan, 2017 | Springer (IF-1.530) | Impact Factor: Indexing: Article's Web Link: | ||
| Reversible Watermarking Scheme Using PVD-DE | International | Proceedings of the International Conference at Calcutta Business School, Kolkata on March 24-25, 2017 | Jan, 2017 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| Extended Directional IPVO for Reversible Data Hiding Scheme | International | Proceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) was held in Haldia, India during November 2-3, 2017 | Jan, 2017 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| Representation and Exploring the Semantic Organization of Bangla Word in theMental Lexicon: Evidence from Cross-modal Priming Experiments and VectorSpace Model | International | Proceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) was held in Haldia, India during November 2-3, 2017 | Jan, 2017 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| High Capacity Reversible Data Hiding Scheme Using Dual Color Image through(7, 4) Hamming Code | International | Proceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) was held in Haldia, India during November 2-3, 2017 | Jan, 2017 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| Hamming code based watermarking scheme for Image Authentication andTampered detection | International | Proceedings of the 1st International Conference on Communication, Devices and Computing (ICCDC 2017) will be held in Haldia, India during November 2-3, 2017 | Jan, 2017 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| Exploring the semantic organization of Bangla words in the mental lexicon | International | Procedia Computer Science 115 (2017) 556–562 | Jan, 2017 | Procedia Computer Science , Elsevier | Impact Factor: Indexing: Article's Web Link: | ||
| High payload reversible data hiding scheme using weighted matrix | International | Optik -International Journal for Light and Electron Optics, 127(6), 3347-3358, http://dx.doi.org/10.1016/j.ijleo.2015.12.055 | Jan, 2016 | Elsevier (Impact Factor: 0.677) | Impact Factor: Indexing: Article's Web Link: | ||
| Dual-Image Based Reversible Data Hiding Scheme Using Pixel Value Difference Expansion | International | International Journal of Network Security, 18(04),633-643, DOI: 10.6633/IJNS.201607.18(4).04 | Jan, 2016 | IJNS | Impact Factor: Indexing: Article's Web Link: | ||
| Partial reversible data hiding scheme using (7, 4) hamming code | International | Multimedia Tools and Application, Springer, 1-16 | Jan, 2016 | Springer (IF-1.530) | Impact Factor: Indexing: Article's Web Link: | ||
| Dual Image Based Reversible Data Hiding Scheme Using (7,4) Hamming Code | International | Multimedia Tools and Application, Springer. 1-23 | Jan, 2016 | Springer (IF-1.530) | Impact Factor: Indexing: Article's Web Link: | ||
| Dual Image based Reversible Data Hiding Scheme Using Pixel Value Difference With Exploiting Modification Direction | International | Proceedings of the First International Conference on Intelligent Computing and Communication Volume 458 of the series Advances in Intelligent Systems and Computing, Pages 549-557 | Jan, 2016 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| Dual Image based Reversible Data Hiding Scheme using Weighted Matrix | International | Int. J. of Electronics and Information Engineering, Vol.5, No.1, PP.6-19, Sept. 2016, DOI: 10.6636/IJEIE.201609.5(1).02) | Jan, 2016 | IJEIE | Impact Factor: Indexing: Article's Web Link: | ||
| Hierarchical Visual Secret Sharing Scheme Using Steganography | International | Mathematics and Computing,Springer Proceedings in Mathematics & Statistics, Volume 139, pp 363-389, 2015 | Jan, 2015 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| An Efficient Weight Matrix based Reversible DataHiding Scheme | International | International Conference on Computers and Management (ICCM-2015), Jaipur (Rajasthan), India | Jan, 2015 | ACM | Impact Factor: Indexing: Article's Web Link: | ||
| An Efficient Data Hiding Scheme Using Hamming Error Correcting Code | International | Proceedings of the Sixth International Conference on Computer and Communication Technology (ICCCT '15), 2015, Pages 360-365. | Jan, 2015 | ACM digital library | Impact Factor: Indexing: Article's Web Link: | ||
| Reversible Data Hiding Through Hamming Code Using Dual Image | International | Proceedings of the International Congress on Information and Communication Technology, Volume 439 of the series Advances in Intelligent Systems and Computing, Pages 495-504 | Jan, 2015 | Springer (AISC). | Impact Factor: Indexing: Article's Web Link: | ||
