Vinay Kumar

Work place: VIPS/IT, New Delhi, 110 080, India

E-mail: vinay5861@gmail.com

Website:

Research Interests: Computer Architecture and Organization, Information Security, Network Security, Data Structures and Algorithms

Biography

Dr. Vinay Kumar is Dean IT & Professor in Vivekananda Institute of Professional Studies, Delhi. Earlier he worked as Scientist in National Informatics Centre, MoCIT, GOI. He completed his Ph. D. in Computer Science from University of Delhi and MCA from JNU, Delhi. He has authored a book on Discrete Mathematics and contributed many research papers to refereed journals and conferences. His areas of interest are graph algorithm, steganography, data security, data mining and e-governance. He is member of CSI and ACM. Details available at http://knowdrvinaykumar.blogspot.in / Ph: 011- 2734 3402. E-Mail: vinay5861@gmail.com

Author Articles
A Solution to Secure Personal Data When Aadhaar is linked with DigiLocker

By Vinay Kumar Arpana Chaturvedi Meenu Dave

DOI: https://doi.org/10.5815/ijcnis.2018.05.05, Pub. Date: 8 May 2018

With spread of digitalization in India, the government initiated many welfare schemes for citizens as a part of e-governance. To ensure security, it is made mandatory to link Aadhaar card of beneficiaries with different schemes. The government also proposed to link UIDAI with DigiLocker to lead India towards the paperless economy. Due to this, worries related to security concern arise. Once UIDAI connected with DigiLocker, a resident can share personal data with other agencies. It generates enormous amount of Data and it may cause misuse of personal data. It is very important to keep data secure with controlled and authenticated access. It is a challenge to manage and secure this amount of data. In this paper, we propose a framework and model to secure personal data using proper authentication process. Availability of the documents should be verified by the owner and post verification, the document should be accessible for the limited time. Failing which revalidation is required.

[...] Read more.
Security against Sample Pair Steganalysis in Eight Queens Data Hiding Technique

By Abhishek Bansal Sunil K. Muttoo Vinay Kumar

DOI: https://doi.org/10.5815/ijcnis.2016.08.05, Pub. Date: 8 Aug. 2016

There are many steganalysis methods, which can estimate length of a message embedded in least significant bits. It may be embedded either in spatial domain or in frequency domain. The well known approaches are Chi – Square test, RS steganalysis and Sample Pair steganalysis. Many commercial steganographic programs are based on LSB method. It is important to ensure undetectablity of a hidden message in a carrier. We present an analysis of steganographic security on data hiding approach using eight queen solutions. In this approach, relationship between message bytes and 8-queen solutions is embedded in the cover. Further, we propose a new approach to adjust the statistical properties of the cover image in such a way that the steganalyst may not be able to detect the presence of hidden message. The proposed approach is tested using steganalysis tool STEGEXPOSE and the experimental results found are within acceptable range.

[...] Read more.
Goal Structured Requirement Engineering and Traceability Model for Data Warehouses

By Vinay Kumar Reema Thareja

DOI: https://doi.org/10.5815/ijitcs.2013.12.10, Pub. Date: 8 Nov. 2013

Data warehouses are decision support systems that are specifically designed for the business managers and executives for reporting and business analysis. Data warehouse is a database that stores enterprise-wide data that can be used to deduce useful information. Business organizations can achieve a great level of competitive advantage by analyzing its historical data and learning from it. However data warehouse concept is still maturing as a technology. In order to effectively design and implement a data warehouse for an organization, its goal needs to be understood and requirement must be analyzed in the perspective of the identified goal. In this paper we present a goal structured model for requirements engineering that also enables its users to manage traceability between the goals, decisions, business strategy and the corresponding business model.

[...] Read more.
Mathematics Is Science: A Topic Revisited in Context of FCS of India

By Vinay Kumar

DOI: https://doi.org/10.5815/ijmecs.2012.06.03, Pub. Date: 8 Jun. 2012

Mathematics is universally accepted as mother of all science. Despite that, Department of Personnel and Training (DOPT) has recently issued a circular mentioning that a person having master degree in mathematics cannot be considered for the post of scientists. The open question of 'Is mathematics a science?' is revisited in this paper under the new perspective to explore scientific practices that sans mathematics arrived knocking, challenging basic understanding of precision and practical sense that makes science. Considering the fact that in India, most crucial policy decisions at a higher level of abstraction in every conceivable arena of our national life are taken by either GOM (Group of Ministers) or GOS (Group of Secretaries), apprehension raises a basic query 'Who decides?' Some decision causes much unexpected consequence, which is noticed when it takes its toll and becomes virtually irreversible. This recent decision of Flexible Complementing Scheme (FCS), wherein mathematics is not considered as science, has potential to damage the very scientific culture and practices in India. This paper is an attempt to place mathematics in its right perspective and to highlight the damage that this decision might do. The paper also suggests ways to control the damage.

[...] Read more.
Other Articles