Dr. Ramveer Singh | Galgotias College of Engineering and Technology Greater Noida (original) (raw)

Papers by Dr. Ramveer Singh

Research paper thumbnail of Used Car Price Prediction

International journal of multidisciplinary advanced scientific research and innovation, 2021

Cars have become a necessity in this modern world. Every middle class family needs a vehicle or a... more Cars have become a necessity in this modern world. Every middle class family needs a vehicle or a mode of transport in order to move from one place to another. Not everyone is able to afford a new vehicle as they are costly and there’s an added cost of taxes and various other expenses by both the provider/company of the car as well as the government. Moreover, not every customer is sure of spending a sum of their wealth on a certain car. The product might not meet their needs. The solution to this problem of having a car despite not being able to afford one is met by buying and selling second hand cars. It has become its own market now. There are already numerous companies and websites and app based services that serve as a mediator or a platform for the dealing of second hand or used cars and other vehicles. Establishment of such places is easy but there is another problem that still remains- How to price the used car appropriately at a price comfortable for both the seller and the...

Research paper thumbnail of Generalization of Magic Square (Numerical Logic) 3×3 and its Multiples (3×3) × (3×3)

International Journal of Intelligent Systems and Applications, 2012

A magic square of 3×3 and its mult iples i.e. (9×9) squares and so on, of order N are co mposed o... more A magic square of 3×3 and its mult iples i.e. (9×9) squares and so on, of order N are co mposed of (n×n) mat rix having filled with nu mbers in such a way that the totals sum along the ro ws ,colu mns and main diagonals adds up the same. By using a special geometrical figure developed.

Research paper thumbnail of An Ordeal Randomized Secure Data Encryption Scheme (Orsdes)

In this paper, we present a new Data encryption scheme named as Ordeal Randomized Secure Data Enc... more In this paper, we present a new Data encryption scheme named as Ordeal Randomized Secure Data Encryption Scheme (ORSDES). The theoretical security measures are also discussed and ORSDES advocates its competency. Through this paper, we encourage and motivate the user to use DES as ORSDES with more efficiency and security. Mainly we emphasis on secrecy of key because all knows, In cryptography key always have important role. Using a variable pseudo random number and operational function, the new generated key for each block of message make ORSDES more attractive and usable. ORSDES motivates itself the user to use it with new destiny of confidence, integrity and authentication.

Research paper thumbnail of Transmission of Large Information through KAP Using Non-Abelian Group

Journal of Global Research in Computer Science, 2011

Anyone can send a confidential message by just using public information, but the message can only... more Anyone can send a confidential message by just using public information, but the message can only be decrypted with a private key, which is in the sole possession of the intended recipient. It is really appreciable method to provide high security to the medical image or patient's information. Which provide us integrated secure transmission of medical information like Image, Audio, Video etc. with a common key. We also use lossless compression technique like SEQUITUR for efficient utilization of communication channel. The combination of encryption with compression provides confidentiality in the transmission.

Research paper thumbnail of BH25352355

Virtualization is the key technology behind cloud computing that allows the creation of an abstra... more Virtualization is the key technology behind cloud computing that allows the creation of an abstraction layer of the underlying cloud Infrastructure. Using virtualization, resources (hardware and software) can be shared and utilized while hiding the complexity from the cloud users. A lot of cloud database are available that managed by different organization such as-Amazon Storage for the Cloud, Google Storage for the Cloud, Hadoop Storage for the Cloud, Yahoo!'s PNUTS, Cassandra, CouchDB etc. This paper is presented to propose a virtual Database framework that enables the centralized global object oriented database. A virtually integrated huge database that will hide the heterogeneity of various cloud databases. Once they are integrated a consistent access is provide to the end user.

Research paper thumbnail of Cryptic E-Mailing Scheme over Stymieing Channel

ijaest.iserp.org

In this paper, we presented an errorless model of emailing system for Internet communication. It ... more In this paper, we presented an errorless model of emailing system for Internet communication. It is the model of a real-life secure mailing system for any organization. In this model Alice can send a secret message even to any strange person in an anonymous way. The users of this model are assumed to be may or may not be the members of a closed organization. If any error occurred during the transmission due to teeming channel, it can also be determine & encountered by error correction function.