| Dual Image Based Reversible Data Hiding Scheme Using Three Pixel Value Difference | International | Information Systems Design and Intelligent Applications Volume 434 of the series Advances in Intelligent Systems and Computing, Pages 403-412 | Jan, 2015 | AISC-Springer. | Impact Factor: Indexing: Article's Web Link: | ||
| Weighted Matrix Based Reversible Data Hiding Scheme Using Image Interpolation | International | Computational Intelligence in Data Mining—Volume 2 Volume 411 of the series Advances in Intelligent Systems and Computing pp 239-248 | Jan, 2015 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| Cheating Prevention in Hierarchical Visual Secret Sharing Scheme Using Weight Matrix-Based Steganography | International | Mathematical Sciences International Research Journal, Volume 3, No 2, ISSN-22788697, pp 796-799, 2014 | Jan, 2014 | International Multidisciplinary Research Foundation | Impact Factor: Indexing: Article's Web Link: | ||
| Survey on Size Invariant Visual Cryptography | International | International Journal of Computer Science and Information Technologies, Volume 5, No. 3, pp 3985-3990, ISSN-0975-9646, 2014 | Jan, 2014 | Tech Science Publications | Impact Factor: Indexing: Article's Web Link: | ||
| Cheating Prevention In Visual Cryptographic Schemes Using Message Embedding: A Hardware Based Practical Approach | International | Proceedings of International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT-2014), pp 319 – 324, DOI: 10.1109/ICICICT.2014.6781300, 2014 | Jan, 2014 | IEEE | Impact Factor: Indexing: Article's Web Link: | ||
| Survey on Cheating and Prevention Techniques in Visual Cryptography | International | Mathematical Sciences International Research Journal, 3(Special Issue), 961-976 | Jan, 2014 | IMRF | Impact Factor: Indexing: Article's Web Link: | ||
| Cheating Prevention in Hierarchical Visual Secret Sharing Scheme using weight matrix-based Steganography | International | Mathematical Sciences International Research Journal, 3(2), 796-799 | Jan, 2014 | IMRF | Impact Factor: Indexing: Article's Web Link: | ||
| Survey on Size Invariant Visual Cryptography | International | International Journal of Computer Science and Information Technologies, 5(3), 3985-3990 | Jan, 2014 | IJCST | Impact Factor: Indexing: Article's Web Link: | ||
| Key Distribution In Wireless Sensor Networks Using Quantum Cryptography | International | International Journal of Mobile & Adhoc Network, Volume 3 Issue- 4, pp 250-256, ISSN 2231–6825, 2013 | Jan, 2013 | International forum of researchers Students and Academician (IFRSA) | Impact Factor: Indexing: Article's Web Link: | ||
| Image Steganography based on Cellular Automata | International | International Journal of Pure and Applied Mathematics, Volume 83, No 5, pp 701-715, ISSN-1311-8080, 2013 | Jan, 2013 | Academic Publications | Impact Factor: Indexing: Article's Web Link: | ||
| Key Distribution in Wireless Sensor Networks using Quantum Cryptography | International | International Journal of Mobile & Adhoc Network, 3(4), 250-256. | Jan, 2013 | IJMAN | Impact Factor: Indexing: Article's Web Link: | ||
| New Image Noise Reduction Schemes Based on Cellular Automata | International | International Journal of Soft Computing and Engineering, Volume-2, Issue-2, pp 98-103, ISSN 2231-2707, 2012 | Jan, 2012 | Blue Eyes Intelligence Engineering & Sciences Publication | Impact Factor: Indexing: Article's Web Link: | ||
| Parity based Image Steganography using Cellular Automata | National | Proceedings of National Seminar on Emerging Trends in Mathematics | Jan, 2012 | Vidyasagar University In collaboration with Calcutta Mathematical Society, Midnapore-721102, West Bengal | Impact Factor: Indexing: Article's Web Link: | ||
| Automatic Pitman Shorthand Script Recognition Using Fuzzy Rule Based Technique | National | ” National Seminar On Recent Trends in Advanced Computing Organized by the Department of Computer Science Vidyasagar University. | Jan, 2012 | Department of Computer Science Vidyasagar University. | Impact Factor: Indexing: Article's Web Link: | ||
| Cellular Automata for Image noise reduction using Neighbor pixel | National | Advanced Communication Systems and Design Techniques (NCACD-2011), pp. 130-137. | Jan, 2011 | Conference Proceeding, Department of ECE, Haldia Institute of Technology, Haldia | Impact Factor: Indexing: Article's Web Link: | ||
