Title | Published in | Year | Published by |
Achieving Lossless Audio Encoder through integrated approaches of Wavelet Transform, Quantization and Huffman encoding (LAEIWQH) | International Conference on Computer Science, Engineering and Applications (ICCSEA) | 2020 | IEEE |
Deep Learning-Based Lossless Audio Encoder (DLLAE) | Advances in Intelligent Systems and Computing book series (AISC, volume 1157), https://doi.org/10.1007/978-981-15-4288-6_6 | 2020 | Springer, Singapore |
Developing a Dynamic Cluster Quantization based Lossless Audio Compression (DCQLAC) | Multimedia Tools and Applications, https://doi.org/10.1007/s11042-020-09886-3, IF: 2.313 | 2020 | Springer |
A Novel Approach to Lossless Audio Compression (LAC) | 52nd Annual Convention of Computer Society of India (CSI-2017), CCIS Series of Springer | 2018 | CSI, Calcutta |
Achieving lossless compression of audio by encoding its constitutedcomponents (LCAEC) | Innovations in Systems and Software Engineering (A NASA Journal)https://doi.org/10.1007/s11334-018-0321-x, ISSN: 1614-5046 (Print) 1614-5054 (Online) Online published : 18 Dec, 2018 | 2018 | Springer London |
Bicubic Interpolation based Audio Authentication (BIAA) | Springer | 2016 | Asia Pacific Institute of Information Technology, Panipat, Panipat, India. |
An Analytical Approach to Generate Unique Song Signal (AUSS) | Third International Conference on Computer Science & Information Technology(CCSIT-2013) ISSN : 2231 - 5403 [Online],Feb.18-20, 2013, Bangalore, India | 2015 | Springer |
Unique Key Based Authentication of Song Signal through DCT Transform (UKASDT) | ICT and Critical Infrastructure: Proceedings of the 48th Annual Convention of Computer Society of India, Vol II, Procedia Technology, Elsevier, Visakhapatnam, India,pp 567 575 | 2014 | Elsevier |
Octant Based Cryptography – An Innovative Approach to Symmetric Key Cryptography | IEEE International Advance Computing Conference (IACC 2009), ISBN: 978-1-4244-2927-1, India , pp 3484-89,6-7 March ,2009. | 2014 | Thapar University |
A Novel Technique to Protect Piracy of Quality Songs through Amplitude Manipulation (PPAM) | IEEE International Symposium on Electronic System Design (ISED 2010), pp 246-250, ISBN 978-0-7695-4294-2, Bhubaneswar, India, ,2010 | 2014 | IEEE |
A Systematic Approach to Authenticate Song Signal without Distortion of Granularity of Audible Information (ASSDGAI) | The International Journal of Multimedia & Its Applications (IJMA) Vol.5, No.4, August 2013, ISSN : 0975-5578(Online); 0975-5934 (Print) | 2013 | AIRCC |
A Fourier Transform Based Authentication of Audio Signals through Alternation of Coefficients of Harmonics (FTAT) | First International Conference on Parallel, Distributed Computing Technology and Applications(PDCTA 2011)Vol 203,pp. 76-85 | 2013 | Springer |
Preservation of IPR of Songs through Embedding Secret Song (IPRSESS) | International Conference on Computational Intelligence: Modelling, Techniques and Applications (CIMTA 2013), Proceedings will be published with Procedia Technology, Elsevier, 2013 | 2013 | Dept of CSE, Univ of Kalyani, India |
Enhancing Security of Quality Song with Embedding Encrypted Hidden Code in Tolerance Level (SQHTL) | International Journal on Cryptography and Information Security,Vol 2, No.3, September 2012, ISSN 1839-8626 | 2012 | AIRCC |
Secret Data Hiding within Tolerance Level of Embedding in Quality Songs (DHTL) | The International Conference on Communications Security & Information Assurance (CSIA 2012), 2012 | 2012 | Springer |
Secret Image Embedded Authentication of Song Signal through Wavelet Transform (IAWT) | The Fifth International Conference on Network Security & Applications (CNSA-2012) | 2012 | AIRCC |
Generating Audio Signal Authentication through Secret Embedded Self Harmonic Component (GASASH) | International Journal of Security, Privacy and Trust Management ( IJSPTM), Vol. 1, No 3/4, August 2012 | 2012 | AIRCC |
Authentication of Audio signals through Embedding of Images(AASAI) | Association for the Advancement of Modelling and Simulation Techniques in Enterprises (AMSE), France. | 2011 | AMSE |
Frame Based Symmetric Key Cryptography | Int. J. Advanced Networking and Applications,Volume: 02, Issue: 04, Pages: 762-769, ISSN 0975-0282 (Online) 0975-0290 (Print) | 2011 | Eswar Publications |
Fabrication of Message Digest to Authenticate Audio Signals with Alternation of Coefficients of Harmonics in Multi-stages (MDAC) | The International Journal of Multimedia & Its Applications (IJMA) Vol.3, No.4, November 2011, ISSN : 0975-5578(Online); 0975-5934 (Print) | 2011 | AIRCC |
Songs Authentication through Embedding a Self Generated Secure Hidden Signal (SAHS) | 10th International Conference on Computer Information Systems and Industrial Management Applications (CISIM 2011), LNCS, December 14-16 | 2011 | Department of Computer Science & Engineering, University Of Calcutta |
Song Authentication Technique through Concealment of Secret Song (SATCon) | IEEE International Conference on Recent Trends in Information Technology (ICRTIT 2011), | 2011 | Anna University, Chennai |
A Message embedded Authentication of Songs to Verify Intellectual Property Right(MEAS) | IEEE International Symposium on Electronic System Design (ISED 2011),ISBN 978-0-7695-4294-2 | 2011 | IEEE |
Generation and Fabrication of Authenticated Song Signal through Preserving Balance Ratio of Song s Components (BRSAS) | IEEE International Conference on Communication and Industrial Application (ICCIA 2011), | 2011 | IEEE |
A Practical Approach of Embedding Secret Key to Authenticate Tagore Songs(ESKATS) | 2nd International Conference on Wireless Information Networks & Business information System (WINBIS 09), ISSN No : 2091-0266 | 2010 | Rural Nepal Technical Academy (Pvt.) Ltd , Nepal |
A Technique to Generate Huffman Tree with Better Utilization of Memory (HTUM)[ only abstract] | )”, International Conference on Computing and Systems - 2010 (ICCS - 2010) | 2010 | dept. of Computer Science,University of Burdwan, India |
A New Approach to Cryptography | ”, International Conference on Systemics, Cybernetics and Informatics (ICSCI –2009), pp. 294-297 | 2009 | Pentagram Research Centre (P) Limitedm, Hyderabad, Andhra Pradesh, India |
Octant Based Cryptography – An Innovative Approach to Symmetric Key Cryptography | IEEE International Advance Computing Conference (IACC 2009), ISBN: 978-1- 4244-2927-1, pp. 3484 – 3489 | 2009 | Thapar University, Patiala, India |
A Framework for the Development of Playfair Cipher Considering Probability of Occurrence of Characters in English Literature | WCSET-2008,Bangkok,Thailand, ISSN: 2070-3740 | 2008 | World Congress on Science, Engineering and Technology |