Dr. Biswajita Datta

Assistant Professor

Computer Science & Engineering | CSE

Academic Information


Ph.D. (Engg.): Computer Science & Engineering University of Calcutta, 2019

M.Tech.:  Computer Science & Engineering University of Calcutta, 2009

M.sc. : Computer Science University of Calcutta ,2007

B.Sc.: Computer Science (Hons.) University of Calcutta, 2005


Area of Specialization


Cyber Security, Steganography




17 years


Date of Joining


Date of Assign as Prof. / A.P

Artificial Intelligence

Cyber Security

Cryptography & Network Security

Image Processing

Design & Analysis of Algorithm

Data Structure & Algorithms

Operating System

Software Engineering

Database Management System

Computer Network

Cloud Computing


Journal Publications

  1. B. Datta, K. Dutta, S. Roy, “Data Hiding in Virtual Bit-Plane using Efficient Lucas Number Sequences”, Multimedia Tools and Applications, Springer, 2020. [Indexed by: Science Citation Index Expanded, SCImago, Scopus, and DBLP] [Print ISSN: 1380-7501] Impact Factor: 2.757.
  2. B. Datta, P. Pal, S. K. Bandyopadhyay, “Audio Transmission of Medical Reports for Visa Processing: A Solution for the Spread of Communicable Diseases by the Immigrant Population”, IEEE Consumer Electronics Magazine, Vol. 7, No. 5, 2018, pp. 27-33. [Indexed by: Science Citation Index Expanded] [Print ISSN: 2162-2248] Impact Factor: 4.135.
  3. B. Datta, S. Roy, S. Roy, S. K. Bandyopadhyay, “Multi-bit robust image steganography based on modular arithmetic”, Multimedia Tools and Applications, Springer, 2018, pp. 1-36. [Indexed by: Science Citation Index Expanded, SCImago, Scopus, and DBLP] [Print ISSN: 1380-7501] Impact Factor: 2.757.
  4. B. Datta, U. Mukherjee, S. K. Bandyopadhyay, “LSB Layer Independent Robust Steganography using Binary Addition”, Procedia Computer Science, ELSEVIER, Vol. 85, pp. 425-432, 2016. [Indexed by: Scopus] [[ISSN: 1877-0509]
  5. B. Datta, S. K. Bandyopadhyay, A. Kedia, “High Imperceptible Data Hiding using Remainder Method”, International Journal of Computer Applications, Volume 95, No.18, 2014, pp. 12-19. [ISSN: 0975-8887]
  6. B. Datta, D. Bhattacharyya, S. K. Bandyopadhay, “High Capacity Signature Hiding Technique in Higher Depth of LSB Layer”, International Journal of Multimedia and Ubiquitous Engineering, Vol. 9, No. 4, 2014, pp.363-374. [Indexed by: Thomson Reuters (RID), DBLP, Google Scholar, [ISSN: 1975-0080]
  7. Prof. S. K. Bandyopadhyay, B. Datta and S. Roy, “Identifications of concealed weapon in a Human Body”, International Journal of Scientific & Engineering Research, Volume 3, Issue 11, Nov, 2012, ISSN 2229-5518
  8. B. Datta, R. Dutta, A. Roy and S. K. Bandyopadhyay, “High Capacity Data Hiding by Detecting Weak Edges through Declivity Operator”, in Proc. of 15th IEEE INDICON, India, 2018. [Indexed in IEEE Xplore]
  9. B. Datta, A. Roy, R. Dutta and S. K. Bandyopadhyay, “Secure Communication through Double Layer Security with Efficient Key Transmission”, in Proc. of 17th IEEE International Conference on Information Technology, India, 2018. [Indexed in IEEE Xplore]
  10. B. Datta, P. Pal, S. K. Bandyopadhyay, “Multi-Bit Data Hiding in Randomly chosen LSB Layers of an Audio”, in Proc. of 15th IEEE International Conference on Information Technology, India, 2016. [Indexed in IEEE Xplore]
  11. B. Datta, U. Mukherjee and S. K. Bandyopadhyay, “LSB Layer Independent Robust Steganography using Binary Addition”, in Proc. of Elsevier International Conference on Computational Modeling and Security (CMS 2016).
  12. B. Datta, P. Pal, S. K. Bandyopadhyay, “Robust Multi-Layer Audio Steganography”, in Proc. of 12th IEEE INDICON, India, pp. 1-6, 2015. [Indexed in IEEE Xplore]
  13. B. Datta, S. Tat, S. K. Bandyopadhyay, “Robust High Capacity Audio Steganography using Modulo Operator”, in Proc. of 3rd IEEE International Conference on Computer, Communication, Control and Information Technology, India, 2015. [Indexed in IEEE Xplore].
  14. B. Datta, D. Mondal, R. Meheboob, T. K. Joseph, A. K. Dutta, and S. Bhattacharya : “The Einstein Relation in Carbon Nanotubes and Quantum Wires of Degenerate Tetragonal, Optoelectronic and Related Materials: Simplified Theory, Relative Comparisons and Suggestion for Experimental Determination”, Proceedings of International Conference on Recent Trends in Nano Science & Technology(ICRTNT-06), December, 2006, pp.120-123.
  15. I. Mukherjee, B. Datta, R. Banerjee, S. Das., “DWT Difference Modulation Based Novel Steganographic Algorithms”, Information Systems Security, Chapter 36, pages 573-582 , vol. 9478, Lecture Notes, Springer, 2015.




