Study of implementing automated attendance system using face recognition technique N Kar, MK Debbarma, A Saha, DR Pal International Journal of computer and communication engineering 1 (2), 100-103, 2012 | 252 | 2012 |
Voice recognition and authentication as a proficient biometric tool and its application in online exam for PH people D Rudrapal, S Das, S Debbarma, N Kar, N Debbarma International Journal of Computer Applications 39 (12), 6-12, 2012 | 48 | 2012 |
Improved chaos-based video steganography using DNA alphabets N Kar, K Mandal, B Bhattacharya ICT Express 4 (1), 6-13, 2018 | 43 | 2018 |
g-EoN: A Non-salient Approach Towards Encryption Using Gamma Function Γ (-α β)=-β α Γ (β-α β) AK Das, N Kar International Conference on Advances in Cyber Security, 78-94, 2021 | 42 | 2021 |
Email spam detection using deep learning approach K Debnath, N Kar 2022 international conference on machine learning, big data, cloud and …, 2022 | 41 | 2022 |
An improved DNA based dual cover steganography P Das, S Deb, N Kar, B Bhattacharya Procedia Computer Science 46, 604-611, 2015 | 27 | 2015 |
Secure data communication and cryptography based on DNA based message encoding A Majumder, A Majumdar, T Podder, N Kar, M Sharma 2014 IEEE international conference on advanced communications, control and …, 2014 | 23 | 2014 |
Performance analysis of hierarchical and flat network routing protocols in wireless sensor network using Ns-2 A Jamatia, K Chakma, N Kar, D Rudrapal, S Debbarmai International Journal of Modeling and Optimization 5 (1), 40, 2015 | 21 | 2015 |
Static and dynamic software metrics complexity analysis in regression testing MK Debbarma, N Kar, A Saha 2012 International Conference on Computer Communication and Informatics, 1-6, 2012 | 20 | 2012 |
An advanced image encryption standard providing dual security: Encryption using hill cipher & RGB image steganography D Debnath, S Deb, N Kar 2015 International Conference on Computational Intelligence and Networks …, 2015 | 19 | 2015 |
A DNA based image steganography using 2D chaotic map P Das, N Kar 2014 International Conference on Electronics and Communication Systems …, 2014 | 15 | 2014 |
Data security and cryptography based on DNA sequencing N Kar, A Majumder, A Saha, S Deb, MC Pal International Journal of Information Technology & Computer Science (IJITCS …, 2013 | 14 | 2013 |
An improved data security using DNA sequencing N Kar, A Majumder, A Saha, A Jamatia, K Chakma, MC Pal Proceedings of the 3rd ACM MobiHoc workshop on Pervasive wireless healthcare …, 2013 | 14 | 2013 |
An Applied Image Cryptosystem on Moore’s Automaton Operating on δ (qk)/𝔽2 S Deb, A Das, N Kar ACM Transactions on Multimedia Computing, Communications and Applications 20 …, 2023 | 13 | 2023 |
A highly secure DNA based image steganography P Das, N Kar 2014 International Conference on Green Computing Communication and …, 2014 | 13 | 2014 |
DNA-based cryptographic approach toward information security A Majumdar, T Podder, A Majumder, N Kar, M Sharma Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014 …, 2015 | 10 | 2015 |
An Improved Chaos based medical image encryption using DNA encoding techniques A Das, AK Das, N Kar Advances in Computational Intelligence, Security and Internet of Things …, 2020 | 9 | 2020 |
Automated Load Shedding Period Control System D Rudrapal, S Das, A Pandey, N Kar International Journal on Computer Science and Engineering 3 (5), 1764-1772, 2011 | 9 | 2011 |
Robust medical and color image cryptosystem using array index and chaotic S-box D Podder, S Deb, D Banik, N Kar, AK Sahu Cluster Computing, 1-26, 2024 | 8 | 2024 |
A Hierarchical Scheduling Approach for Symmetric Multiprocessing Based Real Time Systems on VxWorks K Chakma, S Debbarma, N Kar, N Debbarma, T Debbarma Lecture Notes on Software Engineering 1 (1), 61-65, 2013 | 8 | 2013 |