RJIT Header

Faculty Profile

Profile Photo

Name: Dr. Kamlesh Kumar Gupta

Designation: Associate Professor

Department: Department of Information Technology

Email: kamlesh_rjitbsf@yahoo.co.in

Mobile: 9425757684

Address: 19, Natraj Estate Alkapuri, New City Centre Gwalior(M.P), 474001

Experience: 21 Years

Date of Joining: 20-Dec-2013

Education & Qualification:

B.E. (Computer Science and Engg) from MPCT Gwalior in 2001

M. Tech. (Computer Science & Engineering) from SATI, Vidisha in 2005

Ph.D. (Computer Science and Engg) from UIT, RGPV Bhopal in 2013

Google Scholar ID: https://scholar.google.com/citations?hl=en&user=yjytq5gAAAAJ
ResearchGate ID: Not provided
ORCID: 0000-0002-9385-689X
Research Interests: Image Security and Cryptography
Publication Count: 44

Last Updated: 12-Jul-2025

S.No.TitlePublisherISBN
1Swarm Intelligent and Machine Learning: Application in HealthcareCRC Press9781032145822

Last Updated: 30-Jun-2025

  • Board of Study of CSE/IT/MCA, RGPV Bhopal
  • IETE
  • Life Membership of ACM
  • Life Membership of IETE
  • Nominate as Member of Boards of Study of Computer Science & Engg. and Information Technology in RGPV, Bhopal from 2018 to till date.
  • Nominate as Member of Boards of Study of Computer Science & Engg in Mandsour University, Mandsour MP from 2019 to till date.
  • Registered as Ph. D. Research Guide of Different University like RGPV, Bhopal, Amity University Gwalior.
  • Graduate Aptitude Test of Engineering (GATE) with 85.59 Percentile in 2002.
  • Appointed as subject expert (CSE/IT) for central ME/M. Tech counseling, 2008, 2009 at RGPV, Bhopal.
  • Appointed as External Expert (CSE/IT) for ME/M. Tech Thesis Evaluation and examiner of RGPV, Bhopal.
  • Appointed as External Expert (Computer Science & Engg.) for Ph. D. Thesis Evaluation and examiner at Thapar University Patiyala, Punjab
  • Appointed as External Expert (Computer Science & Engg.) for Ph. D. Thesis Evaluation and examiner at Sushant University Noida, UP
  • Appointed as External Expert (Diploma/Graduate/ Post-Graduate.) at Makhanlal Chaturvedi National University of Journalism & Communication, Bhopal.
  • Outstanding performance to introduce Computer Science and Engg. Branch in RJIT and Fill up 100% seats in all branches
  • Active Contribution in Counseling and Admission -2014 as Nodal Counseling Officers
  • Sincere efforts & guiding students to participate in E-Summit-18 at IIT, Bombay, as results of student secured 10th position in the summit in Jamn-2018
  • Active Contribution in Counseling and Admission -2020 as Principal RJIT.
  • 100% result in subject of (IT-402, Computer System Organization)
  • 100% Result in subject of (CS-402, Computer System Organization)
  • 100% result in subject of (CS 405, Theory of Computer Science)
  • A New GUI based Lightweight Encryption Algorithm based on Random Key for Secure IoT
  • Achievements / Major Activities held during the tenure of Principal RJIT ADMINISTRATION: 1. 95 % ADMISSION IN 2019: Even on recession in engineering field in M.P State, able to achieve 95% admissions in 2019 strategically. Opened All India Quota i (Duration: )
S.No.Title of FDP/STTPOrganized ByOrganized AtApproved ByDuration
1Application Specific Algorithm Design And Analysis Department of Computer Science and EnggIIT Guwahati Organized MHRDOne Week
07-Apr-2006
to
07-Aug-2006
2IT In Health CareDepartment of Computer Science and EnggIIT DelhiMHRDOne Week
12-Dec-2007
to
11-Feb-2007