| Text Classifiers and Performance Issues | National | Conference Proceeding of National Seminar on Data Mining & Decision Support, pp.51-59,Computer Centre, Vidyasagar University, Midnapore-721102. | Jan, 2010 | Computer Centre, Vidyasagar University. | Impact Factor: Indexing: Article's Web Link: | ||
| A Cryptosystem For Encryption and Decryption of Long Confidential Message | International | Information Security and Assurance Communications in Computer and Information Science, Springer, Volume 76, pp 86-96, 2010 | Jan, 2010 | Springer | Impact Factor: Indexing: Article's Web Link: | ||
| Object Extraction Using Novel Region Merging and Multidimensional Features | International | Fourth Pacific-Rim Symposium on Image and Video Technology (PSIVT), pp 356 – 361, Print ISBN: 978-1-4244-8890-2 , DOI: 10.1109/PSIVT.2010.66, 2010 | Jan, 2010 | IEEE | Impact Factor: Indexing: Article's Web Link: | ||
| An Extension of Nave Bayes Classifier using Frequent Closed Item sets | National | Two days National Conference on “Ubiquitous Computing 2009”, Organized by R&D Cell of Guru Nanak Institute of Technology, 157/F, Nilgunj Road, Panihati, Sodpur, Kolkata-700114 | Jan, 2009 | GNIT, Sodpur, Kolkata | Impact Factor: Indexing: Article's Web Link: | ||
| Expression and Pose Variant Face Image Identification Under Different Illumination Condition Using EBGM | National | Two days National Conference on “Ubiquitous Computing 2009”, Organized by R&D Cell of Guru Nanak Institute of Technology, 157/F, Nilgunj Road, Panihati, Sodpur, Kolkata-700114 | Jan, 2009 | GNIT, Sodpur, Kolkata | Impact Factor: Indexing: Article's Web Link: | ||
| Recognition Of Partially Occluded, Expression Variant Faces Using Elastic Bunch Graph Matching | International | Proceedings of 1st IEEE-International Conference on Signal and Image Processing (IEEE-ICSIP-06), 2006 | Jan, 2006 | IEEE | Impact Factor: Indexing: Article's Web Link: | ||
| A Scheme To Improve The Security Using Diffie-Helmann’s Key Distribution Scheme Coupling With RSA Algorithm | National | National Conference on Broad Band Integrated Digital Systems And Networks -2005, NIEC, Shatri Park, New Delhi-110053 | Jan, 2005 | NIEC, New Delhi. | Impact Factor: Indexing: Article's Web Link: | ||
| A Hybrid System for Mood Recognition of Face Images using DS Theory and Fuzzy Logic | Other | Proceedings of the Workshop on Multimedia System & Communication, ISM, Dhanbad. | Jan, 2004 | ISM, Dhanbad | Impact Factor: Indexing: Article's Web Link: |
Book Published
Book Chapter Published
Ph. D. Thesis Guidance
| Scholar Name | Thesis Title | Name of the Co Supervisor | Status | Date |
|---|---|---|---|---|
| Jayshankar Bharti | Tracking Radar Bias Exstimation in Test Range Scenario | NA | Ongoing | Dec, 2025 |
| Payel Guria | Study of Robust Image Watermarking Scheme in Composite Domain | NA | Ongoing | Dec, 2025 |
| Sudip Meikap | Development of Pixel Value Ordering (PVO) Based Data Hiding Techniques | NA | Ongoing | Aug, 2025 |
| Debasish Patra | Learning Based Approach for Detectionof Fake News and Images | NA | Ongoing | Apr, 2025 |
| Debkumar Bera | Design and Analysis of Data Hiding Techniques for Encrypted Images | NA | Ongoing | Apr, 2025 |
| Alok Halder | Development of Data Hiding Techniquesfor Intellectual Property Rights (IPR) | NA | Ongoing | Apr, 2025 |
| Prasenjit Bera | Analysis and Measures of Fake News Detection for Social Media | NA | Ongoing | Apr, 2025 |
| Prabhash Kumar Singh | Design and Analysis of Robust Data Hiding Protocols for Multimedia Security | Dr. Kakali Datta | Awarded | May, 2023 |
| Partha Chowdhuri | Design and Analysis of Image Steganographic Protocol | Dr. Debasis Giri, MAKAUT | Awarded | Jan, 2021 |
| Soamdeep Singha | Design of An Effective Congestion Control Routing Protocol forMobile-Ad-Hoc Network | Dr. Niranjan Kumar Mandal | Awarded | Jan, 2021 |
| Sourav Kaity | Prioritization of Multi-Sensor Tracked Data | Dr. P K Das Gupta, DRDO | Awarded | Jan, 2021 |
| Pabitra Pal | Design of Reversible Watermarking Techniques in Spatial Domain | Dr. Jaydeb Bhaumik, JU | Awarded | Jan, 2020 |
Research Project
| Worked as | Funding Agency | Amount in Rs. | Duration | Period | Status |
|---|---|---|---|---|---|
| Principal Investigator | Incubation Centre, Vidyasagar University | 20000 | 1 year | 2024-2025 | Complete |
| Principal Investigator | Incubation Centre, Vidyasagar University | 10000 | 6 months | 2023-2023 | Complete |
| Principal Investigator | SERB | 2024020 | 3 years | 2019-2022 | Complete |
