Back close

Dr. Praveen K.

Assistant Professor, TIFAC-CORE in Cyber Security, Coimbatore

Qualification: M.Tech., Ph.D
k_praveen@cb.amrita.edu
Research Interest: Android Security, System Security, Visual Cryptography

Bio

Dr.  Praveen K. currently serves as Assistant Professor at TIFAC-CORE in Cyber Security, Coimbatore Campus.  He pursued his M.Tech Cyber Security from Amrita Vishwa Vidyapeetham Coimbatore.

Teaching

OS/Android/Database Security, Computer Architecture

Funded Projects Involved

  1. Development of Visual Cryptographic Schemes (ISRO Project)
  2. Design and Analysis of Stream Ciphers (ISRO Project)

 

Publications

Journal Article

Year : 2017

Visual cryptographic schemes using combined Boolean operations

Cite this Research Publication : K. Praveen, Sethumadhavan, M., and Krishnan, R., “Visual cryptographic schemes using combined Boolean operations”, Journal of Discrete Mathematical Sciences and Cryptography, vol. 20, pp. 413-437, 2017.

Publisher : Journal of Discrete Mathematical Sciences and Cryptography

Year : 2017

An Android Application for Secret Image Sharing with Cloud Storage

Cite this Research Publication : K. Praveen, Indu, G., Santhya, R., and Sethumadhavan, M., “An Android Application for Secret Image Sharing with Cloud Storage”, Communications in Computer and Information Science, vol. 746, pp. 399-410, 2017.

Publisher : Communications in Computer and Information Science

Year : 2016

Android smudge attack prevention techniques

Cite this Research Publication : M. D. Amruth and Praveen, K., “Android smudge attack prevention techniques”, Advances in Intelligent Systems and Computing, vol. 385, pp. 23-31, 2016.

Publisher : Advances in Intelligent Systems and Computing, Springer Verlag,

Year : 2015

A low overhead prevention of android web view abuse attacks

Publisher : Communications in Computer and Information Science

Year : 2015

A Hybrid Approach for Querying Numeric data in DAS-Model

Publisher : International Journal of Control Theory and Applications

Year : 2013

Analyzing the Makier Virus

Cite this Research Publication : Ritwik Murali and K., P., “Analyzing the Makier Virus ”, IJCSI International Journal of Computer Science Issues, vol. 10, Issue 2, no. 1, 2013.

Publisher : International Journal of Computer Science

Year : 2012

A distortion free relational database watermarking using patch work method

Cite this Research Publication : R. Arun, Nath, H. V., Bose, D. Chandra, and Praveen, K., “A distortion free relational database watermarking using patch work method (2012)”, In Proceedings of the International Conference on Information Systems Design and Intelligent Applications. Springer Berlin Heidelberg, pp. 531-538, 2012.

Publisher : Advances in Intelligent and Soft Computing

Conference Proceedings

Year : 2016

Ideal Contrast Visual Cryptography for General Access Structures with AND Operation.

Cite this Research Publication : K. Praveen and Dr. M. Sethumadhavan, “Ideal Contrast Visual Cryptography for General Access Structures with AND Operation.”, In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015, vol. 2, 44 vol. Springer India, New Delhi, 2016.

Publisher : In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics: ICACNI 2015, Springer India.

Year : 2014

On the Extensions of (k, n)*-Visual Cryptographic Schemes

Cite this Research Publication : K. Praveen, Dr. M. Sethumadhavan, and Rajeev, K., “On the Extensions of (k, n)*-Visual Cryptographic Schemes”, In Recent Trends in Computer Networks and Distributed Systems Security. Springer Berlin Heidelberg, pp. 231-238, 2014.