3Data Mining and Business Intelligence Department of Computer Science and Engg,ABV- IIITM GwaliorMHRDTwo Weeks
07-Jul-2008
to
07-Dec-2008
4Image and Signal Processing Department of Electronic Communication EngineeringMANIT, BhopalMHRDOne Week
11-Feb-2011
to
12-Feb-2011
5Selected Topics On Distributed System & Computer Security Depatrment of Computer Science and EngineeringJaypee University of Engg. & Technology, Guna (Mp)Jaypee UniversityOne Week
30-Nov--0001
to
06-Mar-2011
6Information Security And Computer Forensics (WISCF-2014) Department of Computer Science & Engineering MNNIT, AllahabadMHRDOne Week
23-Jun-2014
to
28-Jun-2014
7Development of Web Based Application using PHPDepartment of Computer Science and EngineeringNITTTR, BhopalMHRDOne Week
18-Dec-2017
to
22-Dec-2017
8Simulation & Modeling Techniques and their Application in Science and EngineeringDepartment of ECERJIT TekanpurIITROne Week
06-Dec-2020
to
10-Dec-2020
9Modern Cryptography, Blockchain & IoT Security: Challenge solution and future prospects (MCB-IoTsDepartment of CSERGPV BhopalTEQIP-IIIOne Week
23-Mar-2021
to
27-Mar-2021
10AICTE-RGPV Teacher Training Program on “An Interdisciplinary Approach to Data Analysis and Visualization tools and Technology”Department of Computer ScienceIPSCTM GwaliorAICTE, New DelhiOne Week
05-Jul-2021
to
10-Jul-2021
S.No.Title of PublicationJournalMonth-Year of PublicationISSN & DOINo. of Co-Authors
1Improving the End-to-End Protection in E-Voting Using BVM- Block chain Based E-Voting Mechanism(SCIE Index)
View Paper
Concurrency and Computation : Practice and Experience (SCIE)Jan-2024online ISSN:1532-Pr
DOI: 10.21203/rs.3.rs-3973544/v1
2
2An efficient transfer learning appeoach for prediction and classification of SARS-Covid-19
View Paper
Multimedia Tools and Applications (SCIE)Sep-202339435–39457
DOI: https://doi.org/10.1007/s11042-023-17086-y
2
3An efficient image encryption technique based on two-level security for internet of things
View Paper
Multimedia Tools and Applications (SCIE)Feb-20221573-7721 https://d
DOI: https://doi.org/10.1007/s11042-022-12169-8
2
4Breast cancer-caps: A breast cancer screening system based on capsule network1 utilizing the multi-view breast thermal infrared images
View Paper
Turkish Journal of Electrical Engineering & Computer Sciences (SCIE)
Volume: 30, Issue: 5
May-20221300-0632
DOI: 10.55730/1300-0632.3906
2
5A Random Dual-Security based An Image Encryption Scheme for IoT
View Paper
Journal of Scientific Research (UGC Care)
Volume: 65, Issue: 1
Jun-2021
DOI: DOI: 10.37398/JSR.2021.650133
2
6Session Key based Image Cryptographic Algorithm using Logistic-Sine Map and Crossover Operator for IoT
View Paper
Journal of Scientific Research (UGC Care)
Volume: 65, Issue: 1
Jul-2021
DOI: 10.37398/JSR.2021.650133
260
7Session Key based Fast, Secure and Lightweight Image Encryption Algorithm(SCI Index)
View Paper
Multimedia Tools and Applications, Springer
Volume: 80, Issue: 25
Oct-20211573-7721
DOI: https://doi.org/10.1007/s11042-021-11160-z
2
8Session Key based Novel Lightweight Image Encryption Algorithm using a hybrid of Chebyshev Chaotic map and Crossover
View Paper
Multimedia Tools and Applications, Springer (SCIE)Aug-20211573-7721
DOI: https://doi.org/10.1007/s11042-021-11160-z
2
9Deep Multi-View Breast Cancer Detection: A Multi-View Concatenated Infrared Thermal Images Based Breast Cancer Detection System Using Deep Transfer Learning(SCI Index)
View Paper
Traitement du Signal (SCIE)
Volume: 38, Issue: 6
Dec-20211958-5608
DOI: https://doi.org/10.18280/ts.380613