| Principal Investigator | UGC | 125000 | 2 years | 2015-2017 | Complete |
| Co- Investigator | UGC | 62000 | 2 years | 2015-2017 | Complete |
Invited Lectures
| Title | Organized By | Venue | Date |
|---|---|---|---|
| Office Automata With AI | Belda College | Belda College | Sep, 2025 |
| The Holistic Approach of AI and Data Science | DAITM, Garia | DAITM, Garia | Jun, 2025 |
| Hands-on training about google docs in a seminar | Vidyasagar University, Midnapore | Vidyasagar University, Midnapore | May, 2025 |
| Deliver a lecture at KD College, Midnapore | Kaibalyadayini College of Commerce & General Studies, Midnapore | Kaibalyadayini College of Commerce & General Studies, Midnapore | May, 2025 |
| Special Lecture on Artificial Intelligence | Balia School, Garia | Balia School, Garia | May, 2025 |
| Application of AI and Machine Learning in 2nd ETSA | Belda College, Midnapore | Belda College, Midnapore | Apr, 2025 |
| International Conference on Computing Technologies in Emerging Areas | The Department of Cyber Science and Technology, Brainware University, Kolkata | The Department of Cyber Science and Technology, Brainware University, Kolkata | Apr, 2025 |
| Invited Lecture | Silda Chandra Sekhar Mahavidyalaya | Silda Chandra Sekhar Mahavidyalaya | Apr, 2025 |
| Invited Lecture | Bajkul Milani Mahavidyalaya, Bajkul | Bajkul Milani Mahavidyalaya, Bajkul | Apr, 2025 |
| Invited Lecture | Garhbeta College, Garhbeta | Garhbeta College, Garhbeta | Mar, 2025 |
| Invited Lecture | Ghatal Rabindra Satabarsiki Mahavidyalaya, Ghatal | Ghatal Rabindra Satabarsiki Mahavidyalaya, Ghatal | Feb, 2025 |
| Invited Lecture | Belda College, Midnapore | Belda College, Midnapore | Feb, 2025 |
| Emerging Trends on Computing & Management | Dinabandhu Andrews Institute of Technology & Management, Kolkata | Dinabandhu Andrews Institute of Technology & Management, Kolkata | Feb, 2025 |
| Conducted and Awareness Lecture | Vidyasagar University, Department of Computer Science | Vidyasagar University, Department of Computer Science | Dec, 2024 |
| Invited Lecturer on Writing 2.0 | Vidyasagar Institute of Health, Midnapore | Vidyasagar Institute of Health, Midnapore | Dec, 2024 |
| Keynote speaker on AI for Education | International Conference on Multidisciplinary approach on AI | Kolkata Girls College, Kolkata | Dec, 2024 |
| Participated and Presented Project | Vidyasagar University, Midnapore, West Bengal | Vidyasagar University, Midnapore, West Bengal | Dec, 2024 |
| Keynote Speaker | AISECT, Kolkata | AISECT, Kolkata | Dec, 2024 |
| AI and ChatGpt | SAAMS, Midnapore | SAAMS, Midnapore | Nov, 2024 |
| AI for education and Research | Jagannath Kishore College, Purulia | Jagannath Kishore College, Purulia | Oct, 2024 |
| Invited Lecture and Act as Guest at Jamunabali School | Jamunabali School | Jamunabali School | Oct, 2024 |
| Writing 2.0 | Y S Palpara College | Y S Palpara College | Aug, 2024 |
| Transforming Higher Education through AI | Sonamukhi College, Bankura, West Bengal, India | Sonamukhi College, Bankura, West Bengal, India | Jun, 2024 |
| Awareness of Technology | Department of Computer Science, | Department of Computer Science | Jun, 2024 |
| Role of Vocational Education and Entrepreneurs hip Education | NCSDE at Senses Hotel, DN 26, DN Block, Street No | NCSDE at Senses Hotel, DN 26, DN Block, Street No | May, 2024 |
| AI in School Education | Raja N L K Women's College, Paschim Midnapore, West Bengal, India. | Raja N L K Women's College, Paschim Midnapore, West Bengal, India. | May, 2024 |
| Why should you study Computer Science | Vidyasagar Shishu Niketan (VSN) English Medium School, Paschim Midnapore, West Bengal, India. | Vidyasagar Shishu Niketan (VSN) English Medium School, Paschim Midnapore, West Bengal, India. | May, 2024 |
| Why should you study Computer Science | Ghatal Rabindra Satabarsiki Mahavidyalaya, Kushpata, Ghatal, Paschim Medinipur, | Ghatal Rabindra Satabarsiki Mahavidyalaya, Kushpata, Ghatal, Paschim Medinipur, | Apr, 2024 |
| AI for Research Scholar | Computer Centre, Vidyasagar University, Paschim Midnapore, West Bengal, India. | Computer Centre, Vidyasagar University, Paschim Midnapore, West Bengal, India. | Apr, 2024 |
| AI in Education | Department of Computer Applications, Global Institute of Science | Department of Computer Applications, Global Institute of Science | Apr, 2024 |
