RJIT Header

Faculty Profile

Profile Photo

Name: Prof. Sanjay Patsariya

Designation: Assistant Professor

Department: Department of Information Technology

Email: sanjaypatsariya@gmail.com

Mobile: 9827549919

Address: Kamleshwar Colony Dabra Distt Gwalior 475110

Experience: 18

Date of Joining: 10-Oct-2007

Education & Qualification:

BE (CSE) from MPCT GWALIOR in 2002

ME (CCN ) from MITS Gwalior in 2006

Google Scholar ID: https://scholar.google.com/citations?hl=en&user=-SkQtCUAAAAJ&view_op=list_works&gmla=AH8HC4wIHLfn7TW
ResearchGate ID: https://www.researchgate.net/scientific-contributions/Sanjay-Patsariya-79457964
ORCID: https://orcid.org/0
Scopus ID: 36919103600
Publons ID: MDS-5354-2025
GitHub ID: sanjaypatsariya
LinkedIn ID: www.linkedin.com/in/sanjay-patsariya-11631b74
Research Interests: Image Processing , Information Security , Machine Learning
Publication Count: 22

Last Updated: 25-Jun-2025

  • IAENG
  • GATE Qualified
  • UGC NET Qualified
S.No.Title of FDP/STTPOrganized ByOrganized AtApproved ByDuration
1Simulation & modeling techniques and their application in Science & EngineeringRJITRJITIIT Roorkee One Week
30-Nov--0001
to
30-Nov--0001
2Mission 10XRJITRJITOne Week
30-Nov--0001
to
30-Nov--0001
3Sort Term Course on Matlab Prorgamming for Engineers NIT Kurukshetra NIT Kurukshetra One Week
30-Nov--0001
to
30-Nov--0001
4Recent Trends in wireless Networks & SensorsITM GwaliorITM Gwalior AICTE One Week
30-Nov--0001
to
30-Nov--0001
5Faculty Development Programme in EntrepreneurshipMITS MITS DST One Week
30-Nov--0001
to
30-Nov--0001
S.No.Title of PublicationJournalMonth-Year of PublicationISSN & DOINo. of Co-Authors
1Entropy Based Secure and Robust Image Watermarking Using Lifting Wavelet Transform and Multi-Level-Multiple Image Scrambling Technique.
View Paper
Traitement du Signal
Volume: 39, Issue: 5
Aug-20220765-0019
DOI: 10.18280/ts.390533
1
2A new block based non-blind hybrid color image watermarking approach using lifting scheme and chaotic encryption based on arnold cat map
View Paper
Traitement du Signal
Volume: 39, Issue: 4
Aug-2022
DOI: https://doi.org/10.18280/ts.390408
1
3A Survey on Watermarking and Its Techniques
View Paper
Springer, Singapore
Volume: 1, Issue: 1
Apr-2021978-981-33-4893-6
DOI: https://doi.org/10.1007/978-981-33-4893-6_7
1
4Kidney Patient Classification using Intelligence TechniquesPENSEE INTERNATIONAL JOURNAL
Volume: 51, Issue: 2
Jan-20211
5A Review on Medical Image FusionArtificial & Computational Intelligence
Volume: 1, Issue: 3
Jan-20201
6Comparative Performance Analysis of Multilevel Image Watermarking Using Cryptographic Algorithm
View Paper
International Journal of Computer Sciences and Engineering
Volume: 7, Issue: 11
Nov-20192347-2693
DOI: https://doi.org/10.26438/ijcse/v7i11.4548
2
7Finding successful and failure of software using intelligence techniques
View Paper
International Journal of Information Technology and Computer Science (IJITCS)
Volume: 3, Issue: 1
Jan-20183
8An Effective Way to Hide the Secret Audio File Using High Frequency Manipulation
View Paper
Communications in Computer and Information Science ((CCIS,volume 125)),Springer, Berlin, HeidelbergJan-2011978-3-642-18439-0
DOI: https://doi.org/10.1007/978-3-642-18440-6_15
2
9Effects of Back off factor and retry limit on Performance of Exponential Back off Algorithm
View Paper
International Journal of Advanced Research in Computer Science
Volume: 2, Issue: 4
Aug-2011 0976-56972
S.No.Title of PublicationConferenceMonth-Year of PublicationISBN & DOINo. of Co-Authors
1Dual Scrambling Based Non Blind Robust and Secure Color Watermarking Technique
View Paper
Machine Intelligence and Smart SystemsMar-2025978-3-031-69115-7
DOI: https://doi.org/10.1007/978-3-031-69115-7_7
1
2Entropy Based Transparent and Secure Watermarking Approach Using Arnold Transform
View Paper
Machine Intelligence and Smart SystemsMar-2025978-3-031-69115-7
DOI: https://doi.org/10.1007/978-3-031-69115-7_6
1
3A New Secure and Robust Watermarking Using Entropy and Hybrid Scrambling Approach
View Paper
AI Technologies for Information Systems and Management Science. ISMS 2023Oct-2024978-3-031-70789-6
DOI: https://doi.org/10.1007/978-3-031-70789-6_36
1
4Effects of backoff factor on exponential backoff algorithm
View Paper
Korean Multimedia Society International ConferenceJul-20112
Semester 3
  • Stack Applications (Data Structure, 07-Jul-2025) Download restricted
  • STACK (Data Structure, 07-Jul-2025) Download restricted
  • Sparse Matrix and its representations (Data Structure, 07-Jul-2025) Download restricted
  • Search Operation (Data Structure, 07-Jul-2025) Download restricted
  • Introduction to Data structure (Data Structure, 07-Jul-2025) Download restricted
Semester 4
  • UNIT-4 (Analysis and Design of Algorithm, 06-Jul-2025) Download restricted
  • UNIT-3 (Analysis and Design of Algorithm, 06-Jul-2025) Download restricted
  • UNIT-2 (Analysis and Design of Algorithm, 06-Jul-2025) Download restricted
  • UNIT-1 (Analysis and Design of Algorithm, 06-Jul-2025) Download restricted
Semester 5
  • Threads & Concurrency (Operating System, 06-Jul-2025) Download restricted
  • Processes (Operating System, 06-Jul-2025) Download restricted
  • Operating-System Services (Operating System, 06-Jul-2025) Download restricted
  • Introduction (Operating System, 06-Jul-2025) Download restricted

Note: Downloads are restricted to authorized IP addresses only.