Birla Institute of Technology, Mesra
Dr. Sandip Dutta
Professor, Computer Science and Engg
Ph.D. (BIT Mesra), Ex-HOD(CSE) (2014-2017), Ex-Dean Admission and Academic Control (2017-2020)
Contact Address
Permanent Address Besides Manda Bagicha, Harihar Singh Road, Morabadi, Ranchi, Jharkhand, Pincode 834008
Local Address Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, Ranchi, Jharkhand. Pincode 835215
Phone (Office) 09431939630
Phone Residence 09431939630
Email Id sandipdutta@bitmesra.ac.in
Joined Institute on : 25-Apr-2001

  Work Experience
 
Teaching : 21 Years

Research : 8 Years

Individual: 34 Years

  Research Areas
 

Network Security and Cryptography, Biometric Security, Cyber Security, Digital Forensics, Data Warehousing, Blockchain, Security in Cloud Computing, Security in MANET, Software Engineering

  Publications
 

International and National Journals

2021

  1. Prashant Pranav, Sandip Dutta and Soubhik Chakraborty, “Empirical and Statistical Comparison of Intermediate Steps of AES – 128 and RSA in Terms of Time Consumption”, Soft Computing Springer, 2021 (SCIE, Impact Factor – 3.6)

  2. Ray, S., Mishra, K.N. and Sandip Dutta, Susceptible data classification and security reassurance in cloud-IoT based computing environment. S?dhan? 46, 215 (2021) (SCIE)

  3. Ray, Soumya; Mishra Kamta N, Sandip Dutta, Big Data Security Issues from the Perspective of IoT and Cloud Computing: A Review, Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science), Volume 14, Number 7, 2021, pp. 2057-2078(22), Bentham Science Publishers

  4. Yadav Dharmveer K, Sandip Dutta, Test Case Prioritization Based on Early Fault Detection Technique, Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science), Volume 14, Number 1, 2021, pp. 302-316(15), Bentham Science Publishers

2020

  1. Prashant Pranav, Soubhik Chakraborty and Sandip Dutta, “A New Cipher System using Semi – natural Composition in Indian Raga”, Soft Computing Springer, 2020, Volume – 24 , pp. 1529 – 1537 (SCIE, Impact Factor – 3.6)

  2. Ranjan, Shailly, Soubhik Chakraborty, and Sandip Dutta. Musical Cryptography. Empirical Analysis of Algorithms. GRIN Verlag, 2020

  3. Nayancy, Sandip Dutta & Chakraborty, Soubhik,  A survey on implementation of lightweight block ciphers for resource constraints devices. Journal of Discrete Mathematical Sciences and Cryptography. 1-22. 10.1080/09720502.2020.1766764, 2020

  4. Yadav, D.K., Sandip Dutta. Regression test case selection and prioritization for object oriented software. Microsyst Technol 26, 1463–1477. https://doi.org/10.1007/s00542-019-04679-7, 2020

  5. Ray, Soumya, Mishra, K.N and Sandip Dutta, Big Data Security Issues from the Perspective of IoT and Cloud Computing: A Review. Recent Advances in Computer Science and Communications, 2020

2019

  1. Yadav, Dharmveer and Sandip Dutta, Test Case Prioritization Using Clustering Approach for Object Oriented Software. International Journal of Information System Modeling and Design. 10. 92-109. 10.4018/IJISMD.2019070106, 2019

2015

  1. Chandan Kumar, Sandip Dutta and Soubhik Chakraborty, “Hiding Messages using Musical Notes: A Fuzzy Logic Approach.” International Journal of Security and its Applications, Vol. 9 No.1 (2015) pp.237-248, 2014

  2. Chandan Kumar, Sandip Dutta and Soubhik Chakraborty, “A Hybrid Polybius-Playfair Music Cipher”, International Journal of Multimedia and Ubiquitous Engineering, 10(8):187-198, 2015

2014

  1. D.K, Yadav, Sandip Dutta, “Study on regression test selection techniques for object oriented programming”, International Journal of Applied Engineering Research, 9(22):12259-12278 · January 2014

2013

  1. Sandip Dutta, Kumar, Chandan., & Chakraborty, S, A Symmetric Key Algorithm for Cryptography using Music. International Journal of Engineering & Technology (0975-4024), 5(3), 2013

2011

  1. Sandip Dutta, Chakraborty S., Mahanti N.C., “Fingerprint Based Cryptography Technique for Improved Network Security”, Journal of Computer Science and Engineering, Volume 5, Issue 2, February 2011

  2. Sandip Dutta, Singh M.K., Mahanti N.C., “Prolific Generation of Williamson Type Matrices”, Global Journal of Computer Science and Technology (GJCST), Volume 11, Issue 8, April/May 2011

  3. Sandip Dutta, Anand K., Mahanti N.C. , “Network Security Based on Quantum Cryptography & Multi-qubit  Hadamard Matrices” ,Global Journal of Computer Science and Technology(GJCST) , Volume 11, Issue 12,  May/June 2011

  4. Sandip Dutta, S. Chakraborty, and N. C. Mahanti. "Fingerprint based cryptography technique for improved network security." Journal of Computer Science and Engineering 5, no. 2 (2011): 11-18, 2011

2010

  1. Sandip Dutta, Chakraborty S., Mahanti N.C., “A Novel Method of Hiding Message Using Musical Notes”, IJFCA (International Journal on Futuristic Computer Applications), International Journal of Computer Applications (0975 - 8887), Volume 1 – No. 16, 2010

International Conferences

  1. Kumar Chandan, Sandip Dutta, Soubhik Chakraborty, "Cryptography key extraction from Music”, International Conference on Computational Intelligence, ICCI, 2015
  2. Kumar Chandan, Sandip Dutta, Soubhik Chakraborty, "Musical Cryptography using Genetic Algorithm", IEEE International Conference on Circuits, Power and Computing Technologies ICCPCT-2014 Noorul Islam Centre for Higher Education, Kumaracoil, Thuckalay,Kanyakumari district, Tamilnadu-629180, INDIA, 2014
  3. Sandip Dutta, Chakraborty, Soubhik & Mahanti, Nirmal, Using Raga as a Cryptographic Tool. 196. 178-183. 10.1007/978-3-642-22540-6_18, 2011
  4. Sandip Dutta, Kar A, Mahanti N.C. & Chatterji B.N. “Network Security using Biometric and Cryptography”, In: Blanc-Talon J., Bourennane S., Philips W., Popescu D., Scheunders P. (eds) Advanced Concepts for Intelligent Vision Systems. ACIVS 2008. Lecture Notes in Computer Science, vol 5259. Springer, Berlin, Heidelberg, 2008

National Conferences

  1. Sandip Dutta “Image Compression using Wavelet Technique”, National Conference on Image Processing, 2015
  2. Sandip Dutta, N.C.Mahanti, Smita Bhowmik and Jayeeta Nayak “Algorithm for  Registration of IR and MMW Images”, National Conference on Mathematical Techniques: Emerging Paradigms for electronics and IT Industries (MATEIT 2006), Pg 123-129, 2006
  3. Sandip Dutta, “Information Security in Big data perspective”, Big Data Initiatives: Trends and Applications (BDI 2015), 2015
  4. Prashant Pranav, Sandip Dutta and Soubhik Chakraborty, “An Involution Function-Based Symmetric Stream Cipher”, In: Nath V., Mandal J.K. (eds), Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication Systems, