


default search action
Debanjan Sadhya
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j21]Shaheen Usmani, Sunil Kumar, Debanjan Sadhya:
Spatio-temporal knowledge distilled video vision transformer (STKD-VViT) for multimodal deepfake detection. Neurocomputing 620: 129256 (2025) - [j20]Medhavi Srivastava, Debanjan Sadhya
:
Achieving $\epsilon$-Object Indistinguishability in Surveillance Videos Through Trajectory Randomization. IEEE Trans. Ind. Informatics 21(2): 1970-1979 (2025) - [c19]Pankaj Gugnani, Rahul Singh Dhakad, Debanjan Sadhya, W. Wilfred Godfrey:
Revisiting Proof of Stake with Reward and Penalty Mechanism. COMSNETS 2025: 1287-1292 - [c18]Sibashreeta Dash, Neetu Kumari, Debanjan Sadhya, Bodhi Chakraborty:
Categorically Analyzing the Network Traffic in the Snowflake Bridge of Tor. COMSNETS 2025: 1293-1298 - 2024
- [j19]Debanjan Sadhya
, Tanya Sahu:
A critical survey of the security and privacy aspects of the Aadhaar framework. Comput. Secur. 140: 103782 (2024) - [j18]Shaheen Usmani, Sunil Kumar, Debanjan Sadhya
:
Efficient deepfake detection using shallow vision transformer. Multim. Tools Appl. 83(4): 12339-12362 (2024) - [c17]Shaheen Usmani
, Sunil Kumar
, Debanjan Sadhya
:
Enhancing Generalization Ability in Deepfake Detection via Continual Learning. ICVGIP 2024: 8:1-8:8 - 2023
- [j17]Varesh Mishra
, Debanjan Sadhya
:
Height and Punishment: Toward Accountable IoT Blockchain With Network Sanitization. IEEE Trans. Inf. Forensics Secur. 18: 5665-5677 (2023) - [c16]Abhishek Pratap Singh
, Debanjan Sadhya, Santosh Singh Rathore:
Fast Similarity Search in Large-Scale Iris Databases Using High-Dimensional Hashing. BDA 2023: 187-200 - [c15]Shaheen Usmani, Bharat Chandwani, Debanjan Sadhya:
Driver Drowsiness Detection Using Vision Transformer. CVIP (1) 2023: 445-454 - [c14]Mayank Mishra, Tanya Sahu, Debanjan Sadhya:
Optimizing Identification Time in Fingerprint Recognition Using Cuckoo Filter. CVMI 2023: 1-5 - [c13]Pratheesh Suresh, Debanjan Sadhya, Amitesh Singh Rajput:
Generation of Multi-Layered QR Codes with Efficient Compression. PReMI 2023: 301-311 - 2022
- [j16]Joy Brahma
, Debanjan Sadhya
:
Preserving Contextual Privacy for Smart Home IoT Devices With Dynamic Traffic Shaping. IEEE Internet Things J. 9(13): 11434-11441 (2022) - [j15]Debanjan Sadhya
, Santosh Singh Rathore
, Amitesh Singh Rajput, Abhinav Anand:
Securing multimedia videos using space-filling curves. Multim. Tools Appl. 81(27): 38685-38704 (2022) - [j14]Debanjan Sadhya
, Bodhi Chakraborty
:
Quantifying the Effects of Anonymization Techniques Over Micro-Databases. IEEE Trans. Emerg. Top. Comput. 10(4): 1979-1992 (2022) - [c12]Anivesh Panjiyar, Debanjan Sadhya:
Defending against code injection attacks using Secure Design Pattern. APSEC 2022: 570-571 - [c11]Venkat Sai Swarup, Debanjan Sadhya, Vinal Patel, Kanjar De:
Presentation Attack Detection in Iris Recognition through Convolution Block Attention Module. IJCB 2022: 1-8 - [c10]Amisha Sinha, Debanjan Sadhya:
Decentralized Public Key Infrastructure with Identity Management using Hyperledger Fabric. SECRYPT 2022: 554-559 - 2021
- [j13]Debanjan Sadhya
, Utkarsh Utsav, Zahid Akhtar
:
Generation of cancellable locality sampled codes from facial images. IET Biom. 10(3): 260-274 (2021) - [j12]Ashish Sharma, Nikita Sharma, Yatharth Saxena, Anuraj Singh
, Debanjan Sadhya
:
Benchmarking deep neural network approaches for Indian Sign Language recognition. Neural Comput. Appl. 33(12): 6685-6696 (2021) - 2020
- [j11]Debanjan Sadhya
