sumana.kundu@bcrec.ac.in |
|
2022-11-01 |
|
Computer Science and Engineering |
|
Dr. Sumana Kundu received her B.E. and M.Tech degree in Computer Science & Engineering in the years of 2008 and 2010. She worked as a Research Scholar (Full Time) at Computer Science & Engineering department of National Institute of Technology, Durgapur and obtained her PhD degree in the year of 2018. Dr. Sumana Kundu was an Assistant Professor at Siliguri Institute of Technology, Techno India Group. Thereafter she was an Associate Professor and Head of the Department at Haldia Institute of Technology. Presently she is an Associate Professor at Computer Science & Engineering department of Dr. B. C. Roy Engineering College, Durgapur. Her Research area of interest includes Pattern Recognition, Machine Learning, Data Security using Steganography. She published more than 20 papers including SCI indexed journals, international conferences, book chapters and also several Patents. |
|
Pattern Recognition, Machine Learning, Data Security using Steganography. |
Teaching | Research | Industry |
---|---|---|
14 | 11 |
Pattern Recognition, Machine Learning, Data Security using Steganography.
Pattern Recognition, Machine Learning, Data Security using Steganography.
SL. No. | Location | Topic |
---|---|---|
1 | Dr. B. C. Roy Polytechnic, Durgapur | Cluster Analysis in Data Mining |
2 | UEM Kolkata | Cluster Analysis in Data Mining: Applications, Methods& Requirements |
SL. No. | Professional Body |
---|---|
1 | IEEE |
2 | CSI |
SL. No. | Project Ideas Submitted to Govt. Agencies |
---|---|
1 | Project Title: Multimodal Biometrics Based Enhanced Security System for Bank Vaults. Submitted to DST-SERB-SURE. Reference No. : 132023006650. |
Date | Title | Journal | DOI | Link |
---|---|---|---|---|
01-10-2023 | A unique database synthesis technique for coverless data hiding | Journal of Visual Communication and Image Representation | DOI | View |
28-07-2023 | A Two Fold Secure Cover Synthesis Based Data Hiding Approach by Generating Sequences | Wireless Personal Communications | DOI | View |
21-02-2023 | An improved location mapping and cover synthesis based data hiding by model SSSP problem generation | Multimedia Tools and Applications | DOI | View |
Date | Title | Conference | DOI | Link |
---|---|---|---|---|
23-04-2025 | An Intelligent Disaster Management System: Integrating Technology for Effective Response and Recovery | 2025 3rd International Conference on Intelligent Systems, Advanced Computing and Communication (ISACC) | DOI | View |
Date | Title | Book Title | Editor | ISBN | DOI | Link |
---|---|---|---|---|---|---|
29-11-2023 | Malicious Transaction URL Detection Using Logistic Regression | Lecture Notes in Networks and Systems | Jyotsna Kumar Mandal , Biswapati Jana , Tzu-Chuen Lu , Debashis De | 978-981-99-4433-0 | DOI | View |
28-04-2023 | House Rent Prediction Using Ensemble-Based Regression With Real-Time Data | Novel Research and Development Approaches in Heterogeneous Systems and Algorithms | Santanu Koley, Subhabrata Barman, Subhankar Joardar | 9781668475249 | DOI | View |
10-06-2024 | Paddy Leaf Diseases Detection Using Otsu and Yen Thresholding with Deep Convolutional Neural Network | Internet of Things-Based Machine Learning in Healthcare | Prasenjit Dey, Sudip Kumar Adhikari, Sourav De, Indrajit Kar | 9781003391456 | DOI | View |
31-05-2024 | Digital Watermarking Strategies for Healthcare Data Security: A Comprehensive Review and Analysis | Lightweight Digital Trust Architectures in the Internet of Medical Things (IoMT) | Ahdi Hassan, Pronaya Bhattacharya, Subrata Tikadar, Pushan Kumar Dutta, Martin Sagayam | 9798369321096 | DOI | View |
03-10-2024 | Kinship Verification by Analysing Facial Images to Ensure Human Security | Human Impact on Security and Privacy: Network and Human Security, Social Media, and Devices | Rajeev Kumar, Saurabh Srivastava, Ahmed A. Elngar | 9798369392355 | DOI | View |
01-01-2025 | A Proficient Fake Fingerprint Identification System Based on CNN to Ensure Human Security | Data-Driven Governance Through AI, Digital Marketing, and the Privacy Interplay | José Ramón Saura | 9798369369456 | DOI | View |
Start Date | End Date | Title | Organizer |
---|---|---|---|
30-01-2024 | 31-01-2024 | Solving clustering problems using hybridization of K-means and Gravitational Search Algorithm | CSE department, Dr. B.C. Roy Engineering College |
06-02-2023 | 11-02-2023 | Fast Emerging Research Domain for Future Trends of Advanced Computation | Dr. B.C. Roy Engineering College |
22-04-2024 | 27-04-2024 | Machine Learning Applications for Sustainable Society | CSE department, Dr. B.C. Roy Engineering College |
SL. No. | Description |
---|---|
1 | Session co-chair at IEEE MESIICON 2022 |
2 | Organizing Committee member of Webinar “Solving Clustering Problems using Hybridization of K-means and Gravitational Search Algorithm”, held at January, 2024. |
3 | Organizing Committee member of one week FDP, "Machine Learning Applications for Sustainable Society", held from 22nd-26th April, 2024 |
SL. No. | Year | Topic | Rollno | University Registration | Affiliation |
---|---|---|---|---|---|
1 | 2024 | Fake Fingerprint Identification using Deep Learning |
Atanu Mondal
|
Dr. B. C. Roy Engineering College | |
2 | 2024 | Diabetes Prediction based on Logistic Regression |
Debojyoti Puitandy
|
Dr. B. C. Roy Engineering College |
SL. No. | Year | Topic | Rollno | University Registration | Affiliation |
---|---|---|---|---|---|
1 | 2024 | Kinship Verification based on Facial Images Analysis |
Arkadyuti Mahato
Sourav Das |
Dr. B. C. Roy Engineering College | |
2 | 2024 | Parkinson Disease Detection using Voice Analysis |
Anindita Laha
Shreya Sinha Rohit Sharma |
Dr. B. C. Roy Engineering College |
Date | Title | Patent No. | Country |
---|---|---|---|
13-01-2022 | A System for Novel Text Steganography Based on Puzzle Generation | Germany | |
01-12-2023 | A METHOD AND SYSTEM FOR PASSING ENCRYPTED MESSAGES THROUGH TEXT | India | |
08-03-2024 | A Cover Synthesis Based Data Hiding Approach By Generating Sequences | India | |
16-08-2024 | An Innovative Approach to Synthesize Databases For Coverless Data Hiding | India | |
31-01-2025 | An Enhanced Data Hiding Via Location Mapping and Cover Synthesis Through the Model SSSP Problem Generation | India |