Work place: VIPS/IT, New Delhi, 110 080, India
E-mail: vinay5861@gmail.com
Website:
Research Interests: Computer Architecture and Organization, Information Security, Network Security, Data Structures and Algorithms
Biography
Dr. Vinay Kumar is Dean IT & Professor in Vivekananda Institute of Professional Studies, Delhi. Earlier he worked as Scientist in National Informatics Centre, MoCIT, GOI. He completed his Ph. D. in Computer Science from University of Delhi and MCA from JNU, Delhi. He has authored a book on Discrete Mathematics and contributed many research papers to refereed journals and conferences. His areas of interest are graph algorithm, steganography, data security, data mining and e-governance. He is member of CSI and ACM. Details available at http://knowdrvinaykumar.blogspot.in / Ph: 011- 2734 3402. E-Mail: vinay5861@gmail.com
By Vinay Kumar Arpana Chaturvedi Meenu Dave
DOI: https://doi.org/10.5815/ijcnis.2018.05.05, Pub. Date: 8 May 2018
With spread of digitalization in India, the government initiated many welfare schemes for citizens as a part of e-governance. To ensure security, it is made mandatory to link Aadhaar card of beneficiaries with different schemes. The government also proposed to link UIDAI with DigiLocker to lead India towards the paperless economy. Due to this, worries related to security concern arise. Once UIDAI connected with DigiLocker, a resident can share personal data with other agencies. It generates enormous amount of Data and it may cause misuse of personal data. It is very important to keep data secure with controlled and authenticated access. It is a challenge to manage and secure this amount of data. In this paper, we propose a framework and model to secure personal data using proper authentication process. Availability of the documents should be verified by the owner and post verification, the document should be accessible for the limited time. Failing which revalidation is required.
[...] Read more.By Abhishek Bansal Sunil K. Muttoo Vinay Kumar
DOI: https://doi.org/10.5815/ijcnis.2016.08.05, Pub. Date: 8 Aug. 2016
There are many steganalysis methods, which can estimate length of a message embedded in least significant bits. It may be embedded either in spatial domain or in frequency domain. The well known approaches are Chi – Square test, RS steganalysis and Sample Pair steganalysis. Many commercial steganographic programs are based on LSB method. It is important to ensure undetectablity of a hidden message in a carrier. We present an analysis of steganographic security on data hiding approach using eight queen solutions. In this approach, relationship between message bytes and 8-queen solutions is embedded in the cover. Further, we propose a new approach to adjust the statistical properties of the cover image in such a way that the steganalyst may not be able to detect the presence of hidden message. The proposed approach is tested using steganalysis tool STEGEXPOSE and the experimental results found are within acceptable range.
[...] Read more.DOI: https://doi.org/10.5815/ijitcs.2013.12.10, Pub. Date: 8 Nov. 2013
Data warehouses are decision support systems that are specifically designed for the business managers and executives for reporting and business analysis. Data warehouse is a database that stores enterprise-wide data that can be used to deduce useful information. Business organizations can achieve a great level of competitive advantage by analyzing its historical data and learning from it. However data warehouse concept is still maturing as a technology. In order to effectively design and implement a data warehouse for an organization, its goal needs to be understood and requirement must be analyzed in the perspective of the identified goal. In this paper we present a goal structured model for requirements engineering that also enables its users to manage traceability between the goals, decisions, business strategy and the corresponding business model.
[...] Read more.By Vinay Kumar
DOI: https://doi.org/10.5815/ijmecs.2012.06.03, Pub. Date: 8 Jun. 2012
Mathematics is universally accepted as mother of all science. Despite that, Department of Personnel and Training (DOPT) has recently issued a circular mentioning that a person having master degree in mathematics cannot be considered for the post of scientists. The open question of 'Is mathematics a science?' is revisited in this paper under the new perspective to explore scientific practices that sans mathematics arrived knocking, challenging basic understanding of precision and practical sense that makes science. Considering the fact that in India, most crucial policy decisions at a higher level of abstraction in every conceivable arena of our national life are taken by either GOM (Group of Ministers) or GOS (Group of Secretaries), apprehension raises a basic query 'Who decides?' Some decision causes much unexpected consequence, which is noticed when it takes its toll and becomes virtually irreversible. This recent decision of Flexible Complementing Scheme (FCS), wherein mathematics is not considered as science, has potential to damage the very scientific culture and practices in India. This paper is an attempt to place mathematics in its right perspective and to highlight the damage that this decision might do. The paper also suggests ways to control the damage.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals