Back close
Praveen-K_asst-professor_tifac-core_cyber-security_engineering_amritauniversity_coimbatore

Dr. Praveen K.

Associate Professor, TIFAC-CORE in Cyber Security, Coimbatore

Qualification: M.Tech., Ph.D
k_praveen@cb.amrita.edu
Research Interest: Android Security, System Security, Visual Cryptography

Bio

Dr.  Praveen K. currently serves as Assistant Professor (Selection Grade) at TIFAC-CORE in Cyber Security, Coimbatore Campus.  He pursued his M.Tech Cyber Security from Amrita Vishwa Vidyapeetham Coimbatore.

 

Publications

Journal Article

Year : 2024

A novel approach for long term secure storage of Domain independent videos

Cite this Research Publication : Jina Varghese, Praveen. K., Sabyasachi Dutta, and Avishek Adhikari, A novel approach for long term secure storage of Domain independent videos, Journal of Visual Communication and Image Representation (2024), Elsevier. (SCI indexed, Q1, Impact Factor: 2.6, Scopus Percentile: 73)

Publisher : Elsevier

Year : 2023

Proactive Visual Cryptographic Schemes for General Access Structures., Multimedia Tools and Applications 82 (2023)

Cite this Research Publication : Praveen, K., Sabyasachi Dutta, Avishek Adhikari, and Sethumadhavan Madathil., Proactive Visual Cryptographic Schemes for General Access Structures., Multimedia Tools and Applications 82 (2023), Springer. (SCI indexed, Q1, Impact Factor: 3, Scopus Percentile: 84, International Collaboration)

Publisher : Springer Nature Link

Year : 2023

SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier

Cite this Research Publication : Krishna, D.P., Ramaguru, R., Praveen, K., SSH-DAuth: secret sharing based decentralized OAuth using decentralized identifier, Sci Rep 13, 18335, 2023.

Year : 2018

Deterministic extended visual cryptographic schemes for general access structures with OR-AND and XOR-AND operations

Cite this Research Publication : Kanakkath, P., Madathil, S. & Krishnan, R. Deterministic extended visual cryptographic schemes for general access structures with OR-AND and XOR-AND operations. Multimed Tools Appl 78, 1315–1344 (2019). https://doi.org/10.1007/s11042-018-6158-3

Publisher : Springer

Year : 2017

Visual cryptographic schemes using combined Boolean operations

Cite this Research Publication : K. Praveen, Sethumadhavan, M., and Krishnan, R., “Visual cryptographic schemes using combined Boolean operations”, Journal of Discrete Mathematical Sciences and Cryptography, vol. 20, pp. 413-437, 2017.

Publisher : Journal of Discrete Mathematical Sciences and Cryptography

Year : 2017

An Android Application for Secret Image Sharing with Cloud Storage

Cite this Research Publication : K. Praveen, Indu, G., Santhya, R., and Sethumadhavan, M., “An Android Application for Secret Image Sharing with Cloud Storage”, Communications in Computer and Information Science, vol. 746, pp. 399-410, 2017.

Publisher : Communications in Computer and Information Science

Year : 2016

Android smudge attack prevention techniques

Cite this Research Publication : M. D. Amruth and Praveen, K., “Android smudge attack prevention techniques”, Advances in Intelligent Systems and Computing, vol. 385, pp. 23-31, 2016.

Publisher : Advances in Intelligent Systems and Computing, Springer Verlag,

Year : 2015

A low overhead prevention of android web view abuse attacks

Publisher : Communications in Computer and Information Science

Year : 2015

A Hybrid Approach for Querying Numeric data in DAS-Model

Publisher : International Journal of Control Theory and Applications

Year : 2013

Analyzing the Makier Virus

Cite this Research Publication : Ritwik Murali and K., P., “Analyzing the Makier Virus ”, IJCSI International Journal of Computer Science Issues, vol. 10, Issue 2, no. 1, 2013.

Publisher : International Journal of Computer Science

Year : 2012

A distortion free relational database watermarking using patch work method

Cite this Research Publication : R. Arun, Nath, H. V., Bose, D. Chandra, and Praveen, K., “A distortion free relational database watermarking using patch work method (2012)”, In Proceedings of the International Conference on Information Systems Design and Intelligent Applications. Springer Berlin Heidelberg, pp. 531-538, 2012.

Publisher : Advances in Intelligent and Soft Computing

Conference Paper

Year : 2024

On the Design of a Searchable Encryption Protocol for Keyword Search using Proactive Secret Sharing

Cite this Research Publication : Praveen K, Gabriel Anand K S, Indranil Ghosh Ray, Avishek Adhikari, Sabyasachi Datta and Arnab Kumar Biswas, On the Design of a Searchable Encryption Protocol for Keyword Search using Proactive Secret Sharing, 20th IEEE International Conference on e-Science 2024, Osaka, Japa

Publisher : IEEE

Year : 2023

A Novel Fragile Zero Software Watermarking Algorithm for Tamper Detection

Cite this Research Publication : Sathya Jothi, S.P., Praveen, K., Amritha, P.P., A Novel Fragile Zero Software Watermarking Algorithm for Tamper Detection, ICOEI 2023, IEEE Xplore.

