Souradeep Mukhopadhyay
Jadavpur University
Souradeep Mukhopadhyay is currently studying in Jadavpur University CSE UG 2. He is interested at Machine Learning, Image and video Processing, Optimization and Steganography. He is KVPY SX scholar.
Statistics
RANK
255 089
of 288 870
REPUTATION
0
CONTRIBUTIONS
0 Questions
5 Answers
ANSWER ACCEPTANCE
0.00%
VOTES RECEIVED
0
RANK
11 617 of 19 494
REPUTATION
35
AVERAGE RATING
0.00
CONTRIBUTIONS
3 Files
DOWNLOADS
9
ALL TIME DOWNLOADS
332
RANK
of 143 071
CONTRIBUTIONS
0 Problems
0 Solutions
SCORE
0
NUMBER OF BADGES
0
CONTRIBUTIONS
0 Posts
CONTRIBUTIONS
0 Public Channels
AVERAGE RATING
CONTRIBUTIONS
0 Highlights
AVERAGE NO. OF LIKES
Content Feed
Submitted
Secured Image Steganography based on Catalan Transform
Secured Image Steganography based on Catalan Transform. It is accepted in Multimedia Tools and Applications, Springer. (21st Dec...
ungefär 3 år ago | 1 download |
Submitted
Exploiting Laguerre Transform in Image Steganography
New Steganography Algorithm developed using Laguerre Transform
ungefär 3 år ago | 4 downloads |
How to make Laguerre Transform
https://in.mathworks.com/matlabcentral/fileexchange/79409-exploiting-laguerre-transform-in-image-steganography
mer än 3 år ago | 0
How to Use arrayfun with a Multivariate Function of n Variables?
You should make 3 different X arrays here X1, X2, X3 and then pass the 3 arrays in function 3 times to compute y 3 times.
mer än 3 år ago | 0
Inverse Laplace transform with Bessel function
You can find something from this link:"https://in.mathworks.com/matlabcentral/answers/366374-problem-computing-inverse-laplace-t...
mer än 3 år ago | 0
MATLAB code for a steganographic method based on integer wavelet transform and genetic algorithm
You can use integer transform based steganography https://in.mathworks.com/matlabcentral/fileexchange/78751-image-steganography...
mer än 3 år ago | 0
Image Steganography using LSB?
% Clear the existing workspace clear all; % Clear the command window clc; % Read the input image input = imread('p...
mer än 3 år ago | 0
Submitted
Image Steganography-using-Lah-Transform
Application of Lah transform for security and privacy of data through information hiding in telecommunication
nästan 4 år ago | 4 downloads |