Research paper thumbnail of AN SCHEME TO TRANSMIT SECURE MESSAGE WITH AUTHENTICATION & INTEGRITY USING TRIPLE-EHDES

Journal of Global Research in Computer …

The scenario of present day of information security system includes confidentiality, authenticity... more The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authenticity and integrity. We kept in mind the security of transmission and capacity of channel, triple EHDES provides more complexity and enhanced security and compression with sequitur provides reduce size data or image for efficiency of communication channel. Author's previous articles define the strength of EHDES based on variation of key, cascading of EHDES or triple EHDES makes this approach more effective and usable.

Research paper thumbnail of An Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted Party

... [5]. Alawi A. Al-Saggaf and Acharya HS “A Generalized Framework for Crisp Commitment Schemes ... more ... [5]. Alawi A. Al-Saggaf and Acharya HS “A Generalized Framework for Crisp Commitment Schemes “eprint. iacr. org/2009/202. Page 140. DB Ojha, Ajay Sharma, Ramveer Singh, Shree Garg, Awakash Mishra & Abhishek Dwivedi International Journal of Computer Science and ...

Research paper thumbnail of A Model of Anonymous cum Idiosyncratic Machiavellian Mailing System Using Steganographic Scheme

International Journal of …, Jan 1, 2010

In this paper we show a model of an anonymous cum idiosyncratic Machiavellian mailing system for ... more In this paper we show a model of an anonymous cum idiosyncratic Machiavellian mailing system for Internet communication. It is the model of a real-life secure mailing system for any organization. In this model a sender can send a secret message even to a unacquainted person in an anonymous way, later which will become idiosyncratic. The users of this model are assumed to be may or may not be the members of a closed organization.

Research paper thumbnail of Magic Square ORDES

Research paper thumbnail of Error Less E-Messaging Approach using Double-EHDES

Journal of Global Research in Computer …

In this paper, we are introducing an effective and important approach of e-messaging system for t... more In this paper, we are introducing an effective and important approach of e-messaging system for transmission with high security and error free using double EHDES. This approach provides a high level of secure mailing scheme for any organization over the internetto communicate a secret error free e-message between anonymous communicators as well as within an organization.

Research paper thumbnail of A New Technique to Transmit a Reduce Sized Image Using Triple Enhanced Data Encryption Standard (EHDES)

International Journal

In current era, an image transmission becomes more usable and effective for improvement in variou... more In current era, an image transmission becomes more usable and effective for improvement in various fields. The security of image is most important while the image is transmitted. We kept in mind the security of transmission and capacity of channel, triple EHDES provides more complexity and enhanced security and compression with sequitur provides reduce size data or image for efficiency of communication channel. Author's previous articles define the strength of EHDES based on variation of key, cascading of EHDES or triple EHDES makes this approach more effective and usable.

Research paper thumbnail of GLOBALLY RELIABLE E-MAIL: AN APPLICATION OF TRIPLE-EHDES (GREAT-E)

International Journal of Engineering …, Jan 1, 2010

The proposed applications of Triple-EHDES describe a reliable e-mail system. This article provide... more The proposed applications of Triple-EHDES describe a reliable e-mail system. This article provides keen efficient secure mailing scheme for any organization. This scheme can help all those users who want to send a secure & secret message even to any unknown person in an unidentified way. The users of this model are assumed to be may or may not be the members of a closed organization, In this paper, we combine the cryptography with steganography for high security of e-messaging. GREAT-E provides three times security to EHDES.

Research paper thumbnail of An Approach to Compress & Secure Image Transmission over a Noisy Channel

Journal of Global Research in Computer …

In our day to day life, requires more secure transmission whereas the transmission channel is too... more In our day to day life, requires more secure transmission whereas the transmission channel is too noisy. Transmission image in various field i.e. medical field (Telemedicine) with complete efficiency for saving human life, secrecy of communication between secret agents and their relative government, to maintain the confidentiality in military operations, etc. In our approach, we introduced a new scheme to transmit an image over noisy transmission channel. Our approach is suitable combination of cryptography and compression with removal of transmission error. Cryptography provides secure transmission, Compression increases the capacity of transmission channel and Fuzzy is used for error which gets during transmission of image.

Research paper thumbnail of An Approach to Secure Larger Size Data with Authenticity and Integrity

ijcsit.com

The scenario of present day of information security system includes confidentiality, authenticity... more The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authenticity and integrity. The security of communication is a crucial issue on World Wide Web (internet) and within organizations. It is about confidentiality, integrity and authentication during access or editing of confidential internal documents. We are using a nonconventional steganography to increase security, which uses the cryptography to encrypt confidential message with the public and private keys. These keys are generated differently. Then loss-less compression takes place, which makes possible to hide larger amounts of information and documents using steganography.

Research paper thumbnail of A Proficient mode to Transmit Secure Large Size Data with Authentication & Integrity using Double–EHDES over Teeming Channel

Journal of Global Research in Computer Science

In this paper, we presents a Proficient mode to Transmit Secure Large Size Data with Authenticati... more In this paper, we presents a Proficient mode to Transmit Secure Large Size Data with Authentication & Integrity using Double -EHDES over Teeming Channel. This approach really enhances the capability and maximum utilization of busy channel. A complete transmission is always based upon correctness and delivery on time and the massage transmission is too much sensitive and crucial. In this paper, we establish the complete arrangement of combination of encryption and compression with double EHDES while transmitting over media.A lossless compression provides us integrity. Fuzzy error correction provides error less message over noisy channel.

Research paper thumbnail of An Approach to Secure Data with Authentication & Integrity using EHDES over Noisy Channel

International Journal of …, Jan 1, 2010

Today's era of communication is too much important. An effective communication requires major fac... more Today's era of communication is too much important. An effective communication requires major factors like: Authentication, Confidentiality, Integrity, etc. In this current paper, we introduce a complete security that provides by the combination of stegnographic approach and cryptographic scheme-EHDES (Enhanced Data Encryption Standard). Stagnographic approach facilitates data hiding and EHDES encrypts the data to be transmitted. A lossless compression provides us integrity. Fuzzy error correction provides error less message over noisy channel.

Research paper thumbnail of An Ordeal Random Data Encryption Scheme (ORDES)

International Journal of Engineering Science, Jan 1, 2010

In this paper, authors presented a new Data encryption scheme named as Ordeal Random Data Encrypt... more In this paper, authors presented a new Data encryption scheme named as Ordeal Random Data Encryption Scheme (ORDES). The theoretical security measures are also discussed and ORDES advocates its competency .Through this paper, we encourage the user to use ORDES with more efficiency and security. Mainly we emphasis on secrecy of key because all knows key always play vital role in cryptography. Using a variable random number and a function, the new generated key for each block of message make this approach attractive and more usable. The portability and usability of key changes the state of affairs of DES in every block of structure. This approach ORDES motivates the user to use DES with new destiny of confidence, integrity and authentication.

Research paper thumbnail of A Non-Repudiable Biased Bitstring Key Agreement Protocol (NBBKAP) Using Conjugacy Problem in Non-abelian Group

International Journal of …, Jan 1, 2010

The Key exchange problems are of central interest in security world. The basic aim is that two pe... more The Key exchange problems are of central interest in security world. The basic aim is that two people who can only communicate via an insecure channel want to find a common secret key without any attack. In this paper, we elaborated the process for well secured and assured for sanctity of correctness about the sender's and receiver's identity , as non-repudiable biased bitstring key agreement protocol (NBBKAP) using conjugacy problem in non-abelian group.

Research paper thumbnail of An Instinctive Approach for Secure Communication–Enhanced Data Encryption Standard (EHDES)

… journal of computer science and Information …, Jan 1, 2010

Research paper thumbnail of Used Car Price Prediction

International journal of multidisciplinary advanced scientific research and innovation, 2021

Cars have become a necessity in this modern world. Every middle class family needs a vehicle or a... more Cars have become a necessity in this modern world. Every middle class family needs a vehicle or a mode of transport in order to move from one place to another. Not everyone is able to afford a new vehicle as they are costly and there’s an added cost of taxes and various other expenses by both the provider/company of the car as well as the government. Moreover, not every customer is sure of spending a sum of their wealth on a certain car. The product might not meet their needs. The solution to this problem of having a car despite not being able to afford one is met by buying and selling second hand cars. It has become its own market now. There are already numerous companies and websites and app based services that serve as a mediator or a platform for the dealing of second hand or used cars and other vehicles. Establishment of such places is easy but there is another problem that still remains- How to price the used car appropriately at a price comfortable for both the seller and the...

Research paper thumbnail of Generalization of Magic Square (Numerical Logic) 3×3 and its Multiples (3×3) × (3×3)

International Journal of Intelligent Systems and Applications, 2012

A magic square of 3×3 and its mult iples i.e. (9×9) squares and so on, of order N are co mposed o... more A magic square of 3×3 and its mult iples i.e. (9×9) squares and so on, of order N are co mposed of (n×n) mat rix having filled with nu mbers in such a way that the totals sum along the ro ws ,colu mns and main diagonals adds up the same. By using a special geometrical figure developed.

Research paper thumbnail of An Ordeal Randomized Secure Data Encryption Scheme (Orsdes)

In this paper, we present a new Data encryption scheme named as Ordeal Randomized Secure Data Enc... more In this paper, we present a new Data encryption scheme named as Ordeal Randomized Secure Data Encryption Scheme (ORSDES). The theoretical security measures are also discussed and ORSDES advocates its competency. Through this paper, we encourage and motivate the user to use DES as ORSDES with more efficiency and security. Mainly we emphasis on secrecy of key because all knows, In cryptography key always have important role. Using a variable pseudo random number and operational function, the new generated key for each block of message make ORSDES more attractive and usable. ORSDES motivates itself the user to use it with new destiny of confidence, integrity and authentication.

Research paper thumbnail of Transmission of Large Information through KAP Using Non-Abelian Group

Journal of Global Research in Computer Science, 2011

Anyone can send a confidential message by just using public information, but the message can only... more Anyone can send a confidential message by just using public information, but the message can only be decrypted with a private key, which is in the sole possession of the intended recipient. It is really appreciable method to provide high security to the medical image or patient's information. Which provide us integrated secure transmission of medical information like Image, Audio, Video etc. with a common key. We also use lossless compression technique like SEQUITUR for efficient utilization of communication channel. The combination of encryption with compression provides confidentiality in the transmission.

Research paper thumbnail of BH25352355

Virtualization is the key technology behind cloud computing that allows the creation of an abstra... more Virtualization is the key technology behind cloud computing that allows the creation of an abstraction layer of the underlying cloud Infrastructure. Using virtualization, resources (hardware and software) can be shared and utilized while hiding the complexity from the cloud users. A lot of cloud database are available that managed by different organization such as-Amazon Storage for the Cloud, Google Storage for the Cloud, Hadoop Storage for the Cloud, Yahoo!'s PNUTS, Cassandra, CouchDB etc. This paper is presented to propose a virtual Database framework that enables the centralized global object oriented database. A virtually integrated huge database that will hide the heterogeneity of various cloud databases. Once they are integrated a consistent access is provide to the end user.

Research paper thumbnail of Cryptic E-Mailing Scheme over Stymieing Channel

ijaest.iserp.org

In this paper, we presented an errorless model of emailing system for Internet communication. It ... more In this paper, we presented an errorless model of emailing system for Internet communication. It is the model of a real-life secure mailing system for any organization. In this model Alice can send a secret message even to any strange person in an anonymous way. The users of this model are assumed to be may or may not be the members of a closed organization. If any error occurred during the transmission due to teeming channel, it can also be determine & encountered by error correction function.

