Sourabh Debnath | Coverless Steganography | Best Researcher Award

Mr. Sourabh Debnath | Coverless Steganography | Best Researcher Award

Researcher at National Institute of Technology Rourkela, India

Mr. Sourabh Debnath is an accomplished researcher and Ph.D. candidate in Computer Science & Engineering at the National Institute of Technology Rourkela, with a focus on improving capacity, robustness, and security in networked systems. He holds an M.Tech from Veer Surendra Sai University of Technology, Sambalpur, and a B.Tech from Government College of Engineering Kalahandi, both in Computer Science & Engineering. Currently a Senior Research Fellow (SRF) at NIT Rourkela’s Cybernetics and Information Security Laboratory, Mr. Debnath specializes in coverless steganography, image processing, and machine learning. His work has led to several publications in top journals and conferences, particularly in the areas of secure data transmission and video steganography. Additionally, he contributes to the academic community as a reviewer for Elsevier’s Journal of Information Security and Applications and has presented his work at various international conferences.

Education:

Mr. Sourabh Debnath has a strong academic background in Computer Science and Engineering. He is currently pursuing a Doctor of Philosophy (Ph.D.) in Computer Science & Engineering at the National Institute of Technology, Rourkela, where he has achieved an impressive CGPA of 8.89. Prior to this, he completed his Master of Technology (M.Tech) in Computer Science & Engineering from Veer Surendra Sai University of Technology (VSSUT), Burla, Sambalpur, Odisha, with a CGPA of 8.27. Mr. Debnath began his higher education journey with a Bachelor of Technology (B.Tech) in Computer Science & Engineering from Government College of Engineering Kalahandi (GCEK), Bhawanipatna, Odisha, where he graduated with a CGPA of 8.13. His foundational studies include Intermediate Science at Govt. Junior Science College, Malkangiri, with a 68.83% score, and Matriculation from I.M.S.T. English Medium and High School, Malkangiri, where he achieved a CGPA of 8.00. Mr. Debnath’s consistent academic performance highlights his dedication and capability in his field.

Professional Experience:

Mr. Sourabh Debnath has accumulated valuable research experience in cybernetics and information security, currently serving as a Senior Research Fellow (SRF) at the Cybernetics and Information Security Laboratory, National Institute of Technology Rourkela, since June 2022. In this role, he focuses on advanced techniques for secret data sharing and network security. Prior to this, he served as a Junior Research Fellow (JRF) in the same laboratory from January 2020 to May 2022. His research work emphasizes enhancing capacity, robustness, and security in data transmission frameworks. Additionally, Mr. Debnath has contributed to the scholarly community as a reviewer for the Journal of Information Security and Applications (Elsevier) and as a reviewer for the 3rd International Conference on Artificial Intelligence and Signal Processing (AISP) organized by VIT-AP and IEEE Hyderabad

Research Interests:

Mr. Sourabh Debnath’s research interests center on advancing techniques for secure data transmission, with a particular focus on coverless steganography. His work seeks to enhance data-sharing methodologies by improving capacity, robustness, and security in steganographic frameworks. Additionally, he explores applications in image processing, machine learning, and deep learning to refine data-hiding techniques and optimize efficiency within secure systems. His technical skills include proficiency in programming languages such as C/C++, Oracle, Python, and MATLAB, as well as frameworks like Keras and TensorFlow, which he applies in innovative research areas like network security and efficiency analysis.

Awards and Honors:

Mr. Sourabh Debnath has been recognized for his contributions to academia and research through various honors. He serves as a reviewer for the Journal of Information Security and Applications by Elsevier, where he applies his expertise in data security and steganography. Additionally, he was selected as a reviewer for the prestigious 3rd International Conference on Artificial Intelligence and Signal Processing (AISP) organized by VIT-AP, India, and IEEE Hyderabad Section in 2023. These roles highlight his dedication to advancing knowledge in the fields of artificial intelligence, data security, and cybernetics.

