
Dr. Biswajita Datta
Associate Professor
Computer Science & Engineering | CSE
Area of Specialization
Cyber Security, Steganography
Teaching Experience
17 years
Academic Qualifications
Ph.D. (Engg.): Computer Science & Engineering University of Calcutta, 2019
M.Tech.: Computer Science & Engineering University of Calcutta, 2009
M.sc. : Computer Science University of Calcutta ,2007
B.Sc.: Computer Science (Hons.) University of Calcutta, 2005
Date of Joining 01-02-2010
Date of Assign as Prof / A.P 01-01-2025
Journal Publications
- B. Datta, K. Dutta, S. Roy, “Data Hiding in Virtual Bit-Plane using Efficient Lucas Number Sequences”, Multimedia Tools and Applications, Springer, 2020. [Indexed by: Science Citation Index Expanded, SCImago, Scopus, and DBLP] [Print ISSN: 1380-7501] Impact Factor: 2.757.
- B. Datta, P. Pal, S. K. Bandyopadhyay, “Audio Transmission of Medical Reports for Visa Processing: A Solution for the Spread of Communicable Diseases by the Immigrant Population”, IEEE Consumer Electronics Magazine, Vol. 7, No. 5, 2018, pp. 27-33. [Indexed by: Science Citation Index Expanded] [Print ISSN: 2162-2248] Impact Factor: 4.135.
- B. Datta, S. Roy, S. Roy, S. K. Bandyopadhyay, “Multi-bit robust image steganography based on modular arithmetic”, Multimedia Tools and Applications, Springer, 2018, pp. 1-36. [Indexed by: Science Citation Index Expanded, SCImago, Scopus, and DBLP] [Print ISSN: 1380-7501] Impact Factor: 2.757.
- B. Datta, U. Mukherjee, S. K. Bandyopadhyay, “LSB Layer Independent Robust Steganography using Binary Addition”, Procedia Computer Science, ELSEVIER, Vol. 85, pp. 425-432, 2016. [Indexed by: Scopus] [[ISSN: 1877-0509]
- B. Datta, S. K. Bandyopadhyay, A. Kedia, “High Imperceptible Data Hiding using Remainder Method”, International Journal of Computer Applications, Volume 95, No.18, 2014, pp. 12-19. [ISSN: 0975-8887]
- B. Datta, D. Bhattacharyya, S. K. Bandyopadhay, “High Capacity Signature Hiding Technique in Higher Depth of LSB Layer”, International Journal of Multimedia and Ubiquitous Engineering, Vol. 9, No. 4, 2014, pp.363-374. [Indexed by: Thomson Reuters (RID), DBLP, Google Scholar, [ISSN: 1975-0080]
- Prof. S. K. Bandyopadhyay, B. Datta and S. Roy, “Identifications of concealed weapon in a Human Body”, International Journal of Scientific & Engineering Research, Volume 3, Issue 11, Nov, 2012, ISSN 2229-5518
- B. Datta, R. Dutta, A. Roy and S. K. Bandyopadhyay, “High Capacity Data Hiding by Detecting Weak Edges through Declivity Operator”, in Proc. of 15th IEEE INDICON, India, 2018. [Indexed in IEEE Xplore]
- B. Datta, A. Roy, R. Dutta and S. K. Bandyopadhyay, “Secure Communication through Double Layer Security with Efficient Key Transmission”, in Proc. of 17th IEEE International Conference on Information Technology, India, 2018. [Indexed in IEEE Xplore]
- B. Datta, P. Pal, S. K. Bandyopadhyay, “Multi-Bit Data Hiding in Randomly chosen LSB Layers of an Audio”, in Proc. of 15th IEEE International Conference on Information Technology, India, 2016. [Indexed in IEEE Xplore]
- B. Datta, U. Mukherjee and S. K. Bandyopadhyay, “LSB Layer Independent Robust Steganography using Binary Addition”, in Proc. of Elsevier International Conference on Computational Modeling and Security (CMS 2016).
- B. Datta, P. Pal, S. K. Bandyopadhyay, “Robust Multi-Layer Audio Steganography”, in Proc. of 12th IEEE INDICON, India, pp. 1-6, 2015. [Indexed in IEEE Xplore]
- B. Datta, S. Tat, S. K. Bandyopadhyay, “Robust High Capacity Audio Steganography using Modulo Operator”, in Proc. of 3rd IEEE International Conference on Computer, Communication, Control and Information Technology, India, 2015. [Indexed in IEEE Xplore].
- B. Datta, D. Mondal, R. Meheboob, T. K. Joseph, A. K. Dutta, and S. Bhattacharya : “The Einstein Relation in Carbon Nanotubes and Quantum Wires of Degenerate Tetragonal, Optoelectronic and Related Materials: Simplified Theory, Relative Comparisons and Suggestion for Experimental Determination”, Proceedings of International Conference on Recent Trends in Nano Science & Technology(ICRTNT-06), December, 2006, pp.120-123.
- I. Mukherjee, B. Datta, R. Banerjee, S. Das., “DWT Difference Modulation Based Novel Steganographic Algorithms”, Information Systems Security, Chapter 36, pages 573-582 , vol. 9478, Lecture Notes, Springer, 2015.
Member: IEEE
Participated
- Five day online FDP on “Artificial Intelligence in Advanced Machine Learning and Cloud Computing” organized by Department of Computer Science & Engineering in association with IQAC, Haldia Institute of Technology during 10th -14th July, 2023.
- Five day online FDP on “Data Security and IoT”, , organized by R&D Cell, St. Thomas’ College of Engineering & Technology during July, 11th – 15thm, 2020.
- Five day online FDP on “Inculcating Universal Human Values in Technical Education”, organized by All India Council for Technical Education (AICTE) during July 26th – 30th, 2021.
- AICTE sponsored six days Online Short Term Training Program “Machine Learning, Pattern Recognition and their Applications” , organized by Department of Information Technology, St. Thomas’ College of Engineering & Technology during November 23rd – 28th, 2020.
- One week AICTE Training And Learning (ATAL) Academy Online Faculty Development Program on”Block chain” organized by Birla Institute of Technology, Mesra during September 7th – 11th, 2020.
- Five day online training on “Artificial Intelligence (AI)”organized by MSME-Technology Development Centre (PPDC) during May 25th – 29th, 2020.
- Three day online training on “Internet of Things”, organized by MSME- TECHNOLOGY DEVELOPMENT CENTRE (PPDC) during April 30th – May 2nd, 2020.
- One day Faculty Development Program on Software Integration in Industries & their Trends”, organized by Cognizant Technology Solutions (CTS India) Pvt. Ltd., 20th Aug, 2019.
- One week Short Term Training Program “Deep Learning and It’s Usability Through Hardware Interactions”, organized by the Department of Computer Science and Technology, IIEST, Shibpur during June 24-28, 2019.
- Two weeks days Short Term Training Program on “Design and Analysis of Algorithm”, Short Term Training Program, , organized by National Institute of Technical Teachers’ Training and Research, Kolkata during 10th – 21st July, 2017, Kolkata.
- Two days Faculty Development Program“Automation Testing & Latest Trends in Automation Testing & Quick Test Professional Functional Testing Tool”, organized by Cognizant Technology Solutions Academic Initiative during 3rd & 4th November, 2011, Kolkata.
Funding Received
2013 – 2017 “Implementation of Security in e-Governance through Steganography”, Funded by Department of Science & Technology (DST), West Bengal, Amount involved: 1.65 lakhs, Role: Co-Principle Investigator.
UG Project Guided
- Region based robust data hiding technique with the application of Deep Learning (2022-23)
- Secure Remote Voting System (2022-23)
- Malicious Website Detection (2021-22)
- DigiCure (2021-22)
- Audio in the Application of Human Audio Sense Identification for Security (2019-20)
- Examination Management System (2019-20)
- Reversible data hiding through virtual bit plane approach (Reversible data hiding, pixel intensity decomposition based Steganography) (2018-19)
- Region based Steganography based on human perception (Region based Steganography based on human visual perception) (2018-19)
- Robust, High Capacity Data Concealment for Security (Region based Data Hiding, Double layer Security without sending key separately) (2017-18)
- Data Concealment for Secure Communication (The secret data is hidden based on human visual perception in virtual bit –planes) (2016-17)
- Double Layer Steganography (1st Layer Region Based Steganography and 2nd Layer Network Steganography) (2016-17)
- Holistic Approach towards Securing Communications” (Region based steganography, DWT Steganography and Reversible Steganography, Steganography in e-Voting System) (2016-17)
- Data Security through Steganography” (Echo Hiding, Tone Insertion within audio file, Virtual Bit-plane Approach) (2015-16)
- Studies in the Development of Secured e-Governance System” (Steganography applied in e-Governance) (2015-16)
- Data Hiding for Secret Communication” (DWT Steganography) (2014-15).
- Security through Obscurity” (Steganography based on visual perception, Reversible Steganography) (2014-15).
- Steganography: A Step towards Information Security (Audio Steganography and Edge based Image Steganography) (2014-15).
- Steganography: The Art of Data Hiding (Data Hiding through intensity adjustment and Region based steganography) (2013-14).
- Steganography Technique for Information Hiding (Higher bit–plane Embedding with low distortion Steganography) (2011-12).
PG Project Guided
- “Signature Hiding In Higher LSB Layer of RGB Image – An Image Steganography Technique”, (M. Tech, Information Technology, School of Education Technology, Jadavpur University, Kolkata), 2010-11.
- “Offline Signature Verification using Thinning and Graph Matching”, (M.Tech,Computer Science and Engineering, Narula Institute of Technology, West Bengal University of Technology), 2009-10