Shiladitya Pujari

Work place: Department of IT, University Institute of Technology, The University of Burdwan, Burdwan - 713104, West Bengal, India



Research Interests: Computer systems and computational processes, Artificial Intelligence, Pattern Recognition, 2D Computer Graphics, Distributed Computing, Image Processing, Database Management System


Shiladitya Pujari is a member of IEEE (USA), IAENG(Hong Kong), CSTA (New York,USA), IACSIT (Singapore). At present he is working as an Assistant Professor at Department of IT in University Institute of Technology, The University of Burdwan, Golapbag, Burdwan – 713104, West Bengal, India.

He has received his B.Tech Degree in Information Technology (IT) from RCC Institute of Information Technology, 15 Canal South Road, Beliaghata (University of Kalyani, India) in 2003, Master of Engineering (ME) degree in Information Technology from West Bengal University of Technology, India in December 2005 and currently pursuing Ph.D at Department of Computer Science, The University of Burdwan, Burdwan, WB, India.

He possesses an experience of more than 8 years in the field of teaching and research. He has published nearly 15 papers in International and National Journals / Conferences. One ME (CSE) scholar has already been awarded in the field of Image Steganography under his guidance. His research interests include Computer Security & Cryptography, Image Processing & Pattern Recognition, Database Management Systems, Web Technologies, Artificial Intelligence & Expert Systems, Networking & Distributed Computing, Computer Graphics & Multimedia, Nanotechnology etc.

Author Articles
A Novel Approach of Image Based Steganography Using Pseudorandom Sequence Generator Function and DCT Coefficients

By Anupam Mondal Shiladitya Pujari

DOI:, Pub. Date: 8 Feb. 2015

This research paper present a novel approach of Image based steganography scheme where a pseudorandom sequence generator function is used to randomize the mapping sequence in a pseudorandom fashion. The embedding process of the secret message is done according to the pseudo-random sequence, and extraction is done using the same sequence at the other end. At the base level, 2D-DCT is used to hide the bits of secret message inside the stego image by replacing the LSBs of DCT coefficients. Since in previous paper the LSB substitution technique is already used, here in this paper the previous concept is extended and used DCT instead of LSB technique. A new text randomization algorithm (4-2 swap text randomization algorithm) is also used to modify the secret message before embedding.

[...] Read more.
Petri Net: A Tool for Modeling and Analyze Multi-agent Oriented Systems

By Shiladitya Pujari Sripati Mukhopadhyay

DOI:, Pub. Date: 8 Sep. 2012

Analysis and proper assessment of multi-agent system properties are very much important. In this paper, we discussed about methodologies for modeling, analysis and design of multi-agent oriented system with the help of Petri net. A Multi-agent system can be considered as a discrete-event dynamic system and Petri nets are used as a modeling tool to assess the structural properties of the multi-agent system. Petri net provides an assessment of the interaction properties of the multi-agent.

[...] Read more.
Other Articles