Publisher : In Recent Trends in Computer Networks and Distributed Systems Security

Year : 2013

An Application of Vector Decomposition problem in Public key Cryptography using homomarphic Encryption

Cite this Research Publication : K. Praveen and Dr. M. Sethumadhavan, “An Application of Vector Decomposition problem in Public key Cryptography using homomarphic Encryption”, International Conference on Emerging Research in Computing Information Communication and Applications. Meenakshi Institute of Technology, Bangalore, 2013.

Publisher : International Conference on Emerging Research in Computing Information Communication and Applications

Book Chapter

Year : 2016

Role-Based Access Control for Encrypted Data Using Vector Decomposition

Cite this Research Publication : D. Nidhin, I. Praveen, and Praveen, K., “Role-Based Access Control for Encrypted Data Using Vector Decomposition”, in Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015, Volume 2, P. L. Suresh and Panigrahi, K. Bijaya, Eds. New Delhi: Springer India, 2016, pp. 123–131.

Publisher : Proceedings of the International Conference on Soft Computing Systems: ICSCS 2015,

Year : 2016

Protecting the Augmented Browser Extension from Mutation Cross-Site Scripting

Cite this Research Publication : S. Remya and Praveen, K., “Protecting the Augmented Browser Extension from Mutation Cross-Site Scripting”, in Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015, Volume 1, C. Suresh Satapathy, Raju, S. K., Mandal, K. Jyotsna, and Bhateja, V., Eds. New Delhi: Springer India, 2016, pp. 215–223.

Publisher : Proceedings of the Second International Conference on Computer and Communication Technologies: IC3T 2015.

Year : 2015

A (t, n) Secure Sum Multiparty Computation Protocol Using Multivariate Polynomial Secret Sharing Scheme

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 1

Year : 2015

Secretly Shared QR Code and Its Applications

Publisher : Artificial Intelligence and Evolutionary Algorithms in Engineering Systems: Proceedings of ICAEES 2014, Volume 2

Year : 2014

Results on (2, n) Visual Cryptographic Scheme

Cite this Research Publication : K. Praveen and Dr. M. Sethumadhavan, “Results on (2, n) Visual Cryptographic Scheme”, in Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings, J. Lloret Mauri, Thampi, S. M., Rawat, D. B., and Jin, D., Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2014, pp. 335–340.

Publisher : Security in Computing and Communications: Second International Symposium, SSCC 2014, Delhi, India, September 24-27, 2014. Proceedings

Year : 2014

A Probabilistic Essential Visual Cryptographic Scheme for Plural Secret Images

Cite this Research Publication : K. Praveen and Dr. M. Sethumadhavan, “A Probabilistic Essential Visual Cryptographic Scheme for Plural Secret Images”, in Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014), M. Kumar Kundu, Mohapatra, P. Durga, Konar, A., and Chakraborty, A., Eds. Cham: Springer International Publishing, 2014, pp. 225–231.

Publisher : Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on Advanced Computing, Networking and Informatics (ICACNI-2014)

Year : 2012

Block Dependency Feature Based Classification Scheme for Uncalibrated Image Steganalysis

Cite this Research Publication : D. D. Shankar, Dr. Gireesh K. T., Praveen, K., Jithin, R., and Raj, A. S., “Block Dependency Feature Based Classification Scheme for Uncalibrated Image Steganalysis”, in Data Engineering and Management: Second International Conference, ICDEM 2010, Tiruchirappalli, India, July 29-31, 2010. Revised Selected Papers, R. Kannan and Andres, F., Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 189–195.

Publisher : Springer Berlin Heidelberg

Year : 2011

Correlation of Alerts Using Prerequisites and Consequences for Intrusion Detection

Cite this Research Publication : S. Mallissery, Praveen, K., and Sathar, S., “Correlation of Alerts Using Prerequisites and Consequences for Intrusion Detection”, in Computational Intelligence and Information Technology: First International Conference, CIIT 2011, Pune, India, November 7-8, 2011. Proceedings, V. V. Das and Thankachan, N., Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011, pp. 662–666.

Publisher : CIIT 2011

Admissions Apply Now