Dr. Ramveer Singh | Galgotias College of Engineering and Technology Greater Noida (original) (raw)
Papers by Dr. Ramveer Singh
International journal of multidisciplinary advanced scientific research and innovation, 2021
Cars have become a necessity in this modern world. Every middle class family needs a vehicle or a... more Cars have become a necessity in this modern world. Every middle class family needs a vehicle or a mode of transport in order to move from one place to another. Not everyone is able to afford a new vehicle as they are costly and there’s an added cost of taxes and various other expenses by both the provider/company of the car as well as the government. Moreover, not every customer is sure of spending a sum of their wealth on a certain car. The product might not meet their needs. The solution to this problem of having a car despite not being able to afford one is met by buying and selling second hand cars. It has become its own market now. There are already numerous companies and websites and app based services that serve as a mediator or a platform for the dealing of second hand or used cars and other vehicles. Establishment of such places is easy but there is another problem that still remains- How to price the used car appropriately at a price comfortable for both the seller and the...
International Journal of Intelligent Systems and Applications, 2012
A magic square of 3×3 and its mult iples i.e. (9×9) squares and so on, of order N are co mposed o... more A magic square of 3×3 and its mult iples i.e. (9×9) squares and so on, of order N are co mposed of (n×n) mat rix having filled with nu mbers in such a way that the totals sum along the ro ws ,colu mns and main diagonals adds up the same. By using a special geometrical figure developed.
In this paper, we present a new Data encryption scheme named as Ordeal Randomized Secure Data Enc... more In this paper, we present a new Data encryption scheme named as Ordeal Randomized Secure Data Encryption Scheme (ORSDES). The theoretical security measures are also discussed and ORSDES advocates its competency. Through this paper, we encourage and motivate the user to use DES as ORSDES with more efficiency and security. Mainly we emphasis on secrecy of key because all knows, In cryptography key always have important role. Using a variable pseudo random number and operational function, the new generated key for each block of message make ORSDES more attractive and usable. ORSDES motivates itself the user to use it with new destiny of confidence, integrity and authentication.
Journal of Global Research in Computer Science, 2011
Anyone can send a confidential message by just using public information, but the message can only... more Anyone can send a confidential message by just using public information, but the message can only be decrypted with a private key, which is in the sole possession of the intended recipient. It is really appreciable method to provide high security to the medical image or patient's information. Which provide us integrated secure transmission of medical information like Image, Audio, Video etc. with a common key. We also use lossless compression technique like SEQUITUR for efficient utilization of communication channel. The combination of encryption with compression provides confidentiality in the transmission.
Virtualization is the key technology behind cloud computing that allows the creation of an abstra... more Virtualization is the key technology behind cloud computing that allows the creation of an abstraction layer of the underlying cloud Infrastructure. Using virtualization, resources (hardware and software) can be shared and utilized while hiding the complexity from the cloud users. A lot of cloud database are available that managed by different organization such as-Amazon Storage for the Cloud, Google Storage for the Cloud, Hadoop Storage for the Cloud, Yahoo!'s PNUTS, Cassandra, CouchDB etc. This paper is presented to propose a virtual Database framework that enables the centralized global object oriented database. A virtually integrated huge database that will hide the heterogeneity of various cloud databases. Once they are integrated a consistent access is provide to the end user.
ijaest.iserp.org
In this paper, we presented an errorless model of emailing system for Internet communication. It ... more In this paper, we presented an errorless model of emailing system for Internet communication. It is the model of a real-life secure mailing system for any organization. In this model Alice can send a secret message even to any strange person in an anonymous way. The users of this model are assumed to be may or may not be the members of a closed organization. If any error occurred during the transmission due to teeming channel, it can also be determine & encountered by error correction function.
Journal of Global Research in Computer …
The scenario of present day of information security system includes confidentiality, authenticity... more The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authenticity and integrity. We kept in mind the security of transmission and capacity of channel, triple EHDES provides more complexity and enhanced security and compression with sequitur provides reduce size data or image for efficiency of communication channel. Author's previous articles define the strength of EHDES based on variation of key, cascading of EHDES or triple EHDES makes this approach more effective and usable.
... [5]. Alawi A. Al-Saggaf and Acharya HS A Generalized Framework for Crisp Commitment Schemes ... more ... [5]. Alawi A. Al-Saggaf and Acharya HS A Generalized Framework for Crisp Commitment Schemes eprint. iacr. org/2009/202. Page 140. DB Ojha, Ajay Sharma, Ramveer Singh, Shree Garg, Awakash Mishra & Abhishek Dwivedi International Journal of Computer Science and ...
International Journal of …, Jan 1, 2010
In this paper we show a model of an anonymous cum idiosyncratic Machiavellian mailing system for ... more In this paper we show a model of an anonymous cum idiosyncratic Machiavellian mailing system for Internet communication. It is the model of a real-life secure mailing system for any organization. In this model a sender can send a secret message even to a unacquainted person in an anonymous way, later which will become idiosyncratic. The users of this model are assumed to be may or may not be the members of a closed organization.
Journal of Global Research in Computer …
In this paper, we are introducing an effective and important approach of e-messaging system for t... more In this paper, we are introducing an effective and important approach of e-messaging system for transmission with high security and error free using double EHDES. This approach provides a high level of secure mailing scheme for any organization over the internetto communicate a secret error free e-message between anonymous communicators as well as within an organization.
International Journal
In current era, an image transmission becomes more usable and effective for improvement in variou... more In current era, an image transmission becomes more usable and effective for improvement in various fields. The security of image is most important while the image is transmitted. We kept in mind the security of transmission and capacity of channel, triple EHDES provides more complexity and enhanced security and compression with sequitur provides reduce size data or image for efficiency of communication channel. Author's previous articles define the strength of EHDES based on variation of key, cascading of EHDES or triple EHDES makes this approach more effective and usable.
International Journal of Engineering …, Jan 1, 2010
The proposed applications of Triple-EHDES describe a reliable e-mail system. This article provide... more The proposed applications of Triple-EHDES describe a reliable e-mail system. This article provides keen efficient secure mailing scheme for any organization. This scheme can help all those users who want to send a secure & secret message even to any unknown person in an unidentified way. The users of this model are assumed to be may or may not be the members of a closed organization, In this paper, we combine the cryptography with steganography for high security of e-messaging. GREAT-E provides three times security to EHDES.
Journal of Global Research in Computer …
In our day to day life, requires more secure transmission whereas the transmission channel is too... more In our day to day life, requires more secure transmission whereas the transmission channel is too noisy. Transmission image in various field i.e. medical field (Telemedicine) with complete efficiency for saving human life, secrecy of communication between secret agents and their relative government, to maintain the confidentiality in military operations, etc. In our approach, we introduced a new scheme to transmit an image over noisy transmission channel. Our approach is suitable combination of cryptography and compression with removal of transmission error. Cryptography provides secure transmission, Compression increases the capacity of transmission channel and Fuzzy is used for error which gets during transmission of image.
ijcsit.com
The scenario of present day of information security system includes confidentiality, authenticity... more The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authenticity and integrity. The security of communication is a crucial issue on World Wide Web (internet) and within organizations. It is about confidentiality, integrity and authentication during access or editing of confidential internal documents. We are using a nonconventional steganography to increase security, which uses the cryptography to encrypt confidential message with the public and private keys. These keys are generated differently. Then loss-less compression takes place, which makes possible to hide larger amounts of information and documents using steganography.
Journal of Global Research in Computer Science
In this paper, we presents a Proficient mode to Transmit Secure Large Size Data with Authenticati... more In this paper, we presents a Proficient mode to Transmit Secure Large Size Data with Authentication & Integrity using Double -EHDES over Teeming Channel. This approach really enhances the capability and maximum utilization of busy channel. A complete transmission is always based upon correctness and delivery on time and the massage transmission is too much sensitive and crucial. In this paper, we establish the complete arrangement of combination of encryption and compression with double EHDES while transmitting over media.A lossless compression provides us integrity. Fuzzy error correction provides error less message over noisy channel.