Skills:

Mr. Sourabh Debnath possesses a strong technical skill set and diverse expertise that complement his research pursuits. His programming skills include proficiency in C/C++, Oracle, Python, and MATLAB, which he utilizes to develop and implement complex algorithms in his work. He is well-versed in machine learning frameworks such as Keras and TensorFlow, which he applies in research areas like coverless steganography and data security. Additionally, Mr. Debnath is adept in document creation tools like Microsoft Office Suite and LaTeX, and he has a solid foundation in coursework relevant to his field, including Steganography, Operating Systems, Machine Learning, and Database Management Systems. His soft skills, such as problem-solving, self-learning, presentation, and adaptability, further enhance his capabilities as a researcher and collaborator.

Publication Top Noted:

Energy management in wireless sensor network through EB-LEACH

  • Authors: H. Mohapatra, S. Debnath, A.K. Rath
  • Journal: International Journal of Research and Analytical Reviews (IJRAR), 2019
  • Citations: 45

An efficient energy saving scheme through sorting technique for wireless sensor network

  • Authors: H. Mohapatra, S. Debnath, A.K. Rath, P.B. Landge, S. Gayen, R. Kumar
  • Journal: International Journal, 2020
  • Citations: 23

Secret data sharing through coverless video steganography based on bit plane segmentation

  • Authors: S. Debnath, R.K. Mohapatra, R. Dash
  • Journal: Journal of Information Security and Applications, 2023
  • Citations: 11

Coverless image steganography based on DWT approximation and pixel intensity averaging

  • Authors: S. Biswas, S. Debnath, R.K. Mohapatra
  • Conference: 7th International Conference on Trends in Electronics and Informatics, 2023
  • Citations: 10

Fuzzy petri nets-based intelligent routing protocol for ad hoc network

  • Authors: A. Samantra, A. Panda, S.K. Das, S. Debnath
  • Book Chapter: Design Frameworks for Wireless Networks, 2020
  • Citations: 9

A study on secret data sharing through coverless steganography

  • Authors: S. Debnath, R.K. Mohapatra
  • Conference: 2nd International Conference on Artificial Intelligence and Signal Processing, 2022
  • Citations: 8

Energy management in wireless sensor network through EB-LEACH (No. 1192)

  • Authors: H. Mohapatra, S. Debnath, A.K. Rath
  • Platform: Easy Chair, 2019
  • Citations: 6

DCT based robust coverless information hiding scheme with high capacity

  • Authors: T. Kulkarni, S. Debnath, J. Kumar, R.K. Mohapatra
  • Conference: 7th International Conference on Trends in Electronics and Informatics, 2023
  • Citations: 5

Conclusion:

Mr. Sourabh Debnath’s extensive academic qualifications, diverse and impactful research publications, robust technical skills, and experience in academia and peer-review make him a worthy contender for the Best Researcher Award. His work in coverless steganography, video processing, and data security positions him as a leading researcher with the potential to make continued significant contributions to his field.

Xing LI | Cybersecurity Risk | Best Researcher Award

Assoc Prof Dr. Xing LI | Cybersecurity Risk | Best Researcher Award

Associate Professor at Xi’an Jiaotong University, China

Associate Professor Dr. Xing Li appears to be a suitable candidate for the Best Researcher Award based on several key considerations:

Profile:

Research Contributions:

Diverse Research Topics: Dr. Xing Li has made significant contributions to various fields within accounting and finance, with a particular focus on cybersecurity risk management and corporate governance. His research addresses critical issues such as the impact of managerial myopia on cybersecurity, employee education levels on corporate investment efficiency, and the relationship between corporate social responsibility and financial fraud.

High-Impact Publications: Dr. Li has an impressive record of publications in highly regarded journals such as the Journal of Banking & Finance, Journal of Accounting Literature, Contemporary Accounting Research, Journal of Business Ethics, and Accounting & Finance. His work has garnered recognition, including a Top Cited Article Award, indicating its impact and relevance in the academic community.

Collaborative Efforts: Many of Dr. Li’s research projects are collaborative, involving co-authors from different institutions. This collaborative approach is essential for producing high-quality, multidisciplinary research that addresses complex issues in innovative ways.

Teaching Excellence:

Outstanding Teaching Evaluations: Dr. Li has received exceptionally high student evaluation scores, including a 99.77 in 2023, and has been awarded the Outstanding Teaching Award at Xi’an Jiaotong University. His commitment to teaching excellence enhances his profile as a well-rounded academic.

