![photo](/responsive_image/150/150/0/0/0/cache/matlabcentral/profiles/17469102_1652037922684.jpg)
Souradeep Mukhopadhyay
Jadavpur University
Followers: 0 Following: 0
Souradeep Mukhopadhyay is currently studying in Jadavpur University CSE UG 2. He is interested at Machine Learning, Image and video Processing, Optimization and Steganography. He is KVPY SX scholar.
Statistics
RANK
61.605
of 292.756
REPUTATION
0
CONTRIBUTIONS
0 Questions
5 Answers
ANSWER ACCEPTANCE
0.00%
VOTES RECEIVED
0
RANK
11.566 of 19.936
REPUTATION
37
AVERAGE RATING
0.00
CONTRIBUTIONS
3 Files
DOWNLOADS
7
ALL TIME DOWNLOADS
351
RANK
of 147.931
CONTRIBUTIONS
0 Problems
0 Solutions
SCORE
0
NUMBER OF BADGES
0
CONTRIBUTIONS
0 Posts
CONTRIBUTIONS
0 Public Channels
AVERAGE RATING
CONTRIBUTIONS
0 Highlights
AVERAGE NO. OF LIKES
Feeds
Submitted
Secured Image Steganography based on Catalan Transform
Secured Image Steganography based on Catalan Transform. It is accepted in Multimedia Tools and Applications, Springer. (21st Dec...
meer dan 3 jaar ago | 2 downloads |
![Thumbnail](/matlabcentral/mlc-downloads/downloads/c7cc8212-87cb-4841-b701-7fc1f190c43a/5e2275fd-a48a-4833-aa6b-368606599838/images/1610368569.png)
Submitted
Exploiting Laguerre Transform in Image Steganography
New Steganography Algorithm developed using Laguerre Transform
meer dan 3 jaar ago | 3 downloads |
![Thumbnail](/matlabcentral/mlc-downloads/downloads/83f764ca-0d44-420d-b76b-0ad10855a076/5cd69a21-c75d-4c3c-8d90-c70d9cc21008/images/1600094173.jpeg)
Submitted
Image Steganography-using-Lah-Transform
Application of Lah transform for security and privacy of data through information hiding in telecommunication
ongeveer 4 jaar ago | 2 downloads |
![Thumbnail](/matlabcentral/mlc-downloads/downloads/0c28b915-f95f-45da-86e2-b1a307994450/45c746b1-96d5-445e-ac08-af9f1f699516/images/1596206498.jpeg)