RJIT Header

Faculty Profile

Profile Photo

Name: Dr. Kamlesh Kumar Gupta

Designation: Associate Professor

Department: Department of Information Technology

Email: kamlesh_rjitbsf@yahoo.co.in

Mobile: 9425757684

Address: 19, Natraj Estate Alkapuri, New City Centre Gwalior(M.P), 474001

Experience: 21 Years

Date of Joining: 20-Dec-2013

Education & Qualification:

B.E. (Computer Science and Engg) from MPCT Gwalior in 2001

M. Tech. (Computer Science & Engineering) from SATI, Vidisha in 2005

Ph.D. (Computer Science and Engg) from UIT, RGPV Bhopal in 2013

Google Scholar ID: kamleshrjitbsf1@gmail.com
ORCID: 0000-0002-9385-689X
Research Interests: Image Security and Cryptography
Publication Count: 44

Last Updated: 30-Jun-2025

S.No.TitlePublisherISBN
1Swarm Intelligent and Machine Learning: Application in HealthcareCRC Press9781032145822

Last Updated: 30-Jun-2025

  • Board of Study of CSE/IT/MCA, RGPV Bhopal
  • IETE
  • Life Membership of ACM
  • Life Membership of IETE
  • Nominate as Member of Boards of Study of Computer Science & Engg. and Information Technology in RGPV, Bhopal from 2018 to till date.
  • Nominate as Member of Boards of Study of Computer Science & Engg in Mandsour University, Mandsour MP from 2019 to till date.
  • Registered as Ph. D. Research Guide of Different University like RGPV, Bhopal, Amity University Gwalior.
  • Graduate Aptitude Test of Engineering (GATE) with 85.59 Percentile in 2002.
  • Appointed as subject expert (CSE/IT) for central ME/M. Tech counseling, 2008, 2009 at RGPV, Bhopal.
  • Appointed as External Expert (CSE/IT) for ME/M. Tech Thesis Evaluation and examiner of RGPV, Bhopal.
  • Appointed as External Expert (Computer Science & Engg.) for Ph. D. Thesis Evaluation and examiner at Thapar University Patiyala, Punjab
  • Appointed as External Expert (Computer Science & Engg.) for Ph. D. Thesis Evaluation and examiner at Sushant University Noida, UP
  • Appointed as External Expert (Diploma/Graduate/ Post-Graduate.) at Makhanlal Chaturvedi National University of Journalism & Communication, Bhopal.
  • Outstanding performance to introduce Computer Science and Engg. Branch in RJIT and Fill up 100% seats in all branches
  • Active Contribution in Counseling and Admission -2014 as Nodal Counseling Officers
  • Sincere efforts & guiding students to participate in E-Summit-18 at IIT, Bombay, as results of student secured 10th position in the summit in Jamn-2018
  • Active Contribution in Counseling and Admission -2020 as Principal RJIT.
  • 100% result in subject of (IT-402, Computer System Organization)
  • 100% Result in subject of (CS-402, Computer System Organization)
  • 100% result in subject of (CS 405, Theory of Computer Science)
  • A New GUI based Lightweight Encryption Algorithm based on Random Key for Secure IoT
S.No.Title of FDP/STTPOrganized ByOrganized AtApproved ByDuration
1Application Specific Algorithm Design And Analysis Department of Computer Science and EnggIIT Guwahati Organized MHRDOne Week
07-Apr-2006
to
07-Aug-2006
2IT In Health CareDepartment of Computer Science and EnggIIT DelhiMHRDOne Week
12-Dec-2007
to
11-Feb-2007
S.No.Title of PublicationJournalMonth-Year of PublicationISSN & DOINo. of Co-Authors
1Performance Analysis of Image Compression Using Curvelet TansformJournal of Signal and Image ProcessingJan-20250976-88821
2Enhanced Security For Encrypted Image Transmission Over Communication Network: A ReviewInternational Journal of Current Trends In Engineering & Technology Jan-20252395-31522
3To Maintain Public Conservation for Secure Mobile Cloud StorageRecent Trends in Programming LanguageJan-20252455-18212
4Secure Image Transmission using SHA and Route Security Methods in MANETInternational Journal of Current Trends in Engineering and TechnologyJan-20252395-31522
5Improving the End-to-End Protection in E-Voting Using BVM- Block chain Based E-Voting Mechanism(SCIE Index)
View Paper
Concurrency and Computation : Practice and Experience (SCIE)Jan-2024online ISSN:1532-Pr
DOI: 10.21203/rs.3.rs-3973544/v1
2
6An efficient transfer learning appeoach for prediction and classification of SARS-Covid-19
View Paper
Multimedia Tools and Applications (SCIE)Sep-202339435–39457
DOI: https://doi.org/10.1007/s11042-023-17086-y
2
7An efficient image encryption technique based on two-level security for internet of things
View Paper
Multimedia Tools and Applications (SCIE)Feb-20221573-7721 https://d
DOI: https://doi.org/10.1007/s11042-022-12169-8
2
8Breast cancer-caps: A breast cancer screening system based on capsule network1 utilizing the multi-view breast thermal infrared images
View Paper
Turkish Journal of Electrical Engineering & Computer Sciences (SCIE)
Volume: 30, Issue: 5
May-20221300-0632
DOI: 10.55730/1300-0632.3906
2
9An Intelligent Session Key?Based Hybrid Lightweight Image Encryption Algorithm Using Logistic?Tent Map and?Crossover Operator for?Internet of?Multimedia Things(SCI Index)
View Paper
Wireless Personal Communications (SCIE)Aug-20211572-834X
DOI: https://doi.org/10.1007/s11277-021-08742-3
2
10Deep Multi-View Breast Cancer Detection: A Multi-View Concatenated Infrared Thermal Images Based Breast Cancer Detection System Using Deep Transfer Learning(SCI Index)
View Paper
Traitement du Signal (SCIE)
Volume: 38, Issue: 6
Dec-20211958-5608
DOI: https://doi.org/10.18280/ts.380613
2
11Session Key based Novel Lightweight Image Encryption Algorithm using a hybrid of Chebyshev Chaotic map and Crossover
View Paper
Multimedia Tools and Applications, Springer (SCIE)Aug-20211573-7721
DOI: https://doi.org/10.1007/s11042-021-11160-z
2
12Session Key based Fast, Secure and Lightweight Image Encryption Algorithm(SCI Index)
View Paper
Multimedia Tools and Applications, Springer
Volume: 80, Issue: 25
Oct-20211573-7721
DOI: https://doi.org/10.1007/s11042-021-11160-z
2
13Session Key based Image Cryptographic Algorithm using Logistic-Sine Map and Crossover Operator for IoT
View Paper
Journal of Scientific Research (UGC Care)
Volume: 65, Issue: 1
Jul-2021
DOI: 10.37398/JSR.2021.650133
260
14A Random Dual-Security based An Image Encryption Scheme for IoT
View Paper
Journal of Scientific Research (UGC Care)
Volume: 65, Issue: 1
Jun-2021
DOI: DOI: 10.37398/JSR.2021.650133
2
15The Breast Cancer Detection Approaches: A ReviewInternational Journal of Computer Science and NetworkJan-20212277-54202
16An Optimization Approach for Transportation problem of transplant organ using Self-Adoptive Bear Hibernation Algorithm
View Paper
Taylor & FrancisJournal of Information and Optimization Sciences (ESCI)
Volume: 41, Issue: 2
Apr-20200252-2667
DOI: https://doi.org/10.1080/02522667.2020.1733189
2
17An Effectual Classification Approach to Detect Copy-Move Forgery Using Support Vector Machines
View Paper
Multimedia Tools and Applications, Springer (SCIE)Oct-20181573-7721
DOI: https://doi.org/10.1007/s11042-018-6707-9
2
18Novel Underwater Image Enhancement TechniqueInternational Journal of Innovative Technology and Exploring EngineeringJan-20182278-30752
19Novel Approach For Image Compression Using Curvelet Transform
View Paper
International Journal of Signal Processing, Image Processing and Pattern Recognition
Volume: 8, Issue: 7
Jul-20152005-4254
DOI: DOI: 10.14257/ijsip.2015.8.7.19
1
20An Ethical Approach of Block Based Image Encryption Using Chaotic Map
View Paper
International Journal of Security and Its Applications
Volume: 9, Issue: 9
Jan-20151738-9976
DOI: http://dx.doi.org/10.14257/ijsia.2015.9.9.10
3
21An Effective Approach of Digital Image Watermarking For Copyright Protection
View Paper
International Journal of Big Data Security Intelligence
Volume: 2, Issue: 1
Jan-20151738-9976
DOI: DOI: 10.14257/ijbdsi.2015.2.1.02
1
22Novel Approach For Fast Compressed Hybrid Color Image Crypto- System
View Paper
Advances In Engineering Software, Elsevier (SCI)Jan-20120965-9978
DOI: https://doi.org/10.1016/j.advengsoft.2012.03.001
1
23Efficient Hybrid Image Cryptosystem Using ECC And Chaotic Map
View Paper
International Journal of Computer Applications
Volume: 29, Issue: 3
Jan-20110975 – 0888
DOI: 10.5120/3548-4866
1
24ECC Over RSA For Asymmetric Encryption: A Review
View Paper
International Journal of Computer Science Issues
Volume: 8, Issue: 3
May-20111694-08141
25New Approach For Fast Color Image Encryption Using Chaotic Map
View Paper
Journal of Information Security Journal of Signal and Image Processing
Volume: 2, Issue: 4
Jan-20112327-
DOI: 10.4236/jis.2011.24014
1
26EFFICIENT IMAGE ENCRYPTION USING MRF AND ECC
View Paper
International Journal of Information Technology and Knowledge Management
Volume: 2, Issue: 2
Jul-20090973-44141
27An Ethical Way Of Encrypt Data Transfer In Bluetooth Mobile Using Chaos Based Feedback TechniqueIEEE Sixth International Conference On Information Technology (Scopus Indexed)Jan-2008978-0-7695-3596-82
S.No.Title of PublicationConferenceMonth-Year of PublicationISBN & DOINo. of Co-Authors
1The Classification of Breast Cancer based on Hyper-Tuned AdaBoost Ensemble Model International conference on Machine Intelligence Techniques for Data Analysis and Signal Processing (Scopus Index) Sep-2023729-7392
2Random Dual-Security based an Image Encryption Scheme for IoT3rd International Conference on Data, Engineering and Applications Scopus Indexed)( Jan-20212
3A Review on Application of Machine Learning in Medical DiagnosisIEEE Conference IDEA-2020 (Scopus Indexed)Jan-20202
4An Ethical Way For Image Encryption Using ECCIEEE First International Conference On Computational Intelligence, Communication Systems And Networks (Scopus Indexed)Jan-2009978-0-7695-3743-6/092
5Performance Analysis For Image Encryption Using ECC IEEE International Conference On Computational Intelligence and Communication Networks (Scopus Indexed)Jan-2008978-0-7895-4254-6/102