Souradeep Mukhopadhyay
Jadavpur University
Followers: 0 Following: 0
Souradeep Mukhopadhyay is currently studying in Jadavpur University CSE UG 2. He is interested at Machine Learning, Image and video Processing, Optimization and Steganography. He is KVPY SX scholar.
Statistics
RANK
62,152
of 295,527
REPUTATION
0
CONTRIBUTIONS
0 Questions
5 Answers
ANSWER ACCEPTANCE
0.00%
VOTES RECEIVED
0
RANK
11,581 of 20,242
REPUTATION
38
AVERAGE RATING
0.00
CONTRIBUTIONS
3 Files
DOWNLOADS
7
ALL TIME DOWNLOADS
362
RANK
of 154,057
CONTRIBUTIONS
0 Problems
0 Solutions
SCORE
0
NUMBER OF BADGES
0
CONTRIBUTIONS
0 Posts
CONTRIBUTIONS
0 Public Channels
AVERAGE RATING
CONTRIBUTIONS
0 Highlights
AVERAGE NO. OF LIKES
Feeds
Submitted
Secured Image Steganography based on Catalan Transform
Secured Image Steganography based on Catalan Transform. It is accepted in Multimedia Tools and Applications, Springer. (21st Dec...
4 years ago | 1 download |
Submitted
Exploiting Laguerre Transform in Image Steganography
New Steganography Algorithm developed using Laguerre Transform
4 years ago | 1 download |
How to make Laguerre Transform
https://in.mathworks.com/matlabcentral/fileexchange/79409-exploiting-laguerre-transform-in-image-steganography
4 years ago | 0
How to Use arrayfun with a Multivariate Function of n Variables?
You should make 3 different X arrays here X1, X2, X3 and then pass the 3 arrays in function 3 times to compute y 3 times.
4 years ago | 0
Inverse Laplace transform with Bessel function
You can find something from this link:"https://in.mathworks.com/matlabcentral/answers/366374-problem-computing-inverse-laplace-t...
4 years ago | 0
MATLAB code for a steganographic method based on integer wavelet transform and genetic algorithm
You can use integer transform based steganography https://in.mathworks.com/matlabcentral/fileexchange/78751-image-steganography...
4 years ago | 0
Image Steganography using LSB?
% Clear the existing workspace clear all; % Clear the command window clc; % Read the input image input = imread('p...
4 years ago | 0
Submitted
Image Steganography-using-Lah-Transform
Application of Lah transform for security and privacy of data through information hiding in telecommunication
4 years ago | 5 downloads |