Meenu Dave
Jagannath University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Meenu Dave.
international conference on information and communication technology | 2016
Sunita Chaudhary; Meenu Dave; Amit Sanghi; Jaideep Manocha
Safety measures are the main issue while communication over digital networks, but no one can assure delivery of the right contents as burglars may on the way keeping an eye on the communication. To guard the secret data from stealing, various techniques have been implemented to encrypt and decrypt the data. Cryptography and Steganography are the two most famous techniques regarding the same. The first one scrambles the original data and the second one hides the original data under some other media. Both have strong impact when used together instead of using individually. In this paper we are going to discuss the both, while our main focus is on exploring the different techniques of Text Steganography and compare them in terms of robustness and hiding capacity.
international conference on advances in information communication technology computing | 2016
Sunita Chaudhary; Meenu Dave; Amit Sanghi
Stegnography is a sheltered communication in which information such as text, image, audio and video is kept under shelter of another message. The message providing the shelter can also be text, image, video etc. No one except the dispatcher and projected addressee can have any idea if any sort of hidden writing exists. In this paper, we present and evaluate an approach for text steganography which is hiding text underneath text. The approach is based on feature encoding and random character generation method. Our focus is primarily on the shape of the capital alphabets of the English language and hence the algorithm has been termed as capital alphabet shape encoding method.
Archive | 2019
Vani Kapoor Nijhawan; Mamta Madan; Meenu Dave
Data mining is a technique for finding new and undiscovered patterns, which help in predicting the future trends. Nowadays, it is being applied in all the fields, may it be, the field of medicines or credit cards or banking and insurance or telecommunications. Decision tree is a simple and popular technique of data mining (commonly employed for predictive analysis) which can be used to forecast the future trends. There are several algorithms for decision tree generation like ID3, C4.5, CART which can be applied with the help of different software tools like WEKA, Rapid Miner, R. This paper focuses on applying data mining in the field of telecommunications, to predict the churning behavior of the customers.
Archive | 2018
Mamta Madan; Meenu Dave; Meenu Chopra
This paper focuses on communities or clusters which are the sets of nodes with lots of links within and very less to the outside of the network. The paper explains the concept of online generation communities and their framework in online social media networks (OSMNs), especially largest networking site, i.e., Facebook. There are many popular methods available for community identification like Walktrap, Nibble, Label Propagation Algorithm (LPA), Fast Community Network Algorithm (FCNA) which had been explored in the last decade. The community framework (CF) is the important and integral part of the OSMNs, but still we have to find the absolutely correct definition of the community in the real-world networks. In this paper, we try to give a correct definition of the community with its few important traits and from that we are able to recommend a different, simple and innovative framework (either flowchart or algorithm) which will resemble the real-world network. In our approach, we try to incorporate or consider those nodes which are overlapped in the community framework with the concept of shortest paths. We believe that our approach will be more favorable than other network methods which mostly generate the partitions.
Archive | 2018
Amit Sanghi; Sunita Chaudhary; Meenu Dave
Cloud computing is new age computing model. Which gives that how to use the resources even if don’t own them. It gives the facility to share the resources over the internet, without building the necessary infrastructure. This is an on demand service. This model gives faster accessing of the resources and reduces management related problems. In this paper we are going to discuss the different cloud computing models with its advantages, characteristic and various security measures in the current scenario. At last we discussed a new level of security in cloud computing for data diffusion and storage on hybrid cloud in security concern. We are presenting new linguistic text steganography approach for increasing data security. In these techniques first we encrypt our secret data by using substitution method and then embed it in some random cover media for hiding the aspect of original text. We have proposed new method of Indian script encoding method and capital alphabet shape encoding which would be hard to decipher by inarticulate person. We are applying this techniques on private cloud server when we transfer our private data to public cloud so our data will also be secure in transmission and storage on public cloud.Time overhead of this techniques is very less and also it’s not taking too much space as one character of random cover is use to hide one character of encrypted secret text.
Archive | 2018
Sunita Chaudhary; Meenu Dave; Amit Sanghi; Hansraj Sidh
A prehistoric technique of concealing clandestine information is steganography which takes use of a shelter media as text, audio, video, etc. The most important thing related to same is the capacity of hiding information under the cover. The typical individual in the same concern is linguistic steganography or text steganography due to the fact that text is lacking in terms of redundant data as in audio or video steganography, this property comes in abundance and serves as the basis of stego process. Here we put forward a linguistic text steganography technique. This technique implants secret information into the shelter media for searching novel probabilities for occupying a language Hindi which is apart from English. The proposed approach namely Indian Script Encoding Technique (ISET) will work by implementing the linguistic attributes of Hindi language. In this approach, there is no difference between vowels and consonants. In this new approach, we worked with random and Hindi texts where Hindi text is used as a secret message and random text as a cover medium. Secret message will be hidden in cover medium. Our aim to propose this new ISET method is to increase robustness of the data and also increase in capacity of hidden data.
Archive | 2017
Meenu Chopra; Mamta Madan; Meenu Dave; Cosmena Mahapatra
The focus in India has now changed to providing world class higher education to all students aiming to compete with the world. Keeping this in mind, higher education institutions (HEIs) must figure out a way to make the change in accordance with technological advancements in social networking to motivate students and encourage an intuitive learning environment in their campus. Using social networking in higher education (HE) is being creative, productive, cost–effective, and is exceptionally critical owing to the complex nature of serving the population of the online generation (Og). Utilizing the social networking environment for learning and teaching at HEIs could be a financially effective and productive way of speaking to and connecting with higher education online members, which include students, faculties, administrators, staff, management, etc. A few illustrations of the HEI becoming a “Social Institution” are strengthening the HEI’s “brand” or reputation, managing and building online communities (staff, students, parents/guardians, graduated class/alumni), and streamlining processes for better productivity at less expense. This chapter focuses on effective implementation of data analytics techniques on social media datasets for helping Indian HEIs to compete effectively in the global market.
International Journal of Computer Applications | 2017
Anupama Jha; Meenu Dave; Supriya Madan
In recent years the rapid growth of Internet, IOT and Cloud Computing has led to voluminous data in almost every organization, academics and business area. Big data has rapidly developed into a hot topic that attracts extensive attention from such area around the world. Maintaining the privacy and security of Big Data is a very critical issue. The5V characteristics of big data (Volume, Variety, Velocity, Value and Veracity) alleviate the standard of security required for it. In this research paper, we have emphasized several Big Data security and privacy issues and challenges released by CSA (Cloud Security Alliance) that need to be addressed to make data processing and computing infrastructure more secure as well as possible solutions to address such challenges. This paper also gives insights on overview of big data privacy preserving K-Anonymity technique which aims to protect against leakage of individual’s identity and sensitive information before releasing the dataset during analysis. Finally, this paper overviews big data security solution application and their features provided by the top companies
Archive | 2016
Prashant Panse; Tarun Shrimali; Meenu Dave
In current scenario each and every person is anxious about security and privacy. Vehicular correspondences frameworks have ways to deal with give well-being measures and solace to drivers. Vehicular communication is based on wireless short-range technology that enables impulsive information interchange among vehicles and with roadside stations. A new type of network called vehicular ad hoc network (VANET) is available for providing alerts to the vehicles on highways. VANET is vehicular ad hoc network, in which mobile nodes are replaced by vehicles. Vehicular network is used to alert a driver so that accidents can be reduced and also avoid congestion on highways. This can be used for postaccident investigation as well. Frequently changing environment of VANET leads to various challenges. In this paper, the performance of vehicular ad hoc network is evaluated by focusing several key factors and reactive routing strategy.
International Conference on Smart Trends for Information Technology and Computer Communications | 2016
Meenu Dave; Rashmi Agrawal
Software advancement has increased the complexities many fold and to meet the quality standards, a lot of research is being done in designing new testing methodologies and tools. Mutation testing is a proven effective technique but the high cost attached with it averts it from establishing it as an industrial tool. The review is an extension of the previous work where a review was done on search based test data generation and mutation testing. The objective is to study the remaining techniques/approaches and summaries the discussion of both the reviews. The application of mutation testing with various techniques at various phases of software development along with various languages/tools show that it is a versatile, adaptable and efficient, which is motivating the researchers to explore the new areas.