Back close
Block Image

Area of Research

The centre is pursuing various research projects with Govt. agencies in the areas of Encryption, Visual cryptography, Steganalysis, Secure Coding, Web security, Intrusion Detection and Prevention. Our M.Tech students work as interns in premier Security companies in their final semester for completing their thesis work relating theory to practice and become conversant with all aspects of Security – theoretical, developmental, research and operational.

Block Image
  • Cryptography and Cryptanalysis
  • Steganography and Steganalysis
  • Cloud Security
  • Digital Forensics
  • Web Security
  • Mobile Security
  • Information Hiding
  • Machine Learning
  • Visual Cryptography and Secret Sharing
  • Operating System Security
  • Big Data Security
  • Data Base Security
  • Blockchain Technology
  • Cyber Forensics

Sponsored Projects

 

Sl. No R&D PROJECTS Funding Agency
1. Development of Secure and Authenticated Encryption Scheme for Lightweight Applications DeitY
2. Predictive Threat Evaluation in Complex IT Systems DRDO
3. Development of Fast and Effective Cryptographic Techniques ISRO
4. Design and Analysis of Cryptographically Secure Pseudorandom Number Generators DRDO
5. VLSI Development of Finite Field Arithmetic NTRO
6. Next Generation Secure Internet Technologies for Globally Distributed Enterprises DST
7. Analysis of Word Based Stream Ciphers ISRO
8. Error Linear Complexity Measures for Multisequences ISRO
9. Classified Image Transmission Systems SAG, DRDO
10. Indo-Trento Project on Distributed Software Engineering TIFR
11. Hardware based Network Intrusion Detection Systems for High Speed Networks ISRO
12. An ISRO Sponsored Project on Cryptography ISRO
13. Development of Visual Cryptographic Schemes ISRO

Book Chapter

A Novel Approach for Compressed Video Steganography

Publisher : Recent Trends in Network Security and Applications: Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings

Block Dependency Feature Based Classification Scheme for Uncalibrated Image Steganalysis

Publisher : Data Engineering and Management: Second International Conference, ICDEM 2010, Tiruchirappalli, India, July 29-31, 2010. Revised Selected Papers

Correlation of Alerts Using Prerequisites and Consequences for Intrusion Detection

Publisher : Computational Intelligence and Information Technology: First International Conference, CIIT 2011, Pune, India, November 7-8, 2011. Proceedings

Analysis of Algebraic Attack on TRIVIUM and Minute Modification to TRIVIUM

Publisher : Advances in Network Security and Applications: 4th International Conference, CNSA 2011, Chennai, India, July 15-17, 2011

Using Signature for Hidden Communication Prevention in IP Telephony

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2

A Novel Method for Secure Image Steganography

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

Secretly Shared QR Code and Its Applications

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2

A (t, n) Secure Sum Multiparty Computation Protocol Using Multivariate Polynomial Secret Sharing Scheme

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

A Survey of Location Prediction Using Trajectory Mining

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

Role-Based Access Control for Encrypted Data Using Vector Decomposition

Publisher : Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2

A Model for the Effective Steganalysis of VoIP

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2

Steganalysis of LSB Using Energy Function

Publisher : Intelligent Systems Technologies and Applications: Volume 1

Information Hiding in H.264, H.265, and MJPEG

Publisher : Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2

Active Warden Attack on Steganography Using Prewitt Filter

Publisher : Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2

Ideal Contrast Visual Cryptography for General Access Structures with AND Operation.

Publisher : In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015

Protecting the Augmented Browser Extension from Mutation Cross-Site Scripting

Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, Volume 1

Complexity Measures of Cryptographically Secure Boolean Functions

Publisher : Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives

A Survey on Digital Image Steganographic Methods

Publisher : Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives: Applications and Perspectives

Results on (2, n) Visual Cryptographic Scheme

Publisher : Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings

A Probabilistic Essential Visual Cryptographic Scheme for Plural Secret Images

Publisher : Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014)

Conference Paper

A More Efficient and Faster Pairing Computation with Cryptographic Security

Publisher : Proceedings of the First International Conference on Security of Internet of Things

Reconciliation engine and metric for network vulnerability assessment

Publisher : ACM International Conference Proceeding Series

Multi-Level Steganography for Smart phones

Publisher : Networks Soft Computing (ICNSC), 2014 First International Conference on

Novel mutual authentication protocol for cloud computing using secret sharing and steganography

Publisher : 5th International Conference on the Applications of Digital Information and Web Technologies, ICADIWT 2014

Facial Expression Classification Using Machine Learning Approach: A Review

Publisher : Advances in Intelligent Systems and Computing

Conference Proceedings

Non linear secret sharing for gray scale images

Publisher : Procedia Engineering

Ideal Contrast Visual Cryptography for General Access Structures with AND Operation.

