Subhrajyoti Deb, Abhilash Das and Nirmalya Kar. “An applied Image Cryptosystem on Moore’s Automaton operating on δ(qk)/F2.”ACM Transactions on Multimedia Computing, Communications, and Applications (2023).doi: https://doi.org/10.1145/3614433(SCI)
Subhrajyoti Deb, Abhilash Das, Bhaskar Biswas, Joy Lal Sarkar, Surbhi Bhatia Khan, Saeed Alzahrani, Shalli Rani. “Enhancing Image Security via Block Cyclic Construction and DNA Based LFSR. IEEE Transactions on Consumer Electronics (2024). doi: https://doi.org/10.1109/TCE.2024.3481260(SCI)
Abhijt Biswas, Subhrajyoti Deb, Nirmalya Kar, Joy Lal Sarkar, Ayan Mandal. “Event-Triggered Sliding Mode Controller for Cognitive Internet of Things.” IEEE Transactions on Network and Service Management (2024),doi: https://doi.org/10.1109/TNSM.2024.3502212(SCI)
Keya Chowdhury, Subhrajyoti Deb, Nirmalya Kar, Joy Lal Sarkar, Ahmed Hussein Alkhayyat, and Lewis Nkenyereye. “PwLMµ-TPE: A Visual-Usability and Privacy-Enhanced Thumbnail Preserving Encryption Scheme of Cloud Computing for Consumers.” IEEE Transactions on Consumer Electronics (2024).doi: https://doi.org/10.1109/TCE.2024.3412100(SCI)
Kumar Sekhar Roy, Subhrajyoti Deb, and Hemanta Kumar Kalita. “A Novel Hybrid Authentication Protocol utilizing Lattice-based Cryptography for IoT devices in Fog Network.” Digital Communications and Networks.doi: https://doi.org/10.1016/j.dcan.2022.12.003(SCI)
Subhrajyoti Deb, and Pratap Behera. “Design of Key-dependent Bijective S-Boxes for Color image Cryptosystem.” Optik 253(2022).doi: https://doi.org/10.1016/j.ijleo.2021.168548 (SCI)
Durgabati Podder, Subhrajyoti Deb, Debapriya Banik, Nirmalya Kar, and Aditya Kumar Sahu. “Robust Medical and Color Image Cryptosystem Using Array Index and Chaotic S-box.” Cluster Computing (2024).doi: https://doi.org/10.1007/s10586-024-04584-3(SCI)
Poulomi Deb, Subhrajyoti Deb, Abhijit Das, Nirmalya kar. “Image Forgery Detection Techniques: Latest Trends And Key Challenges.” IEEE Access (2024).doi: https://ieeexplore.ieee.org/document/10752965/(SCI)
Keya Chowdhury, Subhrajyoti Deb, Kumar Sekhar Roy, Durgabati Podder, Aditya Kumar Sahu. “A systematic survey on TPE schemes for the cloud: Classification, Challenges and Future Scopes.” IEEE Access (2024).doi: https://doi.org/10.1109/ACCESS.2024.3479228(SCI)
Priyanka Biswas, Nirmalya Kar, and Subhrajyoti Deb. “ML based assessment and prediction of air pollution from satellite images during COVID-19 pandemic.” Multimedia Tools and Applications (2024).doi: https://doi.org/10.1007/s11042-023-18102-x(SCI)
Aditya Arsh, Nirmalya Kar, Smita Das, and Subhrajyoti Deb. “Multiple Approaches Towards Authentication Using Keystroke Dynamics.” Procedia Computer Science (2023).doi: https://doi.org/10.1016/j.procs.2024.04.246(Scopus)
Durgabati Podder, Keya Chowdhury, Subhrajyoti Deb, and Nirmalya Kar. “Messed up(): A Key Generator based image cryptosystem.” International Journal of Ad Hoc and Ubiquitous Computing (2022).doi: https://doi.org/10.1504/IJAHUC.2023.133447(SCI)
Subhrajyoti Deb, Santu Pal, and Bubu Bhuyan. “NMRMG: Nonlinear multiple-recursive matrix generator design approaches and its randomness analysis.” Wireless Personal Communications (2022).doi: https://doi.org/10.1007/s11277-022-09566-5(SCI)
Abhilash Das, Nirmalya Kar, Subhrajyoti Deb, and Mahendra Pratap Singh. “bFLEX-γ: A Lightweight Block Cipher utilizing Key Cross Approach via Probability Density Function.” Arabian Journal for Science and Engineering (2022).doi: https://doi.org/10.1007/s13369-022-06651-6(SCI)
Subhrajyoti Deb, Bubu Bhuyan, Nirmalya Kar, and Sudheer Reddy K. “Color image encryption using an improved version of stream cipher and chaos.” International Journal of Ad Hoc and Ubiquitous Computing (2021).doi: https://doi.org/10.1504/IJAHUC.2022.125428(SCI)
Subhrajyoti Deb, and Bubu Bhuyan. “Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR.” Multimedia Tools and Applications 80, no. 13 (2021): 19803-19826.doi: https://doi.org/10.1007/s11042-020-10308-7(SCI)
Subhrajyoti Deb, and Bubu Bhuyan. “Performance evaluation of grain family and espresso ciphers for applications on resource constrained devices.” ICT Express 4, no. 1 (2018): 19-23. doi: https://doi.org/10.1016/j.icte.2018.01.005(SCI)
Subhrajyoti Deb, and Bubu Bhuyan. “Performance analysis of current lightweight stream ciphers for constrained environments.” S¯adhan¯a 45, no. 256 (2020).doi: https://doi.org/10.1007/s12046-020-01489-w(SCI)