Member: IEEE


  1. Five day online FDP on “Artificial Intelligence in Advanced Machine Learning and Cloud Computing” organized by Department of Computer Science & Engineering in association with IQAC, Haldia Institute of Technology during 10th -14th July, 2023.
  2. Five day online FDP on “Data Security and IoT”, , organized by R&D Cell, St. Thomas’ College of Engineering & Technology during July, 11th – 15thm, 2020.
  3.  Five day online FDP on  “Inculcating Universal Human Values in Technical Education”, organized by All India Council for Technical Education (AICTE) during July 26th – 30th, 2021.
  4. AICTE sponsored six days Online Short Term Training Program “Machine Learning, Pattern Recognition and their Applications” , organized by Department of Information Technology, St. Thomas’ College of Engineering & Technology during November 23rd – 28th, 2020.
  5. One week AICTE Training And Learning (ATAL) Academy Online Faculty Development Program on”Block chain” organized by Birla Institute of Technology, Mesra during September 7th – 11th, 2020.
  6. Five day online training on “Artificial Intelligence (AI)”organized by MSME-Technology Development Centre (PPDC) during May 25th – 29th, 2020.
  7. Three day online training on “Internet of Things”, organized by MSME- TECHNOLOGY DEVELOPMENT CENTRE (PPDC) during April 30th – May 2nd, 2020.
  8. One day Faculty Development Program on Software Integration in Industries & their Trends”, organized by Cognizant Technology Solutions (CTS India) Pvt. Ltd., 20th Aug, 2019.
  9. One week Short Term Training Program “Deep Learning and It’s Usability Through Hardware Interactions”,  organized by the Department of Computer Science and Technology, IIEST, Shibpur during June 24-28, 2019.
  10. Two weeks days Short Term Training Program on “Design and Analysis of Algorithm”, Short Term Training Program, , organized by National Institute of Technical Teachers’ Training and Research, Kolkata during 10th – 21st July, 2017, Kolkata.
  11.  Two days Faculty Development Program“Automation Testing & Latest Trends in Automation Testing & Quick Test Professional Functional Testing Tool”, organized by Cognizant Technology Solutions Academic Initiative during 3rd & 4th November, 2011, Kolkata.



Funding Received

2013 – 2017 “Implementation of Security in e-Governance through Steganography”, Funded by Department of Science & Technology (DST), West Bengal, Amount involved: 1.65 lakhs, Role: Co-Principle Investigator.

UG Project Guided

  1. Region based robust data hiding technique with the application of Deep Learning (2022-23)
  2. Secure Remote Voting System (2022-23)
  3. Malicious Website Detection (2021-22)
  4. DigiCure (2021-22)
  5. Audio in the Application of Human Audio Sense Identification for Security (2019-20)
  6. Examination Management System (2019-20)
  7. Reversible data hiding through virtual bit plane approach (Reversible data hiding, pixel intensity decomposition based Steganography) (2018-19)
  8. Region based Steganography based on human perception (Region based Steganography based on human visual perception) (2018-19)
  9. Robust, High Capacity Data Concealment for Security (Region based Data Hiding, Double layer Security without sending key separately) (2017-18)
  10. Data Concealment for Secure Communication (The secret data is hidden based on human visual perception in virtual bit –planes) (2016-17)
  11. Double Layer Steganography (1st Layer Region Based Steganography and 2nd Layer Network Steganography) (2016-17)
  12. Holistic Approach towards Securing Communications” (Region based steganography, DWT Steganography and Reversible Steganography, Steganography in e-Voting System) (2016-17)
  13. Data Security through Steganography” (Echo Hiding, Tone Insertion within audio file, Virtual Bit-plane Approach) (2015-16)
  14. Studies in the Development of Secured e-Governance System” (Steganography applied in e-Governance) (2015-16)
  15. Data Hiding for Secret Communication” (DWT Steganography) (2014-15).
  16. Security through Obscurity” (Steganography based on visual perception, Reversible Steganography) (2014-15).
  17. Steganography: A Step towards Information Security (Audio Steganography and Edge based Image Steganography) (2014-15).
  18. Steganography: The Art of Data Hiding (Data Hiding through intensity adjustment and Region based steganography) (2013-14).
  19. Steganography Technique for Information Hiding (Higher bit–plane Embedding with low distortion Steganography) (2011-12).


PG Project Guided

  1. “Signature Hiding In Higher LSB Layer of RGB Image – An Image Steganography Technique”, (M. Tech, Information Technology, School of Education Technology, Jadavpur University, Kolkata), 2010-11.
  2. “Offline Signature Verification using Thinning and Graph Matching”, (M.Tech,Computer Science and Engineering, Narula Institute of Technology, West Bengal University of Technology), 2009-10