International Journal of …, Jan 1, 2010
Today's era of communication is too much important. An effective communication requires major fac... more Today's era of communication is too much important. An effective communication requires major factors like: Authentication, Confidentiality, Integrity, etc. In this current paper, we introduce a complete security that provides by the combination of stegnographic approach and cryptographic scheme-EHDES (Enhanced Data Encryption Standard). Stagnographic approach facilitates data hiding and EHDES encrypts the data to be transmitted. A lossless compression provides us integrity. Fuzzy error correction provides error less message over noisy channel.
International Journal of Engineering Science, Jan 1, 2010
In this paper, authors presented a new Data encryption scheme named as Ordeal Random Data Encrypt... more In this paper, authors presented a new Data encryption scheme named as Ordeal Random Data Encryption Scheme (ORDES). The theoretical security measures are also discussed and ORDES advocates its competency .Through this paper, we encourage the user to use ORDES with more efficiency and security. Mainly we emphasis on secrecy of key because all knows key always play vital role in cryptography. Using a variable random number and a function, the new generated key for each block of message make this approach attractive and more usable. The portability and usability of key changes the state of affairs of DES in every block of structure. This approach ORDES motivates the user to use DES with new destiny of confidence, integrity and authentication.
International Journal of …, Jan 1, 2010
The Key exchange problems are of central interest in security world. The basic aim is that two pe... more The Key exchange problems are of central interest in security world. The basic aim is that two people who can only communicate via an insecure channel want to find a common secret key without any attack. In this paper, we elaborated the process for well secured and assured for sanctity of correctness about the sender's and receiver's identity , as non-repudiable biased bitstring key agreement protocol (NBBKAP) using conjugacy problem in non-abelian group.
… journal of computer science and Information …, Jan 1, 2010
International journal of multidisciplinary advanced scientific research and innovation, 2021
Cars have become a necessity in this modern world. Every middle class family needs a vehicle or a... more Cars have become a necessity in this modern world. Every middle class family needs a vehicle or a mode of transport in order to move from one place to another. Not everyone is able to afford a new vehicle as they are costly and there’s an added cost of taxes and various other expenses by both the provider/company of the car as well as the government. Moreover, not every customer is sure of spending a sum of their wealth on a certain car. The product might not meet their needs. The solution to this problem of having a car despite not being able to afford one is met by buying and selling second hand cars. It has become its own market now. There are already numerous companies and websites and app based services that serve as a mediator or a platform for the dealing of second hand or used cars and other vehicles. Establishment of such places is easy but there is another problem that still remains- How to price the used car appropriately at a price comfortable for both the seller and the...
International Journal of Intelligent Systems and Applications, 2012
A magic square of 3×3 and its mult iples i.e. (9×9) squares and so on, of order N are co mposed o... more A magic square of 3×3 and its mult iples i.e. (9×9) squares and so on, of order N are co mposed of (n×n) mat rix having filled with nu mbers in such a way that the totals sum along the ro ws ,colu mns and main diagonals adds up the same. By using a special geometrical figure developed.
In this paper, we present a new Data encryption scheme named as Ordeal Randomized Secure Data Enc... more In this paper, we present a new Data encryption scheme named as Ordeal Randomized Secure Data Encryption Scheme (ORSDES). The theoretical security measures are also discussed and ORSDES advocates its competency. Through this paper, we encourage and motivate the user to use DES as ORSDES with more efficiency and security. Mainly we emphasis on secrecy of key because all knows, In cryptography key always have important role. Using a variable pseudo random number and operational function, the new generated key for each block of message make ORSDES more attractive and usable. ORSDES motivates itself the user to use it with new destiny of confidence, integrity and authentication.