Course Development: He has developed and taught courses such as Audit and Assurance (ACCA) and Empirical Accounting Research, contributing to the academic development of both undergraduate and master students.

Professional Recognition and Awards:

Awards and Honors: Dr. Li has received several prestigious awards, including the Shaanxi Provincial Higher School Science and Technology Achievement Award (Grand Prize) and the Outstanding Research Thesis Award at City University of Hong Kong. These accolades highlight his contributions to both research and teaching.

Research Funding: He has secured significant research funding from reputable sources such as the National Natural Science Foundation of China and the China Postdoctoral Science Foundation, underscoring his ability to attract support for his research initiatives.

Contributions to Academic Literature:

Monographs and Textbooks: Dr. Li has contributed as Deputy Editor-in-Chief to influential textbooks like “Blockchain Theory and Practice” and “Advanced Financial Management: Theory and Practice.” These contributions reflect his role in shaping academic literature and providing valuable resources for students and professionals.

Reviewer Roles and Professional Activities:

Editorial and Reviewer Roles: Dr. Li serves as a reviewer for several reputable journals, including the Journal of Business Ethics and the International Journal of Financial and Economics. His involvement in these roles demonstrates his commitment to maintaining high standards in academic publishing.

Conclusion:

Based on his extensive research contributions, outstanding teaching record, significant awards and honors, and active involvement in the academic community, Associate Professor Dr. Xing Li is indeed a strong candidate for the Best Researcher Award. His work not only advances academic knowledge but also addresses practical issues in cybersecurity risk management and corporate governance, making a substantial impact on the field.

Publication Tob Noted:

The Impact of Managerial Myopia on Cybersecurity: Evidence from Data Breaches

  • Authors: Chen, W., Li, X., Wu, H., Zhang, L.
  • Journal: Journal of Banking and Finance
  • Volume: 166
  • Article: 107254
  • Year: 2024
  • Citations: 0

Asymmetric Inefficiency in the Market Response to Non-earnings 8-K Information

  • Authors: Li, X., Tan, Q.
  • Journal: Contemporary Accounting Research
  • Volume: 39, Issue: 2
  • Pages: 1389–1424
  • Year: 2022
  • Citations: 1

MD&A Readability, Auditor Characteristics, and Audit Fees

  • Authors: Wang, L., Chen, X., Li, X., Tian, G.
  • Journal: Accounting and Finance
  • Volume: 61, Issue: 4
  • Pages: 5025–5050
  • Year: 2021
  • Citations: 14

Corporate Social Responsibility and Financial Fraud: The Moderating Effects of Governance and Religiosity

  • Authors: Li, X., Kim, J.-B., Wu, H., Yu, Y.
  • Journal: Journal of Business Ethics
  • Volume: 170, Issue: 3
  • Pages: 557–576
  • Year: 2021
  • Citations: 26

Employee Quality and Audit Fee: Evidence from China

  • Authors: Li, X., Chen, X., Qi, B., Tian, G.
  • Journal: Accounting and Finance
  • Volume: 60, Issue: 5
  • Pages: 4533–4566
  • Year: 2020
  • Citations: 26

 

Sharmila Ghosh | Hiding and Steganography | Best Researcher Award

Ms. Sharmila Ghosh | Hiding and Steganography | Best Researcher Award 

Student at National Institute of Technology Agartala, India

Summary:

Sharmila Ghosh is a dedicated cyber security professional from Agartala, Tripura, India. She holds a BTech in Information Technology and is currently pursuing an MTech in Cyber Security. Her academic background includes extensive knowledge in Cryptography, Steganography, Ethical Hacking, and Web Development. Sharmila has demonstrated her technical skills through innovative projects such as Image Steganography using Histogram Shifting and Personalized Music Recommendation Systems. Her research interests focus on enhancing data security through chaos theory-based cryptographic algorithms and advanced image security techniques. She has earned several accolades, including multiple prizes in electronic design and national competitions. Sharmila’s commitment to advancing cyber security is evident in her published research and diverse skill set in programming and web development.