Publisher : In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015

On the k-error Joint Linear Complexity and Error Multisequence over F q (char F q= p, prime)

Publisher : In Recent Trends in Computer Networks and Distributed Systems Security, Springer Berlin Heidelberg

On the Extensions of (k, n)*-Visual Cryptographic Schemes

Publisher : In Recent Trends in Computer Networks and Distributed Systems Security

A Framework for Analysing the Security of Chrome Extensions

Publisher : In Advanced Computing, Networking and Informatics

An Application of Vector Decomposition problem in Public key Cryptography using homomarphic Encryption

Publisher : International Conference on Emerging Research in Computing Information Communication and Applications

A distortion free relational database watermarking using patch work method (2012)

Publisher : In Proceedings of the International Conference on Information Systems Design and Intelligent Applications

Journal Article

On the k-error Joint Linear Complexity and Error Multisequence over F

Publisher : Communications in Computer and Information Science

Self Localization of a Mobile Robot in Planetary Terrain

Publisher : International Journal of Embedded Systems and Computer Engineering

Stride based analysis of the chrome browser extensions API

Publisher : Advances in Intelligent Systems and Computing

Payload Estimation in Universal Steganalysis

Publisher : Defence Science Journal

A low overhead prevention of android web view abuse attacks

Publisher : Communications in Computer and Information Science

A Hybrid Approach for Querying Numeric data in DAS-Model

Publisher : International Journal of Control Theory and Applications

An algorithm for k-error joint linear complexity of binary multisequences

Publisher : Journal of Discrete Mathematical Sciences and Cryptography

Hash-One: a lightweight cryptographic hash function

Publisher : IET Information Security

Android smudge attack prevention techniques

Publisher : Advances in Intelligent Systems and Computing

A compressed video steganography using TPVD

Publisher : International Journal of Database Management Systems (IJDMS) Vol

A Survey on Digital Image Steganographic Methods

Publisher : Cyber Security, Cyber Crime and Cyber Forensics: Applications and Perspectives: Applications and Perspectives

Active steganalysis on svd-based embedding algorithm

Publisher : Advances in Intelligent Systems and Computing

A Selective Generation of Hybrid Random Numbers via Android Smart Phones

Publisher : International Journal of Pure and Applied Mathematics

Partial Password Authentication using Vector Decomposition

Publisher : International Journal of Pure and Applied Mathematics

Spatial Outlier Detection Algorithm for Trajectory Data

Publisher : International Journal of Pure and Applied Mathematics

Cube Attack on Stream Ciphers using a Modified Linearity Test

Publisher : Journal of Discrete Mathematical Sciences and Cryptography

The Art of Piecewise Hashing: A step toward better evidence provability

Publisher : Journal of Cyber Security and Mobility

String based Feature Representation for Trajectory Clustering

Publisher : International Journal of Embedded and Real-Time Communication Systems (IJERTCS)

Visual cryptographic schemes using combined Boolean operations

Publisher : Journal of Discrete Mathematical Sciences and Cryptography

Analyzing the Makier Virus

Publisher : International Journal of Computer Science

Linear Complexity Measures of Binary Multisequences

Publisher : International Journal of Computer Applications

Optimally Locating for Hiding Information in Audio Signal

Publisher : International Journal of Computer Applications

Clustering of trajectory data using hierarchical approaches

Publisher : Lecture Notes in Computational Vision and Biomechanics

Sequences; Predictability and Linear Complexity Measures

Publisher : Discrete Mathematics and Its Applications

A construction of p-ary balanced sequence with large k-error linear complexity

Publisher : Journal of Discrete Mathematical Sciences and Cryptography

Other

Certain Investigations On Securing Moving Data Objects

Publisher : International Journal of Innovative Research in Science, Engineering and Technology (IJIRSET)