Journal of Global Research in Computer Science, 2011
Anyone can send a confidential message by just using public information, but the message can only... more Anyone can send a confidential message by just using public information, but the message can only be decrypted with a private key, which is in the sole possession of the intended recipient. It is really appreciable method to provide high security to the medical image or patient's information. Which provide us integrated secure transmission of medical information like Image, Audio, Video etc. with a common key. We also use lossless compression technique like SEQUITUR for efficient utilization of communication channel. The combination of encryption with compression provides confidentiality in the transmission.
Virtualization is the key technology behind cloud computing that allows the creation of an abstra... more Virtualization is the key technology behind cloud computing that allows the creation of an abstraction layer of the underlying cloud Infrastructure. Using virtualization, resources (hardware and software) can be shared and utilized while hiding the complexity from the cloud users. A lot of cloud database are available that managed by different organization such as-Amazon Storage for the Cloud, Google Storage for the Cloud, Hadoop Storage for the Cloud, Yahoo!'s PNUTS, Cassandra, CouchDB etc. This paper is presented to propose a virtual Database framework that enables the centralized global object oriented database. A virtually integrated huge database that will hide the heterogeneity of various cloud databases. Once they are integrated a consistent access is provide to the end user.
ijaest.iserp.org
In this paper, we presented an errorless model of emailing system for Internet communication. It ... more In this paper, we presented an errorless model of emailing system for Internet communication. It is the model of a real-life secure mailing system for any organization. In this model Alice can send a secret message even to any strange person in an anonymous way. The users of this model are assumed to be may or may not be the members of a closed organization. If any error occurred during the transmission due to teeming channel, it can also be determine & encountered by error correction function.
Journal of Global Research in Computer …
The scenario of present day of information security system includes confidentiality, authenticity... more The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authenticity and integrity. We kept in mind the security of transmission and capacity of channel, triple EHDES provides more complexity and enhanced security and compression with sequitur provides reduce size data or image for efficiency of communication channel. Author's previous articles define the strength of EHDES based on variation of key, cascading of EHDES or triple EHDES makes this approach more effective and usable.
... [5]. Alawi A. Al-Saggaf and Acharya HS A Generalized Framework for Crisp Commitment Schemes ... more ... [5]. Alawi A. Al-Saggaf and Acharya HS A Generalized Framework for Crisp Commitment Schemes eprint. iacr. org/2009/202. Page 140. DB Ojha, Ajay Sharma, Ramveer Singh, Shree Garg, Awakash Mishra & Abhishek Dwivedi International Journal of Computer Science and ...
International Journal of …, Jan 1, 2010
In this paper we show a model of an anonymous cum idiosyncratic Machiavellian mailing system for ... more In this paper we show a model of an anonymous cum idiosyncratic Machiavellian mailing system for Internet communication. It is the model of a real-life secure mailing system for any organization. In this model a sender can send a secret message even to a unacquainted person in an anonymous way, later which will become idiosyncratic. The users of this model are assumed to be may or may not be the members of a closed organization.
Journal of Global Research in Computer …
In this paper, we are introducing an effective and important approach of e-messaging system for t... more In this paper, we are introducing an effective and important approach of e-messaging system for transmission with high security and error free using double EHDES. This approach provides a high level of secure mailing scheme for any organization over the internetto communicate a secret error free e-message between anonymous communicators as well as within an organization.
International Journal
In current era, an image transmission becomes more usable and effective for improvement in variou... more In current era, an image transmission becomes more usable and effective for improvement in various fields. The security of image is most important while the image is transmitted. We kept in mind the security of transmission and capacity of channel, triple EHDES provides more complexity and enhanced security and compression with sequitur provides reduce size data or image for efficiency of communication channel. Author's previous articles define the strength of EHDES based on variation of key, cascading of EHDES or triple EHDES makes this approach more effective and usable.
