Chinmoy Ghosh - Academia.edu (original) (raw)

Related Authors

Arul Dalton

Sayee Kumar M

kanchan gorde

Shouvik Chakraborty

Nidhi Menon

Rajdeep Chowdhury

Vijaya Murari

J PAUL CHOUDHURY PAUL CHOUDHURY

Jit Saha

Jit Saha

Kalyani Government Engineering College

Uploads

Papers by Chinmoy Ghosh

Research paper thumbnail of Image Encryption: A New Approach Using Genetic Algorithm

In this paper, a new approach has been applied for Image encryption using genetic algorithm. In g... more In this paper, a new approach has been applied for Image encryption using genetic algorithm. In genetic algorithm Crossover operation assembles existing genes and mutation operation produces new genes. Here, for each pair of pixels binary value of an image the crossover and mutation are applied to encrypt the image. Different test analysis like correlation, entropy test and histogram analysis is done for verification of the performance of the algorithm.

Research paper thumbnail of Different Vulnerabilities and Challenges of Quantum Key Distribution Protocol: A Review

International Journal of Advanced Research in Computer Science, 2017

Now days the information become the valuable assets and private information must be protected fro... more Now days the information become the valuable assets and private information must be protected from being compromised. Today we use different sophisticated, robust encryption algorithm which are vulnerable to classical computational attack as well as the powerful parallel quantum computer. In this paper, we examine limitations and vulnerabilities and attacks to which Quantum Key Distribution can be exposed.

Research paper thumbnail of Different EDGE Detection Techniques: A Review

Lecture Notes in Electrical Engineering, 2020

Research paper thumbnail of Image Encryption: A New Approach Using Genetic Algorithm

In this paper, a new approach has been applied for Image encryption using genetic algorithm. In g... more In this paper, a new approach has been applied for Image encryption using genetic algorithm. In genetic algorithm Crossover operation assembles existing genes and mutation operation produces new genes. Here, for each pair of pixels binary value of an image the crossover and mutation are applied to encrypt the image. Different test analysis like correlation, entropy test and histogram analysis is done for verification of the performance of the algorithm.

Research paper thumbnail of Different Vulnerabilities and Challenges of Quantum Key Distribution Protocol: A Review

International Journal of Advanced Research in Computer Science, 2017

Now days the information become the valuable assets and private information must be protected fro... more Now days the information become the valuable assets and private information must be protected from being compromised. Today we use different sophisticated, robust encryption algorithm which are vulnerable to classical computational attack as well as the powerful parallel quantum computer. In this paper, we examine limitations and vulnerabilities and attacks to which Quantum Key Distribution can be exposed.

Research paper thumbnail of Different EDGE Detection Techniques: A Review

Lecture Notes in Electrical Engineering, 2020

Log In