Debjit Das

Debjit Das
Indian Institute of Engineering Science and Technology, Shibpur | IIEST · Department of Information Technology

Doctor of Philosophy

About

9
Publications
543
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
61
Citations
Introduction
My research work is primarily - Image forgery detection and localization, utilizing Image processing, machine learning and deep learning techniques.

Publications

Publications (9)
Article
Full-text available
Due to the wide availability of various ready-to-use image tampering software tools, image manipulation has become widespread nowadays. Tampered images are often used intentionally for unlawful and malicious purposes. One of the most common forms of image manipulation today includes the Image Splicing attack. Image splicing can be defined as genera...
Chapter
In this paper, we deal with the problem of localization of image splicing, which has proven to be one of the major types of digital image forgery today, where an adversary combines regions from multiple source images, to create a natural-looking composite image. This type of composition, difficult to identify by the naked eye, many times proves to...
Conference Paper
Nowadays, the hassle-free availability of innumerable, easy-to-use image editing software makes image manipulation widespread, and these forged images can be used for various malicious activities. One of the most common methods of digital image deception is image splicing, where multiple portions from different images are combined to make the splic...
Article
Digital image forgery has become hugely widespread, as numerous easy-to-use, low-cost image manipulation tools have become widely available to the common masses. Such forged images can be used with various malicious intentions, such as to harm the social reputation of renowned personalities, to perform identity fraud resulting in financial disaster...
Conference Paper
With the easy availability of numerous low-cost and ready-to-use image editing software, nowadays, the forgery of the digital image has become very common and widespread. The fraudsters can deliberately use the tampered images for various malicious activities. Among different types of digital image manipulation, probably the most popular and effect...
Chapter
Digital images are widely used as primary sources of evidence in today’s world, spanning security, forensics, and legal domains. However, image tampering poses a shallow technical skill barrier with the wide availability of sophisticated, easy-to-use image manipulation software. Tampered images are often used intentionally for unlawful and maliciou...
Chapter
Digital Image forgery has become widespread nowadays. Fraudsters can intentionally use forged images for different illegitimate and malicious purposes. One of the most severe forms of image forgery is Image Splicing which can be defined as making an artificial image by joining multiple parts of different source images to form a natural-looking forg...
Conference Paper
Full-text available
Mobile Ad hoc Network (MANET) is an infrastructure less, decentralized, dynamic network consisting of wireless mobile nodes that communicate with each other without any centralized authority. Although MANET plays a great role in modern development of commercial applications, it is vulnerable to various kinds of security attacks among which one of t...
Article
Full-text available
Mobile Ad hoc Network (MANET) is infrastructure less, dynamic, decentralized network of wireless mobile nodes. Although MANET is very much useful but it suffers from different security issues. Dropping packets by selfish nodes is one of them. Presence of selfish nodes in MANET may damage the entire communication system. So, it is highly required to...

Network

Cited By