, Kanjar De, Balasubramanian Raman, Partha Pratim Roy
:
Efficient extraction of consistent bit locations from binarized iris features. Expert Syst. Appl. 140 (2020) - [j10]Amit, Balasubramanian Raman, Debanjan Sadhya
:
Dynamic texture recognition using local tetra pattern - three orthogonal planes (LTrP-TOP). Vis. Comput. 36(3): 579-592 (2020) - [c9]Nishant Raj, Debanjan Sadhya:
Securing Biometric Data over Cloud via Shamir's Secret Sharing. CVIP (1) 2020: 282-292 - [c8]Saurabh Mishra
, Debanjan Sadhya
:
LiARX: A Lightweight Cipher Based on the LTS Design Strategy of ARX. ICISS 2020: 185-197
2010 – 2019
- 2019
- [j9]Debanjan Sadhya
, Sanjay Kumar Singh
:
A comprehensive survey of unimodal facial databases in 2D and 3D domains. Neurocomputing 358: 188-210 (2019) - [j8]Debanjan Sadhya
, Kanjar De, Raman Balasubramanian, Partha Pratim Roy
:
Development of a clustering based fusion framework for locating the most consistent IrisCodes bits. Inf. Sci. 491: 1-15 (2019) - [j7]Debanjan Sadhya
, Balasubramanian Raman:
Generation of Cancelable Iris Templates via Randomized Bit Sampling. IEEE Trans. Inf. Forensics Secur. 14(11): 2972-2986 (2019) - [c7]Debanjan Sadhya
, Bodhi Chakraborty
:
A Quantitative Study of Attribute Based Correlation in Micro-databases and Its Effects on Privacy. ACISP 2019: 651-659 - [c6]Debanjan Sadhya, Zahid Akhtar
, Dipankar Dasgupta:
A Locality Sensitive Hashing Based Approach for Generating Cancelable Fingerprints Templates. BTAS 2019: 1-9 - [c5]Sanyam Rajpal, Debanjan Sadhya, Kanjar De, Partha Pratim Roy
, Balasubramanian Raman:
EAI-NET: Effective and Accurate Iris Segmentation Network. PReMI (1) 2019: 442-451 - 2018
- [j6]Debanjan Sadhya, Sanjay Kumar Singh
:
Construction of a Bayesian decision theory-based secure multimodal fusion framework for soft biometric traits. IET Biom. 7(3): 251-259 (2018) - [j5]Debanjan Sadhya, Sanjay Kumar Singh
:
Design of a cancelable biometric template protection scheme for fingerprints based on cryptographic hash functions. Multim. Tools Appl. 77(12): 15113-15137 (2018) - [c4]Anjali Gautam, Debanjan Sadhya, Balasubramanian Raman:
A Modified FCM-Based Brain Lesion Segmentation Scheme for Medical Images. CVIP (2) 2018: 149-159 - [c3]Debanjan Sadhya, Akshay Agarwal, Balasubramanian Raman:
Perfectly Secure Shamir's Secret Sharing Scheme for Privacy Preserving Image Processing Over Cloud. ICVGIP 2018: 7:1-7:8 - 2017
- [j4]Debanjan Sadhya, Sanjay Kumar Singh
:
Providing robust security measures to Bloom filter based biometric template protection schemes. Comput. Secur. 67: 59-72 (2017) - [j3]Debanjan Sadhya, Sanjay Kumar Singh
:
Privacy risks ensuing from cross-matching among databases: A case study for soft biometrics. Inf. Process. Lett. 128: 38-45 (2017) - [c2]Debanjan Sadhya, Parth Pahariya, Rishi Yadav, Apoorv Rastogi, Ayush Kumar, Lakshya Sharma, Sanjay Kumar Singh
:
BioSoft - a multimodal biometric database incorporating soft traits. ISBA 2017: 1-6 - [c1]Debanjan Sadhya, Bodhi Chakraborty, Sanjay Kumar Singh
:
Capturing the Effects of Attribute based Correlation on Privacy in Micro-databases. SECRYPT 2017: 430-436 - 2016
- [j2]Debanjan Sadhya, Sanjay Kumar Singh
:
Privacy preservation for soft biometrics based multimodal recognition system. Comput. Secur. 58: 160-179 (2016) - [j1]Debanjan Sadhya, Sanjay Kumar Singh
, Bodhi Chakraborty
:
Review of key-binding-based biometric data protection schemes. IET Biom. 5(4): 263-275 (2016)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-11 19:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint