Name: Dr. Kamlesh Kumar Gupta
Designation: Associate Professor
Department: Department of Information Technology
Email: kamlesh_rjitbsf@yahoo.co.in
Mobile: 9425757684
Address: 19, Natraj Estate Alkapuri, New City Centre Gwalior(M.P), 474001
Experience: 21 Years
Date of Joining: 20-Dec-2013
Education & Qualification:
B.E. (Computer Science and Engg) from MPCT Gwalior in 2001
M. Tech. (Computer Science & Engineering) from SATI, Vidisha in 2005
Ph.D. (Computer Science and Engg) from UIT, RGPV Bhopal in 2013
Last Updated: 30-Jun-2025
S.No. | Title | Publisher | ISBN |
---|---|---|---|
1 | Swarm Intelligent and Machine Learning: Application in Healthcare | CRC Press | 9781032145822 |
Last Updated: 30-Jun-2025
S.No. | Title of FDP/STTP | Organized By | Organized At | Approved By | Duration |
---|---|---|---|---|---|
1 | Application Specific Algorithm Design And Analysis | Department of Computer Science and Engg | IIT Guwahati Organized | MHRD | One Week 07-Apr-2006 to 07-Aug-2006 |
2 | IT In Health Care | Department of Computer Science and Engg | IIT Delhi | MHRD | One Week 12-Dec-2007 to 11-Feb-2007 |
S.No. | Title of Publication | Journal | Month-Year of Publication | ISSN & DOI | No. of Co-Authors |
---|---|---|---|---|---|
1 | Performance Analysis of Image Compression Using Curvelet Tansform | Journal of Signal and Image Processing | Jan-2025 | 0976-8882 | 1 |
2 | Enhanced Security For Encrypted Image Transmission Over Communication Network: A Review | International Journal of Current Trends In Engineering & Technology | Jan-2025 | 2395-3152 | 2 |
3 | To Maintain Public Conservation for Secure Mobile Cloud Storage | Recent Trends in Programming Language | Jan-2025 | 2455-1821 | 2 |
4 | Secure Image Transmission using SHA and Route Security Methods in MANET | International Journal of Current Trends in Engineering and Technology | Jan-2025 | 2395-3152 | 2 |
5 | Improving the End-to-End Protection in E-Voting Using BVM- Block chain Based E-Voting Mechanism(SCIE Index) View Paper | Concurrency and Computation : Practice and Experience (SCIE) | Jan-2024 | online ISSN:1532-Pr DOI: 10.21203/rs.3.rs-3973544/v1 | 2 |
6 | An efficient transfer learning appeoach for prediction and classification of SARS-Covid-19 View Paper | Multimedia Tools and Applications (SCIE) | Sep-2023 | 39435–39457 DOI: https://doi.org/10.1007/s11042-023-17086-y | 2 |
7 | An efficient image encryption technique based on two-level security for internet of things View Paper | Multimedia Tools and Applications (SCIE) | Feb-2022 | 1573-7721 https://d DOI: https://doi.org/10.1007/s11042-022-12169-8 | 2 |
8 | Breast cancer-caps: A breast cancer screening system based on capsule network1 utilizing the multi-view breast thermal infrared images View Paper | Turkish Journal of Electrical Engineering & Computer Sciences (SCIE) Volume: 30, Issue: 5 | May-2022 | 1300-0632 DOI: 10.55730/1300-0632.3906 | 2 |
9 | An Intelligent Session Key?Based Hybrid Lightweight Image Encryption Algorithm Using Logistic?Tent Map and?Crossover Operator for?Internet of?Multimedia Things(SCI Index) View Paper | Wireless Personal Communications (SCIE) | Aug-2021 | 1572-834X DOI: https://doi.org/10.1007/s11277-021-08742-3 | 2 |
10 | Deep Multi-View Breast Cancer Detection: A Multi-View Concatenated Infrared Thermal Images Based Breast Cancer Detection System Using Deep Transfer Learning(SCI Index) View Paper | Traitement du Signal (SCIE) Volume: 38, Issue: 6 | Dec-2021 | 1958-5608 DOI: https://doi.org/10.18280/ts.380613 | 2 |
11 | Session Key based Novel Lightweight Image Encryption Algorithm using a hybrid of Chebyshev Chaotic map and Crossover View Paper | Multimedia Tools and Applications, Springer (SCIE) | Aug-2021 | 1573-7721 DOI: https://doi.org/10.1007/s11042-021-11160-z | 2 |
12 | Session Key based Fast, Secure and Lightweight Image Encryption Algorithm(SCI Index) View Paper | Multimedia Tools and Applications, Springer Volume: 80, Issue: 25 | Oct-2021 | 1573-7721 DOI: https://doi.org/10.1007/s11042-021-11160-z | 2 |
13 | Session Key based Image Cryptographic Algorithm using Logistic-Sine Map and Crossover Operator for IoT View Paper | Journal of Scientific Research (UGC Care) Volume: 65, Issue: 1 | Jul-2021 | DOI: 10.37398/JSR.2021.650133 | 260 |
14 | A Random Dual-Security based An Image Encryption Scheme for IoT View Paper | Journal of Scientific Research (UGC Care) Volume: 65, Issue: 1 | Jun-2021 | DOI: DOI: 10.37398/JSR.2021.650133 | 2 |
15 | The Breast Cancer Detection Approaches: A Review | International Journal of Computer Science and Network | Jan-2021 | 2277-5420 | 2 |
16 | An Optimization Approach for Transportation problem of transplant organ using Self-Adoptive Bear Hibernation Algorithm View Paper | Taylor & FrancisJournal of Information and Optimization Sciences (ESCI) Volume: 41, Issue: 2 | Apr-2020 | 0252-2667 DOI: https://doi.org/10.1080/02522667.2020.1733189 | 2 |
17 | An Effectual Classification Approach to Detect Copy-Move Forgery Using Support Vector Machines View Paper | Multimedia Tools and Applications, Springer (SCIE) | Oct-2018 | 1573-7721 DOI: https://doi.org/10.1007/s11042-018-6707-9 | 2 |
18 | Novel Underwater Image Enhancement Technique | International Journal of Innovative Technology and Exploring Engineering | Jan-2018 | 2278-3075 | 2 |
19 | Novel Approach For Image Compression Using Curvelet Transform View Paper | International Journal of Signal Processing, Image Processing and Pattern Recognition Volume: 8, Issue: 7 | Jul-2015 | 2005-4254 DOI: DOI: 10.14257/ijsip.2015.8.7.19 | 1 |
20 | An Ethical Approach of Block Based Image Encryption Using Chaotic Map View Paper | International Journal of Security and Its Applications Volume: 9, Issue: 9 | Jan-2015 | 1738-9976 DOI: http://dx.doi.org/10.14257/ijsia.2015.9.9.10 | 3 |
21 | An Effective Approach of Digital Image Watermarking For Copyright Protection View Paper | International Journal of Big Data Security Intelligence Volume: 2, Issue: 1 | Jan-2015 | 1738-9976 DOI: DOI: 10.14257/ijbdsi.2015.2.1.02 | 1 |
22 | Novel Approach For Fast Compressed Hybrid Color Image Crypto- System View Paper | Advances In Engineering Software, Elsevier (SCI) | Jan-2012 | 0965-9978 DOI: https://doi.org/10.1016/j.advengsoft.2012.03.001 | 1 |
23 | Efficient Hybrid Image Cryptosystem Using ECC And Chaotic Map View Paper | International Journal of Computer Applications Volume: 29, Issue: 3 | Jan-2011 | 0975 – 0888 DOI: 10.5120/3548-4866 | 1 |
24 | ECC Over RSA For Asymmetric Encryption: A Review View Paper | International Journal of Computer Science Issues Volume: 8, Issue: 3 | May-2011 | 1694-0814 | 1 |
25 | New Approach For Fast Color Image Encryption Using Chaotic Map View Paper | Journal of Information Security Journal of Signal and Image Processing Volume: 2, Issue: 4 | Jan-2011 | 2327- DOI: 10.4236/jis.2011.24014 | 1 |
26 | EFFICIENT IMAGE ENCRYPTION USING MRF AND ECC View Paper | International Journal of Information Technology and Knowledge Management Volume: 2, Issue: 2 | Jul-2009 | 0973-4414 | 1 |
27 | An Ethical Way Of Encrypt Data Transfer In Bluetooth Mobile Using Chaos Based Feedback Technique | IEEE Sixth International Conference On Information Technology (Scopus Indexed) | Jan-2008 | 978-0-7695-3596-8 | 2 |
S.No. | Title of Publication | Conference | Month-Year of Publication | ISBN & DOI | No. of Co-Authors |
---|---|---|---|---|---|
1 | The Classification of Breast Cancer based on Hyper-Tuned AdaBoost Ensemble Model | International conference on Machine Intelligence Techniques for Data Analysis and Signal Processing (Scopus Index) | Sep-2023 | 729-739 | 2 |
2 | Random Dual-Security based an Image Encryption Scheme for IoT | 3rd International Conference on Data, Engineering and Applications Scopus Indexed)( | Jan-2021 | 2 | |
3 | A Review on Application of Machine Learning in Medical Diagnosis | IEEE Conference IDEA-2020 (Scopus Indexed) | Jan-2020 | 2 | |
4 | An Ethical Way For Image Encryption Using ECC | IEEE First International Conference On Computational Intelligence, Communication Systems And Networks (Scopus Indexed) | Jan-2009 | 978-0-7695-3743-6/09 | 2 |
5 | Performance Analysis For Image Encryption Using ECC | IEEE International Conference On Computational Intelligence and Communication Networks (Scopus Indexed) | Jan-2008 | 978-0-7895-4254-6/10 | 2 |