Research
Domain of Interest
Cryptography, Visual Cryptography, Algebraic Cryptanalysis
Implicant Theory, Parallel Computing, Augmented and Virtual Reality
Domain of Interest
Cryptography, Visual Cryptography, Algebraic Cryptanalysis
Implicant Theory, Parallel Computing, Augmented and Virtual Reality
Best Paper Awards
Best paper award for the paper “Secure approach for remote voting system using visual cryptography and SHA” in the IEEE International Conference ICCUBEA 2016
Best paper award for the paper “An Efficient Technique of Parallel Share Generation and Reconstruction for Medical Image” in the IEEE International Conference ICCUBEA 2018
Publications
Efficient fuzzy ranking with ensemble machine learning network for attack detection and classification in VANET,, Expert Systems with Applications 279, 127295, 2025
An Intelligent Model of Heuristic Improvement and Transformer-based Adaptive Deep Ensemble Networks with ASPP for Detecting Tuberculosis Disorder using Chest X-Ray Images, Journal of Information & Knowledge Management, 255002, 2025
An Innovative Onion Disease Classification Framework Using Smart IoT Assisted Multi-Scale Attention-Based ResNeXt with SPP via Modified Cat–Mouse Optimizer, International Journal of Image and Graphics, 2750028, 2025
Fraud detection and prevention by face recognition with and without a mask for banking applications, Multimedia Tools and Applications 84 (2), 781-804, 2025
Sentiment Analysis-Based Automatic Stress and Emotion Recognition using Weighted Fused Fusion-Based Cascaded DTCN with Attention Mechanism from EEG Signal, Journal of Information & Knowledge Management 23 (05), 2450061, 2024
IoT-based smart agriculture for onion plant disease management: A comprehensive approach, Int. J. Intell. Syst. Appl. Eng. 12 (3), 472-476, 2024.
Erratum to “Identify and classify pests in the agricultural sector using metaheuristics deep learning approach”[Franklin Open Volume 3, June 2023, 100024], Franklin Open 9, 100122, 2024
Improved optimization algorithm for resource management in cloud applications with performance monitor of VM provisioning, placement and recycling, Journal of High Speed Networks 30 (4), 583-606, 2024.
Designing an optimal task scheduling and VM placement in the cloud environment with multi-objective constraints using Hybrid Lemurs and Gannet Optimization Algorithm, Network: Computation in Neural Systems, 1-31, 2024.
Estimation of Stock Price Using LSTM Algorithm and Sentiment Analysis, Communications in Mathematics and Applications 15 (2), 679, 2024.
Classification of Mango Leaf Disease using Machine Learning to Enhance Yield Productivity,. Electrical Systems 20 (2s), 348-357, 2024.
Implicant Based Solver for XOR Boolean Linear Systems, SpringSim-HPC 2017, April 23-26, Virginia Beach, VA, USA, pp.556-567; ISBN: 1-56555-361-6 DOI: 10.22360/springsim.. 2017.hpc.029 Conference: Proceedings of the 25th High Performance Computing Symposium and ACM Digital Library
SizeAR – Online apparel trial system for customers using AR, International Journal of Computer Applications, 2022, Volume 184, ISBN: 10.5120/ijca2022921961
Security of User Credentials on Web Portals, 2021 IEEE International Conference on Computing, Communication and Green Engineering (CCGE), pp. 1-4, doi: 10.1109/CCGE50943.2021.9776476.
Image Captioning using Neural Network Model, IEEE International Conference on Smart Technologies and Systems for Next Generation Computing (ICSTSN), 2022, pp. 1-3, doi: 10.1109/ICSTSN53084.2022.9761320.
Review Paper on: University Admission Prediction Using Google Vertex AI, IEEE, International Conference on Artificial Intelligence Trends and Pattern Recognition (ICAITPR) - 2022
Security Enhancement of Forensic Evidences Using Blockchain, IEEE ICICV 2021.
Knowledge Transfer to Preschoolers based on Augmented Reality”, IEEE ICICCS 2021
Contactless Elevator Based On Hand Gestures Useful During Covid-19 Like Pandemics, IEEE ICACCS 2021
Development of an effective system to identify fruit ripening system for apple, banana, and mango”, International Journal of Advanced Science and Technology, 2005-4238
Phobia environment simulation and object modeling using augmented reality”, International Journal of Advanced Science and Technology, 2005-4238
Cloud-based Framework for Secure Sharing of Medical Reports”, International Journal of Computer Applications, 2019, Volume 182
Security of Audio File based on Partial Encryption ”, International Journal of Computer Applications, 2019, Volume 178, ISBN: 973-93-80900-13-8
A Survey Paper on Audio Security”, Journal of Information Technology and Science,2018, Volume 4, Issue 3
Medical Image Security on Cloud”, i-PGCON, 2018
An Efficient Technique of Parallel Share Generation and Reconstruction for Medical Image”, IEEE conference, ICCUBEA 2018
Best paper award for the paper “An Efficient Technique of Parallel Share Generation and Reconstruction for Medical Image” in the IEEE International Conference ICCUBEA 2018
Electronic Medical Reports Security in Cloud Storage Environment based on Visual Cryptography, IJCA, 2017, VOL 179.
