Saurabh Dutta

Work place: B. C. Roy Engineering College, Durgapur, WB, INDIA



Research Interests: Information Security, Information Systems, Information Retrieval, Information-Theoretic Security


Saurabh Dutta is a professor in Dr. B. C. Roy Engineering College. He holds a Ph. D Degree in Coputer Science. His research domain is information security and cryptology.

Author Articles
An Image Steganography-based Novel Approach to develop 8-Share Integrated Security Toolkit (ISTI-8)

By Sabyasachi Samanta Saurabh Dutta Gautam Sanyal

DOI:, Pub. Date: 8 May 2015

Encryption is a process or algorithm to make information hidden or secret and considered as a subset of cryptography. Using encryption data are being transformed into some another form that appears to be meaningless and incomprehensible. Here we have embedded encrypted data bits about the entire image to some suitable nonlinear pixel positions using key. After that we have formed several shares of image and key using R, G and B components and character or digits respectively. At the decryption end through appropriate arrangement of shares of image and key, make possible to retrieve hidden data bits from stego-image and reform into its original content.

[...] Read more.
A Novel Approach of Text Steganography using Nonlinear Character Positions (NCP)

By Sabyasachi Samanta Saurabh Dutta Goutam Sanyal

DOI:, Pub. Date: 8 Nov. 2013

Usually, the steganographic algorithms employ images, audio, video or text files as the medium to ensure hidden exchange of information between multiple contenders and to protect the data from the prying eyes. This paper presents a survey of text steganography method used for    hiding secret information inside some cover text. Here the text steganography algorithms based on modification of font format, font style et cetera, has advantages of great capacity, good imperceptibility and wide application range. The nonlinear character positions of different pages are targeted through out the cover with insignificant modification.  As compared to other methods, we believe that the approaches proposed convey superior randomness and thus support higher security.

[...] Read more.
Other Articles