default search action
Debanjan Sadhya
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Debanjan Sadhya, Tanya Sahu:
A critical survey of the security and privacy aspects of the Aadhaar framework. Comput. Secur. 140: 103782 (2024) - [j18]Shaheen Usmani, Sunil Kumar, Debanjan Sadhya:
Efficient deepfake detection using shallow vision transformer. Multim. Tools Appl. 83(4): 12339-12362 (2024) - 2023
- [j17]Varesh Mishra, Debanjan Sadhya:
Height and Punishment: Toward Accountable IoT Blockchain With Network Sanitization. IEEE Trans. Inf. Forensics Secur. 18: 5665-5677 (2023) - [c15]Abhishek Pratap Singh, Debanjan Sadhya, Santosh Singh Rathore:
Fast Similarity Search in Large-Scale Iris Databases Using High-Dimensional Hashing. BDA 2023: 187-200 - [c14]Shaheen Usmani, Bharat Chandwani, Debanjan Sadhya:
Driver Drowsiness Detection Using Vision Transformer. CVIP (1) 2023: 445-454 - [c13]Pratheesh Suresh, Debanjan Sadhya, Amitesh Singh Rajput:
Generation of Multi-Layered QR Codes with Efficient Compression. PReMI 2023: 301-311 - 2022
- [j16]Joy Brahma, Debanjan Sadhya:
Preserving Contextual Privacy for Smart Home IoT Devices With Dynamic Traffic Shaping. IEEE Internet Things J. 9(13): 11434-11441 (2022) - [j15]Debanjan Sadhya, Santosh Singh Rathore, Amitesh Singh Rajput, Abhinav Anand:
Securing multimedia videos using space-filling curves. Multim. Tools Appl. 81(27): 38685-38704 (2022) - [j14]Debanjan Sadhya, Bodhi Chakraborty:
Quantifying the Effects of Anonymization Techniques Over Micro-Databases. IEEE Trans. Emerg. Top. Comput. 10(4): 1979-1992 (2022) - [c12]Anivesh Panjiyar, Debanjan Sadhya:
Defending against code injection attacks using Secure Design Pattern. APSEC 2022: 570-571 - [c11]Venkat Sai Swarup, Debanjan Sadhya, Vinal Patel, Kanjar De:
Presentation Attack Detection in Iris Recognition through Convolution Block Attention Module. IJCB 2022: 1-8 - [c10]Amisha Sinha, Debanjan Sadhya:
Decentralized Public Key Infrastructure with Identity Management using Hyperledger Fabric. SECRYPT 2022: 554-559 - 2021
- [j13]Debanjan Sadhya, Utkarsh Utsav, Zahid Akhtar:
Generation of cancellable locality sampled codes from facial images. IET Biom. 10(3): 260-274 (2021) - [j12]Ashish Sharma, Nikita Sharma, Yatharth Saxena, Anuraj Singh, Debanjan Sadhya:
Benchmarking deep neural network approaches for Indian Sign Language recognition. Neural Comput. Appl. 33(12): 6685-6696 (2021) - 2020
- [j11]Debanjan Sadhya, Kanjar De, Balasubramanian Raman, Partha Pratim Roy:
Efficient extraction of consistent bit locations from binarized iris features. Expert Syst. Appl. 140 (2020) - [j10]Amit, Balasubramanian Raman, Debanjan Sadhya:
Dynamic texture recognition using local tetra pattern - three orthogonal planes (LTrP-TOP). Vis. Comput. 36(3): 579-592 (2020) - [c9]Nishant Raj, Debanjan Sadhya:
Securing Biometric Data over Cloud via Shamir's Secret Sharing. CVIP (1) 2020: 282-292 - [c8]Saurabh Mishra, Debanjan Sadhya:
LiARX: A Lightweight Cipher Based on the LTS Design Strategy of ARX. ICISS 2020: 185-197
2010 – 2019
- 2019
- [j9]Debanjan Sadhya, Sanjay Kumar Singh:
A comprehensive survey of unimodal facial databases in 2D and 3D domains. Neurocomputing 358: 188-210 (2019) - [j8]Debanjan Sadhya, Kanjar De, Raman Balasubramanian, Partha Pratim Roy:
Development of a clustering based fusion framework for locating the most consistent IrisCodes bits. Inf. Sci. 491: 1-15 (2019) - [j7]Debanjan Sadhya, Balasubramanian Raman:
Generation of Cancelable Iris Templates via Randomized Bit Sampling. IEEE Trans. Inf. Forensics Secur. 14(11): 2972-2986 (2019) - [c7]Debanjan Sadhya, Bodhi Chakraborty:
A Quantitative Study of Attribute Based Correlation in Micro-databases and Its Effects on Privacy. ACISP 2019: 651-659 - [c6]Debanjan Sadhya, Zahid Akhtar, Dipankar Dasgupta:
A Locality Sensitive Hashing Based Approach for Generating Cancelable Fingerprints Templates. BTAS 2019: 1-9 - [c5]Sanyam Rajpal, Debanjan Sadhya, Kanjar De, Partha Pratim Roy, Balasubramanian Raman:
EAI-NET: Effective and Accurate Iris Segmentation Network. PReMI (1) 2019: 442-451 - 2018
- [j6]Debanjan Sadhya, Sanjay Kumar Singh:
Construction of a Bayesian decision theory-based secure multimodal fusion framework for soft biometric traits. IET Biom. 7(3): 251-259 (2018) - [j5]Debanjan Sadhya, Sanjay Kumar Singh:
Design of a cancelable biometric template protection scheme for fingerprints based on cryptographic hash functions. Multim. Tools Appl. 77(12): 15113-15137 (2018) - [c4]Anjali Gautam, Debanjan Sadhya, Balasubramanian Raman:
A Modified FCM-Based Brain Lesion Segmentation Scheme for Medical Images. CVIP (2) 2018: 149-159 - [c3]Debanjan Sadhya, Akshay Agarwal, Balasubramanian Raman:
Perfectly Secure Shamir's Secret Sharing Scheme for Privacy Preserving Image Processing Over Cloud. ICVGIP 2018: 7:1-7:8 - 2017
- [j4]Debanjan Sadhya, Sanjay Kumar Singh:
Providing robust security measures to Bloom filter based biometric template protection schemes. Comput. Secur. 67: 59-72 (2017) - [j3]Debanjan Sadhya, Sanjay Kumar Singh:
Privacy risks ensuing from cross-matching among databases: A case study for soft biometrics. Inf. Process. Lett. 128: 38-45 (2017) - [c2]Debanjan Sadhya, Parth Pahariya, Rishi Yadav, Apoorv Rastogi, Ayush Kumar, Lakshya Sharma, Sanjay Kumar Singh:
BioSoft - a multimodal biometric database incorporating soft traits. ISBA 2017: 1-6 - [c1]Debanjan Sadhya, Bodhi Chakraborty, Sanjay Kumar Singh:
Capturing the Effects of Attribute based Correlation on Privacy in Micro-databases. SECRYPT 2017: 430-436 - 2016
- [j2]Debanjan Sadhya, Sanjay Kumar Singh:
Privacy preservation for soft biometrics based multimodal recognition system. Comput. Secur. 58: 160-179 (2016) - [j1]Debanjan Sadhya, Sanjay Kumar Singh, Bodhi Chakraborty:
Review of key-binding-based biometric data protection schemes. IET Biom. 5(4): 263-275 (2016)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-27 16:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint