Abhishek Bansal

Work place: Indira Gandhi National Tribal University, Amarkantak, M.P

E-mail: bansalabhishek28@gmail.com

Website: https://orcid.org/0000-0001-5968-3625

Research Interests: Applied computer science, Computational Science and Engineering, Computer systems and computational processes, Theoretical Computer Science

Biography

Abhishek Bansal did his MCA from Dr. Bhim Rao Ambedkar University, Agra, India in 2004. He is currently working as a Assistant Professor in the department of Computer Science, Indira Gandhi National Tribal University, M.P. India. He is pursuing PhD in Information Security from Delhi University, India. He has working experience more than 5 years. His research interests include digital Watermarking, data hiding techniques and image processing.

Author Articles
Automatic Cyberstalking Detection on Twitter in Real-Time using Hybrid Approach

By Arvind Kumar Gautam Abhishek Bansal

DOI: https://doi.org/10.5815/ijmecs.2023.01.05, Pub. Date: 8 Feb. 2023

Many people are using Twitter for thought expression and information sharing in real-time. Twitter is one of the trendiest social media applications that cybercriminals also widely use to harass the victim in the form of cyberstalking. Cyberstalkers target the victim through sexism, racism, offensive language, hate language, trolling, and fake accounts on Twitter. This paper proposed a framework for automatic cyberstalking detection on Twitter in real-time using the hybrid approach. Initially, experimental works were performed on recent unlabeled tweets collected through Twitter API using three different methods: lexicon-based, machine learning, and hybrid approach. The TF-IDF feature extraction method was used with all the applied methods to obtain the feature vectors from the tweets. The lexicon-based process produced maximum accuracy of 91.1%, and the machine learning approach achieved maximum accuracy of 92.4%. In comparison, the hybrid approach achieved the highest accuracy of 95.8% for classifying unlabeled tweets fetched through Twitter API. The machine learning approach performed better than the lexicon-based, while the performance of the proposed hybrid approach was outstanding. The hybrid method with a different approach was again applied to classify and label the live tweets collected by Twitter Streaming in real-time. Once again, the hybrid approach provided the outstanding result as expected, with an accuracy of 94.2%, recall of 94.1%, the precision of 94.6%, f-score of 94.1%, and the best AUC of 98%. The performance of machine learning classifiers was measured in each dataset labeled by all three methods. Experimental results in this study show that the proposed hybrid approach performed better than other implemented approaches in both recent and live tweets classification. The performance of SVM was better than other machine learning algorithms with all applied approaches.

[...] Read more.
Security against Sample Pair Steganalysis in Eight Queens Data Hiding Technique

By Abhishek Bansal Sunil K. Muttoo Vinay Kumar

DOI: https://doi.org/10.5815/ijcnis.2016.08.05, Pub. Date: 8 Aug. 2016

There are many steganalysis methods, which can estimate length of a message embedded in least significant bits. It may be embedded either in spatial domain or in frequency domain. The well known approaches are Chi – Square test, RS steganalysis and Sample Pair steganalysis. Many commercial steganographic programs are based on LSB method. It is important to ensure undetectablity of a hidden message in a carrier. We present an analysis of steganographic security on data hiding approach using eight queen solutions. In this approach, relationship between message bytes and 8-queen solutions is embedded in the cover. Further, we propose a new approach to adjust the statistical properties of the cover image in such a way that the steganalyst may not be able to detect the presence of hidden message. The proposed approach is tested using steganalysis tool STEGEXPOSE and the experimental results found are within acceptable range.

[...] Read more.
Other Articles