Research paper thumbnail of AN SCHEME TO TRANSMIT SECURE MESSAGE WITH AUTHENTICATION & INTEGRITY USING TRIPLE-EHDES

Journal of Global Research in Computer …

The scenario of present day of information security system includes confidentiality, authenticity... more The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authenticity and integrity. We kept in mind the security of transmission and capacity of channel, triple EHDES provides more complexity and enhanced security and compression with sequitur provides reduce size data or image for efficiency of communication channel. Author's previous articles define the strength of EHDES based on variation of key, cascading of EHDES or triple EHDES makes this approach more effective and usable.

Research paper thumbnail of An Analysis of Fraudulence in Fuzzy Commitment Scheme With Trusted Party

... [5]. Alawi A. Al-Saggaf and Acharya HS “A Generalized Framework for Crisp Commitment Schemes ... more ... [5]. Alawi A. Al-Saggaf and Acharya HS “A Generalized Framework for Crisp Commitment Schemes “eprint. iacr. org/2009/202. Page 140. DB Ojha, Ajay Sharma, Ramveer Singh, Shree Garg, Awakash Mishra & Abhishek Dwivedi International Journal of Computer Science and ...

Research paper thumbnail of A Model of Anonymous cum Idiosyncratic Machiavellian Mailing System Using Steganographic Scheme

International Journal of …, Jan 1, 2010

In this paper we show a model of an anonymous cum idiosyncratic Machiavellian mailing system for ... more In this paper we show a model of an anonymous cum idiosyncratic Machiavellian mailing system for Internet communication. It is the model of a real-life secure mailing system for any organization. In this model a sender can send a secret message even to a unacquainted person in an anonymous way, later which will become idiosyncratic. The users of this model are assumed to be may or may not be the members of a closed organization.

Research paper thumbnail of Magic Square ORDES

Research paper thumbnail of Error Less E-Messaging Approach using Double-EHDES

Journal of Global Research in Computer …

In this paper, we are introducing an effective and important approach of e-messaging system for t... more In this paper, we are introducing an effective and important approach of e-messaging system for transmission with high security and error free using double EHDES. This approach provides a high level of secure mailing scheme for any organization over the internetto communicate a secret error free e-message between anonymous communicators as well as within an organization.

Research paper thumbnail of A New Technique to Transmit a Reduce Sized Image Using Triple Enhanced Data Encryption Standard (EHDES)

International Journal

In current era, an image transmission becomes more usable and effective for improvement in variou... more In current era, an image transmission becomes more usable and effective for improvement in various fields. The security of image is most important while the image is transmitted. We kept in mind the security of transmission and capacity of channel, triple EHDES provides more complexity and enhanced security and compression with sequitur provides reduce size data or image for efficiency of communication channel. Author's previous articles define the strength of EHDES based on variation of key, cascading of EHDES or triple EHDES makes this approach more effective and usable.

Research paper thumbnail of GLOBALLY RELIABLE E-MAIL: AN APPLICATION OF TRIPLE-EHDES (GREAT-E)

International Journal of Engineering …, Jan 1, 2010

The proposed applications of Triple-EHDES describe a reliable e-mail system. This article provide... more The proposed applications of Triple-EHDES describe a reliable e-mail system. This article provides keen efficient secure mailing scheme for any organization. This scheme can help all those users who want to send a secure & secret message even to any unknown person in an unidentified way. The users of this model are assumed to be may or may not be the members of a closed organization, In this paper, we combine the cryptography with steganography for high security of e-messaging. GREAT-E provides three times security to EHDES.