| Cutting-edge Innovations in Computer Science & Mathematics for Technological Solutions | Department of Computer Science and Mathematics In Collaboration with Internal Quality Assurance Cell | Department of Computer Science and Mathematics In Collaboration with Internal Quality Assurance Cell | Apr, 2024 |
| AI in Education | Dinabandhu Andrews Institute of Technology and Management - (DAITM), Kolkata, West Bengal, India | Dinabandhu Andrews Institute of Technology and Management - (DAITM), Kolkata, West Bengal, India | Mar, 2024 |
| Advanced Computation, Algorithm, and Security | Department of Computer Science, Vidyasagar University | Department of Computer Science, Vidyasagar University | Mar, 2024 |
| Empowering Education AI Integration in Teaching Learning | Computer Centre in collaboration with IQAC Vidyasagar University Paschim Midnapore | Vidyasagar University | Feb, 2024 |
| AI in Education | Ramakrishna Mission Vivekananda Centenary College, Rahara, Kolkata, West Bengal India. | Ramakrishna Mission Vivekananda Centenary College, Rahara, Kolkata, West Bengal India. | Jan, 2024 |
| Artificial Intelligence (AI) Tools and Technology | Vivekananda Mission Mahavidyalaya, Purba Midnapore, West Bengal India. | Vivekananda Mission Mahavidyalaya, Purba Midnapore, West Bengal India. | Jan, 2024 |
| AI in Education | Invited talk as a Speaker in the Faculty Development Programme (FDP) in AI in Education | Debra Thana S.K.S. Mahavidyalaya, Chakshyampur, Debra, Paschim Medinipur-721124, West Bengal, India. | Jan, 2024 |
| Importance of Mathematics and Computing for All Round Development Nation Themed Create Compute and Deliver | Invitation a member of Panel Discussion on 10th International Conference on Mathematics and Computing ICMC | Kalasalingam Academy of Research and Education Krishnankoil SrivilliputhurTamil Nadu-626126 India | Jan, 2024 |
| Computer Security | Invited Lecture one- week Faculty Development Program (FDP) on Frontiers in Scientific Computing | Raja N L K Women's College, Midnapore, West Bengal, India | Aug, 2023 |
| NEP and NAAC Accreditation Process. | Invited Lecture on NAAC Orientation Program. | Dinabandhu Andrews Institute of Technology and Management - (DAITM), Kolkata, West Bengal, India | Aug, 2023 |
| Invited Lecture NAAC Orientation Program | DAITM, Kolkata. | DAITM, Kolkata. | Aug, 2023 |
| Cyber Security | National Webinar on Cyber Security | Department of Computer Science, Kharagpur College | Jun, 2023 |
| Role of ICT in perspective of NEP 2020 | IQAC Rishi Aurobindo Institute Of Teacher | IQAC Rishi Aurobindo Institute Of Teacher | Apr, 2023 |
| Inaugural Speech Capacity Building Program 2022 | DAV CAE Regional Training Center | West Bengal Zone | Dec, 2022 |
| Inaugural Speech on days Online Training Programme on Amazon Web Service and Selenium Basic | YS Palpara Mahavidyalaya | Y.S. Palpara Mahavidyalaya | Dec, 2022 |
| Study of Computer Science and Its Application in Various Field | Department of Computer Science, Ghatal Rabindra Satabarsiki Mahavidyalaya | Department of Computer Science, Ghatal Rabindra Satabarsiki Mahavidyalaya | Sep, 2022 |
| Digital Watermarking | Department of BCA, Debra Thana Sahid Kshudiram smriti Mahavidyalaya | Department of BCA, Debra Thana Sahid Kshudiram smriti Mahavidyalaya | Jun, 2022 |
| Dual Image Authentication | One Week FDP on Image Authentication, WSN & IoT organised by JIS College of Engineering, West Bengal | Webinar | Jan, 2020 |
| Steganography: an art of hidden communication | Department of Mathematics and Computer Science, Mahishadal Raj College. | Mahishadal Raj College, Purba Midnapore | Jan, 2020 |
| Watermarking Schemes | Egra SSB College, Paschim Medinipur | Egra SSB College, Paschim Medinipur | Jan, 2020 |
| Reversible Data Hiding Schemes | Department of Computer Applications, Sikkim University, Gangtok, Sikkim, India | Sikkim University, Gangtok, Sikkim, India | Jan, 2020 |
| MATLAB and its Applications | Department of Mathematics, Kharagpur College, WB, India | Kharagpur College, WB, India | Jan, 2020 |
| Machine Learning and Its Trending Applications | Department of Computer Science and Application, Hijli College, Kharagpur, Paschim Medinipur WB | Kharagpur, Paschim Medinipur WB | Jan, 2020 |
| Machine Learning and Steganography | Department of Computer Science and BCA Kharagpur College, WB, India | Kharagpur College, WB, India | Jan, 2020 |
| Changing Times and New Classrooms | Organized by the WBCUPA, South 24 PGS | WBCUPA, South 24 PGS | Jan, 2020 |
| Emerging Need of Digital Education in the Context of Covid -19 Pandemic | Organized by the Department of BCA, Garhbeta College, WB | Garhbeta College, WB | Jan, 2020 |
| Multimedia Security | Sikkim University, Gangtok, Sikkim, India | Sikkim University, Gangtok, Sikkim, India | Jan, 2020 |
| Steganography -An Art of Hidden Communication | Guru Nanak Institute Of Technology (GNIT) Kolkata | Kolkata | Jan, 2020 |
| Image Steganography- An art of hidden communication | Department of Computer and Information Science (DCIS), Raiganj University, West Bengal, Raiganj | Raiganj University, West Bengal, Raiganj | Jan, 2019 |
| Secure Reversible Data Hiding Approach | The Department of Computer Science, Belda College, Midnapore, West Bengal, India | Belda College, Midnapore, West Bengal, India | Jan, 2019 |
| Steganography-an art of Hidden Communication | Department of BCA, Silda Chandra Sekhar College, Silda, West Bengal, India. | Silda Chandra Sekhar College, Silda. | Jan, 2019 |
| Steganography: an art of hidden communication | Department of Computer Science and BCA, Belda College, Paschim Medinipur | Belda College, Paschim Medinipur | Jan, 2019 |
| Cyber Security used in Asian Business | BIBS, Kolkata with Vidyasagar University at Dubai, United Arab Emirates | Dubai, United Arab Emirates | Jan, 2019 |
| Data Hiding Schemes | Silda Chandra Sekhar Colleg, Silda, Jhargram, West Bengal | Silda, Jhargram, West Bengal | Jan, 2019 |
| Fake Image and News Detection on Social Media Through Trust-ware Based Community Portal | Biswa Bangla Convention Center, Kolkata | Biswa Bangla Convention Center, Kolkata | Jan, 2019 |
| Special lecture on “Steganography –An art of hidden communication” | Bangabasi Morning College, 19, Rajkumar Chakraborty Sarani, Kolkata- 700009 on 19th November 2016. | Bangabasi Morning College | Jan, 2016 |
| Steganography-an art of hidden communication | Department of Computer Science and Application, Hijli College, Midnapore-721306 | Hijli College | Jan, 2015 |
| Emerging Trend on Computer Science | Department of Computer Science, Belda College, Belda, Paschim Midnapore, West Bengal | Belda College | Jan, 2014 |
| C Language and its Applications | Department of Mathematics, Kharagpur College, Inda, Kharagpur, Paschim Medinipur, West Bengal, India | Kharagpur College | Jan, 2012 |
| Call Admission Control in Mobile Cellular Network | Department of Computer Science, Vivekananda Mission Mahavidyalaya , Chaitanyapur, Purba Medinipur, Pin-721645 West Bengal | Vivekananda Mission Mahavidyalaya | Jan, 2009 |
Membership of Learned Society
| Title/Name of the Society |
|---|
| Computer Society of India (CSI), Membership No. I1510360 |
Association with Professional Bodies
| Type of Professional Activity | Period |
|---|---|
| Transactions on Emerging Telecommunications Technologies | 2024 to 2025 |
| IETE Journal of Research | 2024 to 2025 |
| IEEE Transactions on Circuits and Systems for Video Technology, | 2024 to 2025 |
| Reviewer of the International Journal , IETE Technical Review | 2018 to 2019 |
| Reviewer of Engineering Science and Technology, an International Journal, Elsevier, | 2018 to 2019 |
| Reviewer of “2nd International Conference on Information Technology and Applied Mathematics (ICITAM 2019)” is going to be a premier conference which is being organized during March 07-09, 2019 at Haldia Institute of Technology, India. ICITAM 2019” | 2018 to 2019 |
| Reviewer of “IEEE Access -Multidisciplinary Open Access Journal” IEEE, IF- 3.557 | 2018 to 2019 |
| Reviewer of The Visual Computer, International Journal of Computer Graphics, Springer (IF-1.036) | 2018 to 2019 |
| Reviewer of Future Generation Computer Systems, The International Journal, Elsevier, (IF-4.639) | 2018 to 2019 |
| Reviewer of “CICBA 2018” Kalyani Government Engineering College, Kalyani, West Bengal, India on July 27-28, 2018” | 2018 to 2018 |
| Reviewer of “Optik- International Journal for Light and Electron Optics”- Elsevier, IF- 1.191 | 2018 to 2018 |
| Reviewer of “1st International Conference on Contemporary Advances in Innovative & Applicable Information Technology (ICCAIAIT-2018)” Organized by Kingston Educational Institute, Berunanpukuria, Barasat, Kolkata-7000126, March 24-25, 2018 | 2018 to 2018 |
| Technical Program Committee Member of the “Online Conference on Green Communication, Network and Systems (OGCNS-2018)”, July 7, 2018, India. | 2017 to 2017 |
| Technical Program Committee Member of the “International Conference on Information Technology and Applied Mathematics (ICITAM 2017)” October 30-Nvember 01, 2017 at Haldia Institute of Technology, India. | 2017 to 2017 |