Publisher : IEEE

Year : 2023

Detection of Log4j Attack in SDN Environment

Cite this Research Publication : Abilesh Raja, G., Harish, R., Praveen, K., Patel, M., Detection of Log4j Attack in SDN Environment, Lecture Notes in Networks and Systems (2023), Springer.

Publisher : Springer

Year : 2023

Classifying DNS over HTTPS Malicious/Benign Traffic Using Deep Learning Models

Cite this Research Publication : Mandar Chougule, Praveen, K., Amritha P.P, Sangeetha Viswanathan, K.S Ravichandran, M. Sethumadhavan, Masoumeh Rahimi and Amir H Gandomi., Classifying DNS over HTTPS Malicious/Benign Traffic using Deep Learning Models, 10th International Conference on Soft Computing and Machine Intelligence (ISCMI 2023), Mexico, IEEE Xplore.

Publisher : IEEE

Year : 2022

Prevention of Phishing Attacks Using QR Code Safe Authentication

Cite this Research Publication : M. Taraka Rama Mokshagna Teja, Praveen, K., Prevention of Phishing Attacks Using QR Code Safe Authentication, Inventive Communication and Computational Technologies 2022, Lecture Notes in Networks and Systems, Springer. 

Publisher : Springer

Year : 2022

Zero-Trust Security Implementation Using SDP over VPN

Cite this Research Publication : Abhiram D., Harish R., Praveen, K., Zero-Trust Security Implementation Using SDP over VPN, Inventive Communication and Computational Technologies 2022, Lecture Notes in Networks and Systems, Springer.

Publisher : Springer

Year : 2022

Identifying Key Strategies for Reconnaissance in Cyber Security

Cite this Research Publication : Vishnu, V., Praveen, K., Identifying Key Strategies for Reconnaissance in Cyber Security, Studies in Computational Intelligence (2022), Springer. 

Publisher : Springer

Year : 2021

Dynamic Watermarking Using Python AST

Cite this Research Publication : V. Vivekananthan, Praveen, K., M. Sethumadhavan., Dynamic Watermarking Using Python AST, Proceedings of International Conference on Advances in Computer Engineering and Communication Systems (2021), Springer

Publisher : Springer

Year : 2021

(t, k, n)-Deterministic Extended Visual Secret Sharing Scheme Using Combined Boolean Operations

Cite this Research Publication : L. Chandana Priya, Praveen, K., (t, k, n)-Deterministic Extended Visual Secret Sharing Scheme Using Combined Boolean Operations, Data Science and Computational Intelligence 2021, Communications in Computer and Information Science, Springer.

Publisher : Springer

Year : 2021

Evaluation of Wireless Access Point Security and Best Practices for Mitigation

Cite this Research Publication : A. M. Thomas, G. A. Kumaran, R. Ramaguru, R. Harish and K. Praveen, Evaluation of Wireless Access Point Security and Best Practices for Mitigation, 2021 5th International Conference on Electrical, Electronics, Communication, Computer Technologies and Optimization Techniques (ICEECCOT), Mysuru, India, 2021

Publisher : IEEE

Year : 2020

Application of Visual Cryptography Scheme in Software Watermarking

Cite this Research Publication : R. M. Jacob, Praveen, K., Amritha. P.P., Application of Visual Cryptography Scheme in Software Watermarking, ICOEI 2020, IEEE Xplore

Publisher : IEEE

Year : 2020

Towards the Detection of Phishing Attacks

Cite this Research Publication : Athulya. A.A., Praveen, K., Towards the Detection of Phishing Attacks, ICOEI 2020, IEEE Xplore.

Publisher : IEEE

Year : 2020

Role Mining in Distributed Firewall Using Matrix Factorization Methods

Cite this Research Publication : Aravind. D. D., Praveen, K., Role Mining in Distributed Firewall Using Matrix Factorization Methods, ICOEI 2020, IEEE Xplore.

Publisher : IEEE

Year : 2020

Application of Secret Sharing Scheme in Software Watermarking

Cite this Research Publication : Aiswarya K.K., Praveen, K., Amritha P.P., Sethumadhavan M., Application of Secret Sharing Scheme in Software Watermarking, ICTIS 2020. Smart Innovation, Systems and Technologies, Springer.