Profile:

Education:

Sharmila Ghosh is currently pursuing a Master of Technology (MTech) in Cyber Security at the National Institute Technology Agartala, Tripura, with expected completion in 2024. Prior to this, she earned her Bachelor of Technology (BTech) in Information Technology from Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, where she achieved a CGPA of 8.62. During her undergraduate studies, she gained extensive knowledge in various areas including Cryptography, Steganography, Ethical Hacking, Data Structures, Algorithms, and Computer Networks. Sharmila completed her Higher Secondary education under the CBSE board at Sri Krishna Mission School, Agartala, with a percentage of 65.4%. She also completed her Secondary Examination under CBSE at the same school with a CGPA of 9.0. Her educational background reflects a strong foundation in both theoretical and practical aspects of cyber security and technology.

Professional Experience:

Sharmila Ghosh’s professional experience includes various roles and projects that have honed her skills in cyber security and technology. During her BTech studies, she implemented a cutting-edge Image Steganography project using Histogram Shifting combined with Huffman Encoding and AES Encryption for enhanced data security. She also developed a Personalized Music Recommendation System utilizing Deep Neural Network techniques, aiming to provide a tailored listening experience. Additionally, Sharmila worked on a Semantic Similarity Computation project using Cosine LSTM to analyze textual elements. Her hands-on projects and coursework have provided her with practical experience in ethical hacking, cryptography, web development, and programming, making her well-prepared for challenges in the cyber security field.

Research Interests:

Sharmila Ghosh’s research interests are centered around advancing the field of cyber security through innovative techniques and applications. Her focus includes Cryptography and Steganography, where she explores methods to enhance data security, particularly in medical imaging and digital watermarking. She is also interested in Chaos Theory-based Cryptographic Algorithms, which she investigates to improve cryptographic systems. Her research extends to Social Media Network Security, where she studies attacks and prevention measures. Additionally, Sharmila is engaged in Image Security analysis, employing chaos theory to enhance the robustness of image steganography. Her work aims to integrate and improve security measures using advanced methodologies, contributing to the broader cyber security landscape.

 Skills:

Sharmila Ghosh possesses a diverse skill set essential for a career in cyber security and technology. She is proficient in Cyber Security, with expertise in Ethical Hacking, Cryptography, and Steganography. Her programming skills include Python and C language, which she uses for various security-related applications and development tasks. In Web Development, Sharmila is skilled in HTML and CSS, contributing to her ability to create and secure web interfaces. She has a strong foundation in Data Structures and Algorithms, enhancing her problem-solving capabilities. Additionally, Sharmila has experience with Advanced Steganography Techniques, such as Histogram Shifting and Huffman Encoding, and is adept at using Deep Neural Networks for personalized systems. Her ability to integrate Cryptography with Steganography for enhanced data security reflects her innovative approach and strong analytical skills.

 Awards and Honors:

Sharmila Ghosh has received several awards and honors reflecting her academic and extracurricular achievements. She was awarded the Second Prize in a School-level scholarship competition in October 2023 and the Third Prize in an Enterprise Scholarship in June 2023. She was recognized as an Outstanding Student Cadre and an Outstanding Communist Party Member in September and June 2023, respectively. During her BTech, she earned the Second Prize in the Central University Graduate Electronic Design Competition in August 2022. She also achieved the Third Prize in the National Intelligent Car Competition South China Race in August 2021 and the Second Prize in the Hunan Electronic Design Competition in June 2021. These accolades highlight her excellence in both academic pursuits and competitive projects.

Publication Top Noted:

  1. “A Comparative Analysis of Chaos Theory-Based Medical Image Steganography to Enhance Data Security”
    Authors: Sharmila Ghosh, Ananya Saha, Tanmoy Pal, Arvind Kumar Jha
    Year: 2024
    Journal: Procedia Computer Science, 235, pp. 1024–1033
  2. “An Analysis of Chaos-Based Cryptographic Algorithms”
    Authors: Sharmila Ghosh, Pritam Pal, Nirmal Kar
    Year: 2023
    Conference: 5th International Conference on Electrical, Computer and Communication Technologies (ICECCT 2023)
  3. “Attacks on Social Media Networks and Prevention Measures”
    Authors: Pritam Pal, Sharmila Ghosh, Nirmal Kar
    Year: 2023
    Conference: International Conference for Advancement in Technology (ICONAT 2023)