| 11. Reviewer of “CSI2017 (International Conference on Social Transformation - Digital Way)” – 19-21 January, 2018, Kolkata. | 2017 to 2017 |
| Reviewer of “International Conference on Computer, Electrical & Communication Engineering (ICCECE-2017)” 16-17, December-2106, Techno India University, Kolkata, West Bengal India. | 2016 to 2017 |
| Reviewer of the International Conference on Intelligent Computing and Communication (ICIC2-2016), February 18-19, 2016, Organized by the Faculty of Engineering, Management and Technology, University of Kalyani, West Bengal, India | 2016 to 2016 |
| Reviewer of the International Journal of Security and Communication Networks, Hindawi Publishing Corporation. | 2016 to 2016 |
| Reviewer of the International Journal of Network Security (IJNS),ISSN 1816-353X (Print), ISSN 1816-3548 (Online), Impact Factor: 1.3921 | 2015 to 2015 |
| Technical Committee Member, International Symposium on Advanced Computing and Communication(ISACC)-2015 which was held on 14-15 September,2015 in the Department of Computer Science and Engineering,Assam University, Silchar, Assam, India. | 2015 to 2015 |
Conference /Seminar/Workshop Attended
| Title of the Seminar/Conference/Workshop | Date | Role | Held at and Organiser |
|---|---|---|---|
| International Conference on Politics, Trade and Business in Asia-The 21st Century | Jan, 2019 | Paper Presenter | Dubai, United Arab Emirates |
| International Conference On Computational Intelligence In Pattern Recognition (CIPR 2019) | Jan, 2019 | Paper Presenter | Indian Institute Of Engineering Science And Technology, Shibpur, 19th-20th January 2019. |
| Young Scientists’ Conference, A part of India International Science Festival -2019. | Jan, 2019 | Paper Presenter | Biswa Bangla Convention Centre, Kolkata, West Bengal, India. |
| International Conference on Innovations in Computer Science, (ICICS-2018) | Jan, 2018 | Author | The Department of Computer Science, The University of Burdwan, West Bengal, India |
| International Conference on Communication, Devices, and Computing (ICCDC 2017) | Jan, 2017 | Author | Haldia, India during November 2-3, 2017. |
| Third International Conference on Computing and Systems (ICCS - 2016), January 21-22, 2016 | Jan, 2016 | Paper Presenter | Department of Computer Science, The University of Burdwan, Burdwan, West Bengal, India |
| First International Conference on “Intelligent Computing and Communication (ICIC2-2016)”, February 18-19, 2016 | Jan, 2016 | Paper Presenter | University of Kalyani, West Bengal, India |
| International Conference on Computer and Management (ICCM - 2015), December 16-17, 2015 | Jan, 2015 | Paper Presenter | Organized by the Center for Global Management, California State University, USA and International Association of Academicians (IAASSE), Jaipur, Rajasthan, India |
| International Conference on Mathematics and Computing (ICMC – 2015) | Jan, 2015 | Paper Presenter | Haldia Institute of Technology ICARE Complex, HIT Campus, Hatiberia, Haldia Purba Medinipur, West Bengal – 721657, India, January 05-10, 2015 |
| National Seminar on Information Technology-2015 | Jan, 2015 | Resource Person | Department of Computer Science and Application, Hijli College, Midnapore-721306 on 7/10/2015 |
| IMRF Overseas Conference | Jan, 2014 | Paper Presenter | IMRF at Thailand, Hotel DVaree, Jomtien Beach Road, Pattya City, Chonburi,Thailand-20260 |
| Workshop on Algorithms | Jan, 2014 | Participated | Department of Information Technology, National Institute of Technology Durgapur, during 22nd -26th January, 2014. |
| International Conference on Mathematical Sciences – 2014 | Jan, 2014 | Paper Presenter | School of Mathematics, Madurai Kamaraj University, Madurai, Tamil Nadu, India |
| International Conference on Issues and Challenges in Intelligent Computing Techniques (ICICT-2014) | Jan, 2014 | Paper Presenter | Krishna Institute of Engineering & Technology, Ghaziabad, India |
| Use of ICT in Teaching –Learning process | Jan, 2014 | Participated | National Institute of Technical Teacher’s Training and Research (NITTTR) Kolkata-700106 from 04th August 2014 to 08th August 2014 |
| Two days Zonal Seminar on “ ICT in Present Wireless Revolution: Challenges and Issues” | Jan, 2013 | Paper Presenter | The IETE, Kolkata Centre, Saltlake, Kolkata, west Bengal, India |
| International Conference on Mathematics and Computing(ICMC – 2013) | Jan, 2013 | Participated | Haldia Institute of Technology ICARE Complex, HIT Campus, Hatiberia, Haldia Purba Medinipur, West Bengal – 721657, India |
