Community Profile

photo

Souradeep Mukhopadhyay


Jadavpur University

Last seen: quasi 2 anni fa Attivo dal 2020

Followers: 0   Following: 0

Contatto

Souradeep Mukhopadhyay is currently studying in Jadavpur University CSE UG 2. He is interested at Machine Learning, Image and video Processing, Optimization and Steganography. He is KVPY SX scholar.

Statistiche

All
  • Personal Best Downloads Level 1
  • GitHub Submissions Level 2
  • 3 Month Streak
  • First Answer
  • First Submission
  • First Review

Visualizza badge

Feeds

Visto da

Inviato


Secured Image Steganography based on Catalan Transform
Secured Image Steganography based on Catalan Transform. It is accepted in Multimedia Tools and Applications, Springer. (21st Dec...

circa 3 anni fa | 2 download |

Thumbnail

Inviato


Exploiting Laguerre Transform in Image Steganography
New Steganography Algorithm developed using Laguerre Transform

oltre 3 anni fa | 8 download |

Thumbnail

Risposto
How to make Laguerre Transform
https://in.mathworks.com/matlabcentral/fileexchange/79409-exploiting-laguerre-transform-in-image-steganography

oltre 3 anni fa | 0

Risposto
How to Use arrayfun with a Multivariate Function of n Variables?
You should make 3 different X arrays here X1, X2, X3 and then pass the 3 arrays in function 3 times to compute y 3 times.

oltre 3 anni fa | 0

Risposto
Inverse Laplace transform with Bessel function
You can find something from this link:"https://in.mathworks.com/matlabcentral/answers/366374-problem-computing-inverse-laplace-t...

oltre 3 anni fa | 0

Risposto
MATLAB code for a steganographic method based on integer wavelet transform and genetic algorithm
You can use integer transform based steganography https://in.mathworks.com/matlabcentral/fileexchange/78751-image-steganography...

oltre 3 anni fa | 0

Risposto
Image Steganography using LSB?
% Clear the existing workspace clear all; % Clear the command window clc; % Read the input image input = imread('p...

oltre 3 anni fa | 0

Inviato


Image Steganography-using-Lah-Transform
Application of Lah transform for security and privacy of data through information hiding in telecommunication

quasi 4 anni fa | 6 download |

Thumbnail