2
10An Intelligent Session Key?Based Hybrid Lightweight Image Encryption Algorithm Using Logistic?Tent Map and?Crossover Operator for?Internet of?Multimedia Things(SCI Index)
View Paper
Wireless Personal Communications (SCIE)Aug-20211572-834X
DOI: https://doi.org/10.1007/s11277-021-08742-3
2
11An Optimization Approach for Transportation problem of transplant organ using Self-Adoptive Bear Hibernation Algorithm
View Paper
Taylor & FrancisJournal of Information and Optimization Sciences (ESCI)
Volume: 41, Issue: 2
Apr-20200252-2667
DOI: https://doi.org/10.1080/02522667.2020.1733189
2
12An Effectual Classification Approach to Detect Copy-Move Forgery Using Support Vector Machines
View Paper
Multimedia Tools and Applications, Springer (SCIE)Oct-20181573-7721
DOI: https://doi.org/10.1007/s11042-018-6707-9
2
13Novel Underwater Image Enhancement TechniqueInternational Journal of Innovative Technology and Exploring EngineeringJan-20182278-30752
14Enhanced Security For Encrypted Image Transmission Over Communication Network: A ReviewInternational Journal of Current Trends In Engineering & Technology Jan-20172395-31522
15Secure Image Transmission using SHA and Route Security Methods in MANETInternational Journal of Current Trends in Engineering and TechnologyJan-20162395-31522
16To Maintain Public Conservation for Secure Mobile Cloud StorageRecent Trends in Programming LanguageJan-20152455-18212
17Novel Approach For Image Compression Using Curvelet Transform
View Paper
International Journal of Signal Processing, Image Processing and Pattern Recognition
Volume: 8, Issue: 7
Jul-20152005-4254
DOI: DOI: 10.14257/ijsip.2015.8.7.19
1
18An Ethical Approach of Block Based Image Encryption Using Chaotic Map
View Paper
International Journal of Security and Its Applications
Volume: 9, Issue: 9
Jan-20151738-9976
DOI: http://dx.doi.org/10.14257/ijsia.2015.9.9.10
3
19An Effective Approach of Digital Image Watermarking For Copyright Protection
View Paper
International Journal of Big Data Security Intelligence
Volume: 2, Issue: 1
Jan-20151738-9976
DOI: DOI: 10.14257/ijbdsi.2015.2.1.02
1
20Secure Routing in Wireless Mobile Ad-hoc Network International Journal of Computing, Communications and Networking
Volume: 2, Issue: 4
Dec-20132319-2720 1
21Novel Approach For Fast Compressed Hybrid Color Image Crypto- System
View Paper
Advances In Engineering Software, Elsevier (SCI)Jan-20120965-9978
DOI: https://doi.org/10.1016/j.advengsoft.2012.03.001
1
22Performance Analysis of Image Compression Using Curvelet TansformJournal of Signal and Image ProcessingJan-20110976-88821
23New Approach For Fast Color Image Encryption Using Chaotic Map
View Paper
Journal of Information Security Journal of Signal and Image Processing
Volume: 2, Issue: 4
Jan-20112327-
DOI: 10.4236/jis.2011.24014
1
24ECC Over RSA For Asymmetric Encryption: A Review
View Paper
International Journal of Computer Science Issues
Volume: 8, Issue: 3
May-20111694-08141
25Efficient Hybrid Image Cryptosystem Using ECC And Chaotic Map
View Paper
International Journal of Computer Applications
Volume: 29, Issue: 3
Jan-20110975 – 0888
DOI: 10.5120/3548-4866
1
S.No.Title of PublicationConferenceMonth-Year of PublicationISBN & DOINo. of Co-Authors
1Detection and Classification of Epiletic Seizures Using Machine Learning and Deep Learning: A Systematic Review and ChallengesASCIS-2025Mar-2025
DOI: https://doi.org/10.1007/978-3-031-86302-8_12
2