From Facebook to Safebook : Review on Methods For Social Network Data Protection

Publisher : International Advanced Research journal in Science, Engineering and Technology (IARJSET)

Investigations on Methods Evolved for Protecting Sensitive Data

Publisher : International Advanced Research Journal In Science, Engineering And Technology (IARJSET)

Image Steganographic Scheme Based On Modified Tri-way PVD in Orthogonal Domain

Publisher : Indo-US Conference and Workshop on Cyber Security, Cyber Crime and Cyber Forensics

Mobile Robot Pose Estimation Based on Particle Filters for Multi-dimensional State Spaces

Publisher : Communications in Computer and Information Science

Low Budget Honeynet Creation and Implementation for Nids and Nips

Publisher : (IJCNS) International Journal of Computer and Network Security

Feature based Classification System for Image Steganalysis

Publisher : International Conference on Computer Communication and Network 2010

Feature based steganalysis using wavelet decomposition and magnitude statistics

Publisher : ACE 2010 – 2010 International Conference on Advances in Computer Engineering

Secure Seed-Based Sturdy OTP via Convenient Carry-on Device

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

A Novel Authentication Framework for Hadoop

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

A Probabilistic Method Toward SLAM for Mobile Robotic Systems

Publisher : Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 1

Response Time Analysis for Querying Data on Order Preserved Encrypted Buckets

Publisher : International Journal of Control Theory and Applications

A Quasigroup Based Synchronous Stream Cipher for Lightweight Applications

Publisher : Communications in Computer and Information Science

Steganalysis for calibrated and lower embedded uncalibrated images

Publisher : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Prevention of PAC File Based Attack Using DHCP Snooping

Publisher : Communications in Computer and Information Science

Tracking of nose tip: An alternative for mouse

Publisher : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Network Intrusion Detection System Based On Machine Learning Algorithms

Publisher : International Journal of Computer Science Information Technology (IJCSIT)

Survey On Privacy Preserving Data Publishing Of Numerical Sensitive Data

Publisher : International Journal of Emerging Technology Advanced Engineering

Cognitive environment for pervasive learners

Publisher : Communications in Computer and Information Science

Opaque Predicate Detection by Static Analysis of Binary Executables

Publisher : Communications in Computer and Information Science

Jordan Center Segregation: Rumors in Social Media Networks

Publisher : Security in Computing and Communications: 5th International Symposium, SSCC 2017, Manipal, India, September 13–16, 2017, Proceedings

A framework for dynamic malware analysis based on behavior artifacts

Publisher : Advances in Intelligent Systems and Computing

On federated and proof of validation based consensus algorithms in blockchain

Publisher : IOP Conference Series: Materials Science and Engineering

Gigabit Network Intrusion Detection System Using Extended Bloom Filter in Reconfigurable Hardware

Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, Volume 1

Decrypting Shared Encrypted Data Files Stored in a Cloud Using Dynamic Key Aggregation

Publisher : Computational Intelligence, Cyber Security and Computational Models: Proceedings of ICC3 2015

CBEAT: Chrome Browser Extension Analysis Tool

Publisher : Communications in Computer and Information Science

An Android Application for Secret Image Sharing with Cloud Storage

Publisher : Communications in Computer and Information Science

Student centric design for cyber security knowledge empowerment

Publisher : Proceedings – 2012 IEEE International Conference on Technology Enhanced Education, ICTEE 2012

High Speed Network Intrusion Detection System Using FPGA

Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, Volume 1

An intelligent question answering conversational agent using Na #x00EF;ve Bayesian classifier

Publisher : Technology Enhanced Education (ICTEE), 2012 IEEE International Conference on

Ideal Contrast Visual Cryptography for General Access Structures with AND Operation

Publisher : Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015, Volume 2

A study on the Corda and Ripple blockchain platforms

Publisher : Advances in Intelligent Systems and Computing

An intelligent question answering conversational agent using Naïve Bayesian classifier

Publisher : Proceedings – 2012 IEEE International Conference on Technology Enhanced Education, ICTEE 2012