Research paper thumbnail of An Approach to Compress & Secure Image Transmission over a Noisy Channel

Journal of Global Research in Computer …

In our day to day life, requires more secure transmission whereas the transmission channel is too... more In our day to day life, requires more secure transmission whereas the transmission channel is too noisy. Transmission image in various field i.e. medical field (Telemedicine) with complete efficiency for saving human life, secrecy of communication between secret agents and their relative government, to maintain the confidentiality in military operations, etc. In our approach, we introduced a new scheme to transmit an image over noisy transmission channel. Our approach is suitable combination of cryptography and compression with removal of transmission error. Cryptography provides secure transmission, Compression increases the capacity of transmission channel and Fuzzy is used for error which gets during transmission of image.

Research paper thumbnail of An Approach to Secure Larger Size Data with Authenticity and Integrity

ijcsit.com

The scenario of present day of information security system includes confidentiality, authenticity... more The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authenticity and integrity. The security of communication is a crucial issue on World Wide Web (internet) and within organizations. It is about confidentiality, integrity and authentication during access or editing of confidential internal documents. We are using a nonconventional steganography to increase security, which uses the cryptography to encrypt confidential message with the public and private keys. These keys are generated differently. Then loss-less compression takes place, which makes possible to hide larger amounts of information and documents using steganography.

Research paper thumbnail of A Proficient mode to Transmit Secure Large Size Data with Authentication & Integrity using Double–EHDES over Teeming Channel

Journal of Global Research in Computer Science

In this paper, we presents a Proficient mode to Transmit Secure Large Size Data with Authenticati... more In this paper, we presents a Proficient mode to Transmit Secure Large Size Data with Authentication & Integrity using Double -EHDES over Teeming Channel. This approach really enhances the capability and maximum utilization of busy channel. A complete transmission is always based upon correctness and delivery on time and the massage transmission is too much sensitive and crucial. In this paper, we establish the complete arrangement of combination of encryption and compression with double EHDES while transmitting over media.A lossless compression provides us integrity. Fuzzy error correction provides error less message over noisy channel.

Research paper thumbnail of An Approach to Secure Data with Authentication & Integrity using EHDES over Noisy Channel

International Journal of …, Jan 1, 2010

Today's era of communication is too much important. An effective communication requires major fac... more Today's era of communication is too much important. An effective communication requires major factors like: Authentication, Confidentiality, Integrity, etc. In this current paper, we introduce a complete security that provides by the combination of stegnographic approach and cryptographic scheme-EHDES (Enhanced Data Encryption Standard). Stagnographic approach facilitates data hiding and EHDES encrypts the data to be transmitted. A lossless compression provides us integrity. Fuzzy error correction provides error less message over noisy channel.

Research paper thumbnail of An Ordeal Random Data Encryption Scheme (ORDES)

International Journal of Engineering Science, Jan 1, 2010

In this paper, authors presented a new Data encryption scheme named as Ordeal Random Data Encrypt... more In this paper, authors presented a new Data encryption scheme named as Ordeal Random Data Encryption Scheme (ORDES). The theoretical security measures are also discussed and ORDES advocates its competency .Through this paper, we encourage the user to use ORDES with more efficiency and security. Mainly we emphasis on secrecy of key because all knows key always play vital role in cryptography. Using a variable random number and a function, the new generated key for each block of message make this approach attractive and more usable. The portability and usability of key changes the state of affairs of DES in every block of structure. This approach ORDES motivates the user to use DES with new destiny of confidence, integrity and authentication.

Research paper thumbnail of A Non-Repudiable Biased Bitstring Key Agreement Protocol (NBBKAP) Using Conjugacy Problem in Non-abelian Group

International Journal of …, Jan 1, 2010

The Key exchange problems are of central interest in security world. The basic aim is that two pe... more The Key exchange problems are of central interest in security world. The basic aim is that two people who can only communicate via an insecure channel want to find a common secret key without any attack. In this paper, we elaborated the process for well secured and assured for sanctity of correctness about the sender's and receiver's identity , as non-repudiable biased bitstring key agreement protocol (NBBKAP) using conjugacy problem in non-abelian group.

Research paper thumbnail of An Instinctive Approach for Secure Communication–Enhanced Data Encryption Standard (EHDES)

… journal of computer science and Information …, Jan 1, 2010