Publisher : Springer

Year : 2019

Fraud Detection in Medical Insurance Claim with Privacy Preserving Data Publishing in TLS-N Using Blockchain

Cite this Research Publication : Mohan, Thanusree, Praveen, K., Fraud Detection in Medical Insurance Claim with Privacy Preserving Data Publishing in TLS-N Using Blockchain, ICACDS 2019, Communications in Computer and Information Science, Springer.

Publisher : Springer

Year : 2019

Data Obfuscation Using Secret Sharing

Cite this Research Publication : Sidhardhan, Manasa, Praveen, K., Data Obfuscation Using Secret Sharing, ICAICR 2019, Communications in Computer and Information Science, Springer.

Publisher : Springer

Year : 2019

PUF Authentication using Visual Secret Sharing Scheme

Cite this Research Publication : Naveen, Devarapalli, Praveen, K., PUF Authentication using Visual Secret Sharing Scheme, ICACCS 2019, IEEE Xplore. 

Publisher : IEEE

Year : 2019

Variant of Nearest Neighborhood Fingerprint Storage System by Reducing Redundancies

Cite this Research Publication : Anjana, K., Praveen, K., et al., Variant of Nearest Neighborhood Fingerprint Storage System by Reducing Redundancies, Intelligent Systems, Technologies and Applications 2019, Advances in Intelligent Systems and Computing, Springer. 

Publisher : Springer

Year : 2019

Preserving the Privacy of Audio File Using Ideal Secret Sharing Scheme with Cloud Storage

Cite this Research Publication : Mohan, Meghna Ashoka, T. V. Jayakumar, Praveen, K., Preserving the Privacy of Audio File Using Ideal Secret Sharing Scheme with Cloud Storage, ICSCSP 2019, Advances in Intelligent Systems and Computing, Springer.

Publisher : Springer

Year : 2018

Cheating Immune Visual Cryptographic Scheme with Reduced Pixel Expansion

Cite this Research Publication : Praveen, K., M. Sethumadhavan., Cheating immune visual cryptographic scheme with reduced pixel expansion, Progress in Advanced Computing and Intelligent Engineering 2018, Advances in Intelligent Systems and Computing, Springer.

Publisher : Advances in Intelligent Systems and Computing

Year : 2017

On The Extension Of Xor Step Construction For Optimal Contrast Grey Level Visual Cryptography

Cite this Research Publication : Praveen, K., M. Sethumadhavan., On the extension of XOR step construction for optimal contrast grey level visual cryptography, ICACCI 2017. IEEE Xplore.

Publisher : IEEE

Year : 2017

OR Operation Based Deterministic Extended Visual Cryptography Using Complementary Cover Images

Cite this Research Publication : Praveen, K., G. Indhu,M. Sethumadhavan., OR Operation Based Deterministic Extended Visual Cryptography Using Complementary Cover Images, ISTA 2017, Advances in Intelligent Systems and Computing, Springer.

Publisher : Springer

Conference Proceedings

Year : 2016

Ideal Contrast Visual Cryptography for General Access Structures with AND Operation.

Cite this Research Publication : K. Praveen and Dr. M. Sethumadhavan, “Ideal Contrast Visual Cryptography for General Access Structures with AND Operation.”, In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015, vol. 2, 44 vol. Springer India, New Delhi, 2016.

Publisher : In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015, Springer India.

Year : 2014

On the Extensions of (k, n)*-Visual Cryptographic Schemes

Cite this Research Publication : K. Praveen, Dr. M. Sethumadhavan, and Rajeev, K., “On the Extensions of (k, n)*-Visual Cryptographic Schemes”, In Recent Trends in Computer Networks and Distributed Systems Security. Springer Berlin Heidelberg, pp. 231-238, 2014.

Publisher : In Recent Trends in Computer Networks and Distributed Systems Security

Year : 2013

An Application of Vector Decomposition problem in Public key Cryptography using homomarphic Encryption

Cite this Research Publication : K. Praveen and Dr. M. Sethumadhavan, “An Application of Vector Decomposition problem in Public key Cryptography using homomarphic Encryption”, International Conference on Emerging Research in Computing Information Communication and Applications. Meenakshi Institute of Technology, Bangalore, 2013.

Publisher : International Conference on Emerging Research in Computing Information Communication and Applications

Book Chapter

Year : 2016

Role-Based Access Control for Encrypted Data Using Vector Decomposition

Cite this Research Publication : D. Nidhin, I. Praveen, and Praveen, K., “Role-Based Access Control for Encrypted Data Using Vector Decomposition”, in Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2, P. L. Suresh and Panigrahi, K. Bijaya, Eds. New Delhi: Springer India, 2016, pp. 123–131.

Publisher : Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015,

Year : 2016

Protecting the Augmented Browser Extension from Mutation Cross-Site Scripting

Cite this Research Publication : S. Remya and Praveen, K., “Protecting the Augmented Browser Extension from Mutation Cross-Site Scripting”, in Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, Volume 1, C. Suresh Satapathy, Raju, S. K., Mandal, K. Jyotsna, and Bhateja, V., Eds. New Delhi: Springer India, 2016, pp. 215–223.

Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015.

Year : 2015

A (t, n) Secure Sum Multiparty Computation Protocol Using Multivariate Polynomial Secret Sharing Scheme

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

Year : 2015

Secretly Shared QR Code and Its Applications

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2

Year : 2014

Results on (2, n) Visual Cryptographic Scheme

Cite this Research Publication : K. Praveen and Dr. M. Sethumadhavan, “Results on (2, n) Visual Cryptographic Scheme”, in Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings, J. Lloret Mauri, Thampi, S. M., Rawat, D. B., and Jin, D., Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014, pp. 335–340.

Publisher : Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings

Year : 2014

A Probabilistic Essential Visual Cryptographic Scheme for Plural Secret Images

Cite this Research Publication : K. Praveen and Dr. M. Sethumadhavan, “A Probabilistic Essential Visual Cryptographic Scheme for Plural Secret Images”, in Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014), M. Kumar Kundu, Mohapatra, P. Durga, Konar, A., and Chakraborty, A., Eds. Cham: Springer International Publishing, 2014, pp. 225–231.

Publisher : Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014)

Year : 2012

Block Dependency Feature Based Classification Scheme for Uncalibrated Image Steganalysis

Cite this Research Publication : D. D. Shankar, Dr. Gireesh K. T., Praveen, K., Jithin, R., and Raj, A. S., “Block Dependency Feature Based Classification Scheme for Uncalibrated Image Steganalysis”, in Data Engineering and Management: Second International Conference, ICDEM 2010, Tiruchirappalli, India, July 29-31, 2010. Revised Selected Papers, R. Kannan and Andres, F., Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 189–195.

Publisher : Springer Berlin Heidelberg

Year : 2011

Correlation of Alerts Using Prerequisites and Consequences for Intrusion Detection

Cite this Research Publication : S. Mallissery, Praveen, K., and Sathar, S., “Correlation of Alerts Using Prerequisites and Consequences for Intrusion Detection”, in Computational Intelligence and Information Technology: First International Conference, CIIT 2011, Pune, India, November 7-8, 2011. Proceedings, V. V. Das and Thankachan, N., Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 662–666.

Publisher : CIIT 2011

Teaching
  • OS
  • Android
  • Database Security
  • Computer Architecture
Funded Projects Involved
  • Development of Visual Cryptographic Schemes (ISRO Project)
  • Design and Analysis of Stream Ciphers (ISRO Project)
Achievements

Academic achievements

  • 2019. Doctor of Philosophy, Amrita Vishwa Vidyapeetham (AVV), India
  • 2009. Master of Technology in Cyber Security, AVV, India
  • 2006. Bachelor of Technology in Information Technology, University of Calicut, Kerala, India

 

Activities

Professional activities

  • 2010 to date. Assistant Professor, Amrita Vishwa Vidyapeetham, India
  • 2009 to 2010. Research Associate, Amrita Vishwa Vidyapeetham, India
  • 2006 to 2007. Lecturer, K.M.C.T College of Engineering, Kerala, India

Academic Activities

  • Since 2010 following subjects have been taught to graduates and postgraduate students: Operating System Security, Database Security, Network Security, Android Security, Secure Coding, Computer Architecture, Programming (C, CPP, Java, and Python)

Participation in Research Projects as Co-Investigator

  • An Integrated Approach for Protection of Software based on Watermarking and Obfuscation, Centre for Artificial Intelligence and Robotics, Defence Research and Development Organization, India.
  • Development of Visual Cryptographic Schemes, Dept of Space, India.
  • Design and analysis of a hardware-oriented block cipher, Dept of Space, India.
  • Securing Data Provenance using Blockchain, Ensurity Technologies Pvt. Ltd, India.
Workshops

Invited Talks/ Workshops Attended:

  • Resource person for Short Term Training Programme on Emerging Trends in Cryptography and its Applications in Cyber Security at Vidya Academy of Science and Technology Kerala
  • Coordinator for Formal methods for System Software at Amrita Vishwa Vidyapeetham (AVV)
  • Attended Workshop on Algorithms and Large Scale Computations in Cryptology at AVV
  • Coordinator for Android Security Workshop at AVV
  • Attended Workshop on Hadoop and Map Reduce for Big Data at C- DAC Bangalore
  • Attended ISTE Workshop on Database Management Systems at IIT Bombay
  • Attended a Workshop on Linear Algebra and its applications at NIT Calicut
  • Attended a Cyber Defence Symposium at AVV
  • Attended a Colloquium on Information Systems Security at AVV
  • Attended a National Level Instructional Workshop on Cryptology at AVV
Admissions Apply Now