2 BSeVS – A Smart e-Voting System based on Blockchain Technology International Conference on Computing Communication and Networking Technologies (ICCCNT) Jul-2024 979-8-3503-3509-5/2
DOI: 10.1109/ICCCNT56998.2023.10307745
2
3Prediction of SARS-COVID-19 Based on Transfer Machine Learning Techniques Using Lungs CT Scan Images
View Paper
Data Engineering and Applications, Lecture Notes in Electrical Engineering, Springer Nature SingaporeSep-2024978-981-97-0036-3
DOI: https://doi.org/10.1007/978-981-97-0037-0_17
2
4The Classification of Breast Cancer based on Hyper-Tuned AdaBoost Ensemble Model International conference on Machine Intelligence Techniques for Data Analysis and Signal Processing (Scopus Index) Sep-2023729-7392
5BVKCS - A Blockchain based e-Voting System with Key Covering Scheme IEEE International Conference on ICT in Business Industry & Government (ICTBIG)Jul-2023 979-8-3503-4327-4/2
DOI: 10.1109/ICTBIG59752.2023.10456233
2
6A Novel Machine Learning Approach for Forgery Detection and Verification in Digital Image
View Paper
IOP ScienceJan-2022
DOI: DOI 10.1149/10701.11791ecst
2
7Blockchain-based voting system powered by post-quantum cryptography (BBVSP-pqc)
View Paper
2022 Second International Conference on Power, Control and Computing Technologies (ICPC2T), IEEE (Scopus Index)Mar-2022
DOI: 10.1109/ICPC2T53885.2022.9776966
3
8The Breast Cancer Detection Approaches: A ReviewInternational Journal of Computer Science and NetworkJan-20212277-54202
9Random Dual-Security based an Image Encryption Scheme for IoT3rd International Conference on Data, Engineering and Applications Scopus Indexed)( Jan-20212
10A Review on Application of Machine Learning in Medical Diagnosis
View Paper
IEEE 2nd International Conference on Data, Engineering and Applications (IDEA)Aug-2020
DOI: 10.1109/IDEA49133.2020.9170733
2
11EFFICIENT IMAGE ENCRYPTION USING MRF AND ECC
View Paper
International Journal of Information Technology and Knowledge Management
Volume: 2, Issue: 2
Jul-20090973-44141
12An Ethical Way For Image Encryption Using ECCIEEE First International Conference On Computational Intelligence, Communication Systems And Networks (Scopus Indexed)Jan-2009978-0-7695-3743-6/092
13Performance Analysis For Image Encryption Using ECC IEEE International Conference On Computational Intelligence and Communication Networks (Scopus Indexed)Jan-2008978-0-7895-4254-6/102
14An Ethical Way Of Encrypt Data Transfer In Bluetooth Mobile Using Chaos Based Feedback TechniqueIEEE Sixth International Conference On Information Technology (Scopus Indexed)Jan-2008978-0-7695-3596-82
Semester 4
  • UNIT-IV&V (Analysis Design of Algorithm, 06-Jul-2025) Download restricted
  • UNIT-III (Analysis Design of Algorithm, 06-Jul-2025) Download restricted
  • UNIT-2 (Analysis Design of Algorithm, 06-Jul-2025) Download restricted
  • UNIT-1 (Analysis Design of Algorithm, 06-Jul-2025) Download restricted
Semester 6
  • Cou5rse Work File (Compiler Design, 06-Jul-2025) Download restricted
  • Practice Question (Full Syllabus) (Compiler Design, 06-Jul-2025) Download restricted
  • Assignment-5 (Compiler Design, 06-Jul-2025) Download restricted
  • Assignment-4 (Compiler Design, 06-Jul-2025) Download restricted
  • Assignment-3 (Compiler Design, 06-Jul-2025) Download restricted
  • Assignment-2 (Compiler Design, 06-Jul-2025) Download restricted
  • Assignment-1 (Compiler Design, 06-Jul-2025) Download restricted
Semester 7
  • Project list (Digital Image Processing, 23-Jul-2025) Download restricted

Note: Downloads are restricted to authorized IP addresses only.