Pradeep Kumar Singh

Work place: ASET, Amity University, Uttar Pradesh

E-mail: pksingh16@amity.edu

Website:

Research Interests: Computational Science and Engineering, Computational Engineering, Software Engineering, Computer systems and computational processes, Computer Networks, Engineering

Biography

Pradeep Kumar Singh is an Assistant Professor in Computer Science & Engineering department at the Amity School of Engineering and Technology, Amity University, Uttar Pradesh, Noida India. He is member of ACM, CSI and many professional bodies. He has published more than 25 papers in International Conferences and Journals of repute with Scopus, ISI Indexed repositories.

Author Articles
An Analysis on Digital Watermarking in Videos based on Frequency Domain Techniques

By Monasa Yengkhom Pradeep Kumar Singh

DOI: https://doi.org/10.5815/ijmecs.2015.12.05, Pub. Date: 8 Dec. 2015

As Watermarking have been considered as an emerging technique for copyright protection, data security and protection of ownership, several techniques and algorithms have been developed and created either in spatial domain or frequency domain mainly to achieve the properties of digital watermarking like robustness, imperceptibility, fidelity, etc. It is also found that the frequency domain techniques provides a better solution in obtaining these properties than the spatial domain. So, most researchers have used this domain in developing a good watermarking scheme for achieving robustness and other important properties of digital watermarking against all kinds of intentional and unintentional attacks. The attacks may include image processing attacks like compression, frame dropping, piracy, geometric distortions, loss of quality, etc. So, utmost importance must be given on how to create a scheme which can achieve robustness against all these attacks at the same time. The medium for watermarking is chosen as video because of its vast future scope So, in this paper, a thorough research on the various techniques available in watermarking based on frequency domain has been done to find out a secure technique that can withstand any kinds of attacks in a digital video.

[...] Read more.
An Insight to Soft Computing based Defect Prediction Techniques in Software

By Kritika Verma Pradeep Kumar Singh

DOI: https://doi.org/10.5815/ijmecs.2015.09.07, Pub. Date: 8 Sep. 2015

Nowadays, the complexity and size of software systems is proliferating. These factors have various pros and cons. On one side where they lead to better performance and satisfactory results, on the other side they lead to high testing cost , wacky results , poor quality and non-reliability of the product. These problems have one root cause which is referred to as defects in the software systems Predicting these defects can not only rule out the cons but can also boost up the pros. Various techniques are present for the same which are reviewed in depth in this paper. Moreover, a comparison of these techniques is also done to throw a lime light on those which provide the best results.

[...] Read more.
Novel Digital Image Water Marking Technique Against Geometric Attacks

By Anadi Ajay Pradeep Kumar Singh

DOI: https://doi.org/10.5815/ijmecs.2015.08.07, Pub. Date: 8 Aug. 2015

Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT) based techniques have become prominently used in watermarking research. DCT based technique replacing the older ones have made digital watermarking based e-commerce a part of almost all business transactions. It is also being used in business communications and different solutions through computer network. DCT based technique is considered as a secured communication between two users. Verification is being provided for the origin of a watermark that traverses from sender to receiver. The cost per transmission has also reduced as the watermark is encoded in the digital watermarking itself. Here the key size is also small thus making it suitable for key exchange application. Also the security level in fragile watermark is better compared to discrete data integrity verification or authentication for the same bandwidth and key size In this paper, we have compared various geometric attacks based techniques in terms of PSNR and Attack Recovery time.

[...] Read more.
A Study and Review on the Development of Mutation Testing Tools for Java and Aspect-J Programs

By Pradeep Kumar Singh Om Prakash Sangwan Arun Sharma

DOI: https://doi.org/10.5815/ijmecs.2014.11.01, Pub. Date: 8 Nov. 2014

Mutation analysis in software testing is observed as the most effective way to validate the software under inspection. In last decade, number of researchers developed various methods and tools to apply mutation testing on Aspect Oriented Programs. In this paper, authors analyzed numerous mutation testing based tools available to test the Java and AspectJ programs. All effective and popular Aspect-J testing tools have been considered and analyzed in this paper, based on essential requirements in this context, considered to be fulfilled by testing tools decided by testing professional and researchers for such tools. This paper analyzed the work progress in the field of mutation testing techniques and tools specific to Java and AspectJ. This work considered essential parameters on which the analysis of analyzed tools is carried out. In case of addition parameters considered for evaluation, some of the resultant metrics may vary slightly under modification in basic requirements. Based on the numeric value estimated, it is finally suggested the merits of a mutation tool under different circumstances. This is the extension of the work carried by us in previous review for aspect based mutation testing techniques.

[...] Read more.
Other Articles