Subhrajyoti Deb, Bhaskar Biswas, and Bubu Bhuyan. “Secure image encryption scheme using high efficiency word-oriented feedback shift register over finite field.” Multimedia Tools and Applications 78, no. 24 (2019): 34901-34925. doi: https://doi.org/10.1007/s11042-019-08086-y(SCI)
Prasenjit Das, Subhrajyoti Deb, Nirmalya Kar, and Baby Bhattacharya. “An improved DNA based dual cover steganography.” Procedia Computer Science 46 (2015): 604-611.doi: https://doi.org/10.1016/j.procs.2015.02.103(Scopus)
Joy Lal Sarkar, Sheng-Lung Peng, Subhrajyoti Deb, Muthaiah U, Ayan Mondal, Gaddam Venu Gopal. “ SAHA: An SDN Enabled Fog Architecture for Healthcare Applications.” 25th International Conference on Distributed Computing and Networking, 2024. [ACM]
Durgabati Podder, and Subhrajyoti Deb. “ A Fast and Secure Image Cryptosystem Based on New Row Column Index Manipulator and Split Join Algorithm.” International Conference on Cryptology & Network Security with Machine Learning pp. . Springer, Singapore, 2023. [LNNS]
Durgabati Podder, Khondekar Lutful Hassan, Kumar Sekhar Roy, and Subhrajyoti Deb. “Design of a new Folding XOR algorithm based chaotic image cryptosystem.” 12th International Conference on ‘Computing, Communication and Sensor Network’, pp. . Springer, Singapore, 2023. [LNEE]
Subhrajyoti Deb, Bhaskar Biswas, and Bubu Bhuyan. “Advanced Image Encryption Scheme Using Snow Stream Cipher.” In Emerging Trends in Electrical, Communications, and Information Technologies, pp. 785-794. Springer, Singapore, 2020. [LNEE]
Subhrajyoti Deb, Bubu Bhuyan, and Navin Ch Gupta. “Design and analysis of LFSR-based stream cipher.” In Proceedings of the International Conference on Computing and Communication Systems, pp. 631-639. Springer, Singapore, 2018. [LNNS]
Abhishek Majumder, Subhrajyoti Deb, and Sudipta Roy. “Classification and performance analysis of intra-domain mobility management schemes for wireless mesh network.” In Proceedings of the Second International Conference on Information and Communication Technology for Competitive Strategies, pp. 1-6. 2016. [ACM]
Subhrajyoti Deb, Bhaskar Biswas, and Nirmalya Kar. “Study of NLFSR and reasonable security improvement on Trivium cipher.” In Information Systems Design and Intelligent Applications, pp. 731-739. Springer, New Delhi, 2015. [AISC]
Subhrajyoti Deb, Rohit Upadhya, and Bubu Bhuyan. “Applicability of Lightweight Stream Cipher in Crowd Computing: A Detailed Survey and Analysis.” In Crowd Assisted Networking and Computing, pp. 219-246. CRC Press, 2018.
Abhishek Majumder, Subhrajyoti Deb, and Sudipta Roy. “Taxonomy of Intra-Domain Mobility Management Schemes in Wireless Mesh Network for Implementing Mobile IPTV.” IPTV Delivery Networks: Next Generation Architectures for Live and Video-on-Demand Services pp. 247. Wiley, 2018.
Sayan Das, Nirmalya Kar, Subhrajyoti Deb. “Moving Towards a Quantum Age: Recent Trends in Quantum and Post-Quantum Cryptography.” Advancing Cyber Security Through Quantum Cryptography, pp. 1-28. IGI Global, 2024.
Subhrajyoti Deb and Aditya Kumar Sahu. “Securing the Digital World: A Comprehensive Guide to Multimedia Security.” published by CRC Press Taylor and Francis Group, ISBN: 9781032663623.
Subhrajyoti Deb, Adnan Gutub, and Aditya Kumar Sahu. “Fortressing Pixels: Information Security for Images, Videos, Audio, and Beyond.” Proposal accepted and to be published by The IET International Book Series on Multimedia Information Processing and Security [Under Progres].
Aditya Kumar Sahu and Subhrajyoti Deb. “Crypto Forensics: A Useful Direction to Digital Evidence Recovery.” Proposal accepted and to be published by Digital Privacy and Security Springer Book series [Under Progres].
Nirmalya Kar, Smita Das, Subhrajyoti Deb, Udit Mamodiya. “IOT BASED WEARABLE DEVICE FOR MONITORING OF VITAL INFORMATION.” Design patent granted in India, Design Number: 382360-001, Date: 27/03/2023.
Subhrajyoti Deb. “A Method and System for Proactive Cybersecurity Threat Detection and Mitigation using Machine Learning and Data Mining Techniques.” patent submitted in Indian Patent Application No.202431043457, Date : 14/06/24
IEEE COMSOC MMTC Communications - Frontiers, Feb 2023, SPECIAL ISSUE ON Recent advances in the Internet of Things (IOTs) and it’s applications. With Guest Editors Sheng-Lung Peng, Ramasamy V and Valentina E. Balas
Convener of International Conference on Advanced Communications and Machine Intelligence (MICA 2023) jointly organized by ICFAI University Tripura and NIT Warangal on 1-2 November 2023