A Modern approach to identify the fake news using machine learning

Publisher : International Journal of Pure and Applied Mathematics

Malware capturing and detection in dionaea honeypot

Publisher : 2017 Innovations in Power and Advanced Computing Technologies, i-PACT 2017

Maintaining the integrity of digital evidence using piecewise hashing

Publisher : International Journal of Pure and Applied Mathematics

Agent Based Ground Flight Control Using Type-2 Fuzzy Logic And Hybrid Ant Colony Optimization To A Dynamic Environment

Publisher : First International Conference on Emerging Trends in Engineering and Technology

Adding Continuous Proactive Forensics to Android

Publisher : Communications in Computer and Information Science

Self Localization and pose estimation of Mobile robot

Publisher : International journal of Embedded System and Computer Engineering

On the removal of steganographic content from images

Publisher : Defence Science Journal

A Novel Cloud Based NIDPS for Smartphones

Publisher : Communications in Computer and Information Science

Static and Dynamic Analysis for Android Malware Detection

Publisher : Advances in Big Data and Cloud Computing, Advances in Intelligent Systems and Computing

Neighbor Attack Detection in Internet of Things

Publisher : Advanced Computational and Communication Paradigms

Disk memory forensics: Analysis of memory forensics frameworks flow

Publisher : 2017 Innovations in Power and Advanced Computing Technologies, i-PACT 2017

A real time scoring system to detect and report malicious domains

Publisher : International Journal of Applied Engineering Research

SMScala: An android service manager component against malicious service launch in scala

Publisher : International Journal of Applied Engineering Research

Destroying steganography usage over HTTPS

Publisher : International Journal of Pure and Applied Mathematics

Defensive coding framework

Publisher : International Journal of Pure and Applied Mathematics

Data Hiding in Slack Space Revisited

Publisher : International Journal of Pure and Applied Mathematics

An approach for hiding in GSM Communication

Publisher : International Journal of Pure and Applied Mathematics

An investigation on HTTP/2 security

Publisher : Journal of Cyber Security and Mobility

Ransomware Analysis Using Reverse Engineering

Publisher : Communications in Computer and Information Science

Opportunistic Mobile Social Networks: Architecture, Privacy, Security Issues and Future Directions

Publisher : International Journal of Electrical and Computer Engineering

An Autonomous Obstacle Avoiding and Target Recognition Robotic System Using Kinect

Publisher : Intelligent Computing, Communication and Devices: Proceedings of ICCD 2014, Volume 1

Privilege-based scoring system against cross-site scripting using machine learning

Publisher : Advances in Intelligent Systems and Computing

IoT: Security Challenges and Mitigations

Publisher : International Journal of Recent Technology and Engineering (IJRTE)

Investigations On Method Developed For Effective Discovery Of Functional Dependencies

Publisher : International Journal of Innovative Research in Science, Engineering and Technology (IJIRCCE)

Identification of malicious android app using manifest and opcode features

Publisher : Journal of Computer Virology and Hacking Techniques

Differential Execution Analysis for Obfuscation Reduction

Publisher : In Recent Trends in Computer Networks and Distributed Systems Security

Advance Persistent Threat Detection Using Long Short Term Memory (LSTM) Neural Networks

Publisher : Communications in Computer and Information Science

A Fully Simulatable Oblivios Transfer Scheme using Vector Decomposition

Publisher : International Conference on Intelligent computing, Communication and Devices (ICCD-2014), Advances in Intelligent Systems and Computing

Vision based robot navigation for disaster scenarios

Publisher : International Journal of Computer Applications

Cheating Immune Visual Cryptographic Scheme with Reduced Pixel Expansion

Publisher : Advances in Intelligent Systems and Computing

Foreground Estimation in a Degraded Text document

Publisher : International Journal of Computer Applications

Efficient Android Malware Scanner using Hybrid Analysis

Publisher : International Journal of Recent Technology and Engineering

Frontier based multi robot area exploration using prioritized routing

Publisher : Proceedings – 30th European Conference on Modelling and Simulation, ECMS 2016

Abnormal user pattern detection using semi-structured server log file analysis

Publisher : Smart Innovation, Systems and Technologies

A Multi-agent Optimal Path Planning Approach to Robotics Environment

Publisher : International Conference on Computational Intelligence and Multimedia Applications

Admissions Apply Now