Visual Cryptography for Security of Images”, Journal of Network Security Computer Networks(MAT Journal) Volume 4 Issue 1, Jan 2018
Automated analyzer to assess multilingual websites with reference to localization guidelines, IEEE 2017.
E-Voting System based on Mobile using NIC and SIM, IJCA,2017, VOL 165.
Parallel Implementation of Pohlig-Hellman to Compute Discrete Logarithms”, IJCA, 2017, VOL 166
Evaluation of multilingual websites using localization matrix, IEEE,2017.
Integrity Check of Shared Data on Cloud with Various Mechanisms”, International Journal of Computer Applications, 2017, VOL 159.
Secure approach for remote voting system using visual cryptography and SHA”, International Conference on Computing, Communication, Control and Automation, IEEE,2016.
Anti-Phishing framework using Word-based image CAPTCHA and Halftone Visual Cryptography”, International Conference on Automatic Control and Dynamic Optimization Techniques, IEEE, 2016.
A Review on Anti-Phishing based on Halftone Visual Cryptography, International Conference on Research in Intelligent Computing in Engineering (RICE-2016).
A Review on Various Digital Image Secret Sharing Schemes”, International journal of Advanced Research in computer science and management studies, 2016, ISSN: 2321-7782.
Security of grayscale images by VSS with novel method of bit-plane slicing, IEEE conference on emerging devices and smart systems,2016.
Authentication of gray scale forensic image using visual secret sharing”, IEEE conference on emerging devices and smart systems,2016.
“Secure approach for remote voting system using visual cryptography and SHA” in IEEE International Conference ICCUBEA 2016
Reduction of Transmission Risk Problem in Image Security using Diverse Image Media”, International Conference on Communication, Computing and Virtualization, 2016, Elsevier.
Attacks on Elliptical Curve Cryptography Discrete Logarithm Problem”, International Journal of Innovative Research in Electronics, Electrical, Instrumentation and Control Engineering, Vol. 3, Issue 4, April 2015.
A Methodology for Securing a Database using ECC with Cache”, International Journal of Research in Information Technology, Volume 3, Issue 4, April 2015, Pg. 188-195.
Framework for Client Side AES Encryption Technique in Cloud Computing”, IEEE International Advanced Computing Conference, IACC 2015.
Two-Level Encryption based on One-Time Pad and Koblitz Method of Encoding”, International Journal of Computer Applications, Volume 122, 10.5120/21773-5041.
Designing a database encryption technique for a database security solution with cache, IEEE International Advanced Computing Conference, IACC 2015.
Novel Unique Technique for generating Ticket Identifier Using Image Texture Patterns, International Journal of Engineering Research and Applications, vol 4, Issue 5, May 2014.
High-speed access of XML documents, International Conference held on 4th and 5th March 2009.
Exploring the feasibility of graphical Passwords, in the National Conference on Advances in Engineering, Management and General Sciences, held on 28-29 April 2011.
Advances in Software Engineering, in the National Conference on Advances in Engineering, Management and General Sciences, held on 28-29 April 2011.
Bitmap Indexing, Clustering and Compression for XML documents”, National conference on Emerging Trends in Engineering and Management, held on 3rd and 4th of March 2008.
Cryptanalysis of Mobile Agents, in the National Conference on Emerging Trends in Electronics and Telecommunication, held on 16th and 17th April 2007.
Statistical Analysis, Bitmap Indexing and Compression for XML Authorization and Query Optimization, National conference held on 23-24 Nov 2007.
Other Contribution
Reviewed Papers of IEEE International conference on computing, communication, control, and Automation -2015.
Co-chaired the session in ICCUBEA 2015.
Reviewed papers for the IEEE International Conference on Information Processing
Track chair for Computer, Communication and Security track in International Conference on Computing, Communication, Control and Automation -2016.
Session chair for Computer, Communication, and Security track in the International Conference on Computing, Communication, Control and Automation -2014