| Three days State Level Work Shop on” C Language and its Applications” | Jan, 2012 | Invited Speaker | Department of Mathematics, Kharagpur College, Inda, Kharagpur, Paschim Medinipur, West Bengal, India |
| National Seminar on Emerging Trends in Mathematics | Jan, 2012 | Participant | Vidyasagar University In collaboration with Calcutta Mathematical Society, Midnapore-721102, West Bengal |
| National Conference on Recent Trends in Mathematical Sciences and Their Applications( NCRTMSA-2012) | Jan, 2012 | Paper Presenter | Faculty of Engineering & Technology, Mody Institute of Technology & Science, Lakshmangarh-332311, Sikar, Rajasthan, India |
| National Conference on Advanced Communication Systems and Design Techniques (NCACD) , November 5-6, 2011. | Jan, 2011 | Participant | Department of Electronics and Communication Engineering HALDIA INSTITUTE OF TECHNOLOGY, Haldia, Purba Medinipur, West Bengal PIN: 721657, India |
| The International Conference on Information Security and Assurance [ISA-2010] , June 23 - 25, 2010. | Jan, 2010 | Paper Presenter | Sheraton Grande Ocean Resort, Miyazaki, Japan |
| State Level Seminar on “ Call Admission Control in Mobile Cellular Network” , 15th January, 2009. | Jan, 2009 | Invited Speaker. | Deaprtment of Computer Science, Vivekananda Mission Mahavidyalaya , Chaitanyapur, Purba Medinipur, Pin-721645 West Bengal. |
| Workshop on “ Researching Distance and Online Learning “ October 03-05, 2007. | Jan, 2007 | Participant | IGNOU Regional Centre, Bhubaneswar & STRIDE, IGNOU, New Delhi. At IGNOU Regional Centre, Bhubaneswar. |
| 1st IEEE-International Conference on Signal and Image Processing (IEEE-ICSIP-06), | Jan, 2006 | Paper Presenter | B V Bhoomaraddi College of Engineering and Technology, Hubli, Karnataka, India |
| Eastern Regional Students Convention , CSI-2002. | Jan, 2002 | Participant | Computer Society of India (CSI), Kolkata Chapter |
| International Workshop on Distributed Computing | Jan, 2001 | Participant | Department of Computer Science & Engineering , Calcutta University |
Conference /Seminar/Workshop Organised
| Title of the Seminar/Conference/Workshop | Date | Role in the Event | Funding Agency |
|---|---|---|---|
| 3rd National Seminar on Advanced Computation, Algorithm and Security (ACAS-2K18), 29th March, 2018, Organized by the Department of Computer Science, Vidyasagar University | Jan, 2018 | Member of Organizing Committe | UGC |
| 2nd National Seminar on Advanced Computation, Algorithm and Security (ACAS-2K17), 30th March, 2017, Organized by the Department of Computer Science, Vidyasagar University | Jan, 2017 | Member of Organizing Committe | UGC |
| National Seminar on Advanced Computation, Algorithm and Security (ACAS-2K16), 29th – 30th March, 2016, Organized by the Department of Computer Science, Vidyasagar University | Jan, 2016 | Joint Organizing Secretary | UGC |
| UGC Sponsored National Seminar on Emerging Trends in Mathematics Organised by Vidyasagar University In collaboration with Calcutta Mathematical Society, Midnapore-721102, West Bengal | Jan, 2012 | Member of Organizing Committee | UGC |
| National Seminar On Recent Trends in Advanced Computing Organized by Department of Computer Science, Vidyasagar University | Jan, 2012 | Organizing Secretary | UGC |
| Workshop on .(DOT) Net Technology Organized by Department of Computer Science, Vidyasagar University, February 15-19, 2010. | Jan, 2010 | Joint Secretary | UGC |
| National Seminar on Data Mining & Decision Support Organized by Computer Centre, Vidyasagar University, March 4-5, 2010. | Jan, 2010 | Member of Organizing Committee | UGC |
| National Seminar On Next Generation Computing Organized by Department of Computer Science, Vidyasagar University, March 30-31st , 2010. | Jan, 2010 | Joint Secretary | UGC |
| National Seminar on Image Classification & Pattern Recognition Organized by Department of Computer Science, Vidyasagar University, 26-27th March, 2009. | Jan, 2009 | Organizing Secretary | UGC |
Awards
| Award Name | Awarded by | Date |
|---|---|---|
| Research and Publication Award | Vidyasagar University | May, 2024 |
| Research and Publication Award | Vidyasagar University | May, 2023 |
| Research and Publication Award | Vidyasagar University | May, 2022 |
| Research and Publication Award | Vidyasagar University | May, 2021 |
| Best Paper Award, in The International Conference at Calcutta Business School, Kolkata on March 24-25, 2017 | Springer | Jan, 2017 |