International Journal of Engineering …, Jan 1, 2010
The proposed applications of Triple-EHDES describe a reliable e-mail system. This article provide... more The proposed applications of Triple-EHDES describe a reliable e-mail system. This article provides keen efficient secure mailing scheme for any organization. This scheme can help all those users who want to send a secure & secret message even to any unknown person in an unidentified way. The users of this model are assumed to be may or may not be the members of a closed organization, In this paper, we combine the cryptography with steganography for high security of e-messaging. GREAT-E provides three times security to EHDES.
Journal of Global Research in Computer …
In our day to day life, requires more secure transmission whereas the transmission channel is too... more In our day to day life, requires more secure transmission whereas the transmission channel is too noisy. Transmission image in various field i.e. medical field (Telemedicine) with complete efficiency for saving human life, secrecy of communication between secret agents and their relative government, to maintain the confidentiality in military operations, etc. In our approach, we introduced a new scheme to transmit an image over noisy transmission channel. Our approach is suitable combination of cryptography and compression with removal of transmission error. Cryptography provides secure transmission, Compression increases the capacity of transmission channel and Fuzzy is used for error which gets during transmission of image.
ijcsit.com
The scenario of present day of information security system includes confidentiality, authenticity... more The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authenticity and integrity. The security of communication is a crucial issue on World Wide Web (internet) and within organizations. It is about confidentiality, integrity and authentication during access or editing of confidential internal documents. We are using a nonconventional steganography to increase security, which uses the cryptography to encrypt confidential message with the public and private keys. These keys are generated differently. Then loss-less compression takes place, which makes possible to hide larger amounts of information and documents using steganography.
Journal of Global Research in Computer Science
In this paper, we presents a Proficient mode to Transmit Secure Large Size Data with Authenticati... more In this paper, we presents a Proficient mode to Transmit Secure Large Size Data with Authentication & Integrity using Double -EHDES over Teeming Channel. This approach really enhances the capability and maximum utilization of busy channel. A complete transmission is always based upon correctness and delivery on time and the massage transmission is too much sensitive and crucial. In this paper, we establish the complete arrangement of combination of encryption and compression with double EHDES while transmitting over media.A lossless compression provides us integrity. Fuzzy error correction provides error less message over noisy channel.
International Journal of …, Jan 1, 2010
Today's era of communication is too much important. An effective communication requires major fac... more Today's era of communication is too much important. An effective communication requires major factors like: Authentication, Confidentiality, Integrity, etc. In this current paper, we introduce a complete security that provides by the combination of stegnographic approach and cryptographic scheme-EHDES (Enhanced Data Encryption Standard). Stagnographic approach facilitates data hiding and EHDES encrypts the data to be transmitted. A lossless compression provides us integrity. Fuzzy error correction provides error less message over noisy channel.
International Journal of Engineering Science, Jan 1, 2010
In this paper, authors presented a new Data encryption scheme named as Ordeal Random Data Encrypt... more In this paper, authors presented a new Data encryption scheme named as Ordeal Random Data Encryption Scheme (ORDES). The theoretical security measures are also discussed and ORDES advocates its competency .Through this paper, we encourage the user to use ORDES with more efficiency and security. Mainly we emphasis on secrecy of key because all knows key always play vital role in cryptography. Using a variable random number and a function, the new generated key for each block of message make this approach attractive and more usable. The portability and usability of key changes the state of affairs of DES in every block of structure. This approach ORDES motivates the user to use DES with new destiny of confidence, integrity and authentication.
International Journal of …, Jan 1, 2010
The Key exchange problems are of central interest in security world. The basic aim is that two pe... more The Key exchange problems are of central interest in security world. The basic aim is that two people who can only communicate via an insecure channel want to find a common secret key without any attack. In this paper, we elaborated the process for well secured and assured for sanctity of correctness about the sender's and receiver's identity , as non-repudiable biased bitstring key agreement protocol (NBBKAP) using conjugacy problem in non-abelian group.
… journal of computer science and Information …, Jan 1, 2010