November 26, 2010

RESIDENTS OF
Flat No. – E-03
MADHU MAMATA APARTMENT
Uttarayan, Sagarbhanga, Durgapur-713211
Prof. (Dr.) Saurabh Dutta
PhD (Computer Science) MCA BSc (Mathematics)
Professor and Head of MCA, Dr. B. C. Roy Engineering College, Durgapur-713206

Mrs. Piali Dutta, Master Spandanil Dutta, Mrs. Lekha Dutta
Wish to All Their Well-Wishers
A Happy and Prosperous
2011.

October 06, 2010

Enlisted as Speaker in Conference in Kathmandu






I am truly honoured to have been enlisted as one of the Keynote Speakers in the 1st International Conference on E-Business and Digital Information System to be held in Kathmandu during February 15-16 in 2011. The list, currently consisting of two Keynote Speakers, also includes Dr. Subarna K. Das, an Associate Professor of Department of Library and Information Science in Jadavpur University. I shall eagerly be looking forward to address to the learned audience in that conference.

September 28, 2010

Up-to-Date List of Publications of My 2nd Scholar

Sabyasachi Samanta, one of my new research scholars, currently associated with Haldia Institute of Technology (HIT), working on Information Security and likely to be registered for his PhD soon, has a few research papers till date in his credit that are enlisted below. I wish him all the best in his attempt to register himself for PhD.

Papers published:

“Implementing Invisible Digital Watermarking on Image”, The Bulletin of Engineering and Science, ISSN: 0974-7176, Vol.3, No.2 September, 2008, pp. 79-82

“Implementation of Invisible Digital Watermarking on Image Nonlinearly of Arithmetically Compressed Data”, IJCSNS (International Journal of Computer Science and Network Security), ISSN: 1738- 7906, Vol.10, No.4, April 2010, pp.261-266

“Implementation of Invisible Digital Watermarking on Image Nonlinearly Encrypted with Galois Field (GF- 256)”, proceedings of 2010 International Conference on Informatics, Cybernetics, and Computer Applications (ICICCA2010), July 19-21, 2010, pp.26-30

Papers accepted and to be published:

“Implementation of Invisible Digital Watermarking on Image Nonlinearly”, accepted for publication in International Conference on Computer Applications, 2010 (ICCA2010), December 24-27, 2010

“Implementation of Invisible Digital Watermarking on Image Nonlinearly of Arithmetically Compressed Data Encrypted by Variable Length Key”, accepted for publication in The Second International Conference on Network & Communications Security, December 27-29, 2010

September 24, 2010

Best of Wishes to Dr Pranam Paul



Ceremoniously Pranam Paul, my first PhD scholar, was awarded his doctorate degree in the recently held Convocation Programme of NIT-Durgapur. I wish him all the best in his career.

September 03, 2010

Successful RFA on my Spouse


Reference to my last post entitled, "EPS and Expected RFA on my Spouse", the procedure of Electrophysiological Study (EPS), followed by Radiofrequency Ablation (RFA) was successfully done on my beloved spouse, Piali, on August 22 (Sunday) by a group of Cardiologists of The Mission Hospital, Durgapur. She was discharged on the very next day. Slowly but steadily she is recovering from her fatigue state. Doctors expressed their expectation that she is in future not likely to face the trouble of high palpitation. I like to express my wholehearted gratitude to the hospital authority for their huge caring effort towards my spouse. A very special appreciation is also due to The New India Assurance Co. Ltd. and its allied TPA for the financial support they provided for this entire procedure through my group insurance policy with them as an employee of Dr. B. C. Roy Engineering College, Durgapur.
Let me hope that with all these efforts, she will be getting a permanent recovery to enjoy a hassle-free life. Let see.

July 27, 2010

EPS and Expected RFA on my Spouse


Piali, my spouse, faced another episode of high heartbeat in the evening on July 5 last. Ultimately, I had to rush driving my own car with her to the Emergency Section of the Mission Hospital, where she recovered from that fatigue state and came back to residence after a couple of hours.

In an attempt to have her permanent recovery from such irregular heartbeat, cardiologists of the Mission Hospital decided to have the Electrophysiological Study (EPS) and subsequently, if needed, Radiofrequency Ablation (RFA) on her, which is likely to be held in 3rd or 4th week of forthcoming August.

Let us pray to the almighty to have a permanent recovery of my beloved spouse, who faces such a fatigue state, may be, only once in a year but probably is much more fit than me in rest 364 days in the year. Apart from the rest, she does require your best of wishes.


Let us dream of her everlasting recovery.

April 03, 2010

Promoted to Professor

It is my pleasure to share with all of you that based on my performance as Associate Professor in Dr. B. C. Roy Engineering College, the authority of the college has promoted me to Professor w.e.f. 01-04-2010. I do feel that such an inspirational promotion by the age of 37 will encourage me to do even better with co-operation from all my colleagues and students.

Mail me to have my Article "Shameless"

Around a couple of weeks ago, for a very few days, there was an article entitled Shameless existing in my blog, which is now not available in the blog. This is for information for those who did not go through it that it was a mesmerizing real story of NIT-Durgapur.

If you are interested to receive a copy of that article, feel free to mail me at saurabhdutta06061973@gmail.com. On receiving such a mail, a softcopy of the same will be forwarded to your mailbox.

First PhD Scholar awarded

It is nice to share with you that Pranam Paul, my first PhD scholar has ultimately been awarded PhD by NIT-Durgapur through the provisional certificate. Ceremoniously he will be awarded in the next convocation of NIT-Durgapur.

March 09, 2010

Means to protect Electronic Data

One fascinating way of ensuring security of electronic data is to embed it within an image and to transmit the image to desired recipient. An image being a collection of pixels and even a single pixel being a collection of binary digits, replacement of some less significant binary digits by binary digits corresponding to aforesaid data does not practically make a change to that image, when viewed in naked eyes. Therefore, even the existence of secret data within that image is hard to realize. The formulation of effective strategies to implement this concept, technically termed as Steganography, has been a burning area of research for last several years. Over the years, encryption has been a means of protecting electronic data. Prior to its transmission, data is encoded using an encryption algorithm. Apart from the original data, a value, termed as key, is fed into the encryption program to encode the data to generate the ready-to-be-transmitted encrypted data. In receiving end, the encrypted data, along with a key, is fed into the decryption program to decode the encrypted data. Thus for a communication of data over a transmission channel, both the ends of the channel can be equipped with encryption devices, one for performing encryption and the other for doing the reverse. Incidentally, keys used in both ends of transmission channel may be identical or different. In former case, termed as private-key encryption policy, the key-sharing requires a lot of care to maintain the privacy. The headache of key-sharing is avoided in public-key encryption policy by using a pair of keys, the public key of receiver during encryption and the private key of receiver during decryption. Authentication is closely associated with security. One can send an authenticated or digitally signed electronic message by encrypting it with his own private key, which, in receiving end, can only be decrypted through the corresponding public-key. Developing public-key encryption policy with proven efficiency is one striking challenge for researchers. However, even a private-key policy with a reasonably large key-space is arguably compatible with a public-key policy. As per an appealing observation, even a fast processor with capability of decrypting 1000000 decryptions in 1 µs requires around 5000000000000000000 years to successfully break a 128-bit private-key used during a common implementation of Rijndael, a proposed private-key policy selected by NIST (US-based National Institute of Standards and Technology) as an AES (Advanced Encryption Standard) algorithm. If an image with encrypted message embedded into it is digitally signed, it becomes fairly non-vulnerable against possible attacks.

(From the draft to write invited article for a technical newsletter)

January 15, 2010

Technical PPT: Ready for Presentation

Very recently, I completed preparing a PPT entitled AN APPROACH TOWARDS DEVELOPMENT OF 252-BIT INTEGRATED ENCRYPTION SYSTEM (IES) deliverable tentatively in 3 hours.

Through its first two phases, I focus on approach of design and development of some of my own ciphers, which I developed during my work for PhD. The proposed 252-bit IES is ultimately presented in its third and final phase. A presentation like this might be of some help for upcoming researchers in areas surrounding Cryptology.

I may think of delivering this presentation, if I get an opportunity to share it with a gathering of learned scholars.