Koushik Pal

Work place: Institute of Radio Physics and Electronics, University of Calcutta, Kolkata, India

E-mail: koushik.rpe@gmail.com


Research Interests: Image Processing, Image Manipulation, Image Compression, Computational Science and Engineering


Koushik Pal was born on 23rd February, 1983. He completed his B. Tech in Electronics and Communication Engineering from Vidyasagar University in 2004 and M. Tech in Radio Physics and Electronics from the Institute of Radio Physics and Electronics, University of Calcutta in 2007. He is presently pursuing his Ph. D. (Tech.) in Radio Physics and Electronics of the University of Calcutta. He joined the Department of Electronics and Communication Engineering as an Assistant Professor at Guru Nanak Institute of Technology, Kolkata in 2007. He is also associated with West Bengal University of Technology and Ramakrishna Mission Vivekananda Centenary College as a guest faculty. His research interests are in the fields of Security Aspects of Biomedical Image Watermarking, Digital Image Processing, Digital Signal Processing and Analog and Digital Communication. He has to his credit eight international journal publications and two international book chapters and around twenty international and national conference publications;

Author Articles
Secure Transmission and Recovery of Embedded Patient Information from Biomedical Images of Different Modalities through a Combination of Cryptography and Watermarking

By Subhajit Koley Koushik Pal Goutam Ghosh Mahua Bhattacharya

DOI: https://doi.org/10.5815/ijigsp.2014.04.03, Pub. Date: 8 Mar. 2014

In this paper a new type of information hiding skill in biomedical images is proposed through a combination of cryptography and digital watermarking to achieve the enhancement in confidential and authenticated data storage and secured transmission. Here patient's name and doctor's name are considered as patient's information which is encrypted using cryptography and embedded in the scan image of that patient through watermarking. RSA algorithm is used for encryption and higher order bit LSB replacement technique is used for embedding the information. The private keys are also embedded in the cover image to have better security and accurate recovery of the hidden information. The outcome of the proposed methodology shows that the hidden information doesn't affect the cover image and it can be recovered efficiently even from several noisy images. The strength of the proposed embedding scheme is also supported by several image quality matrices.

[...] Read more.
Other Articles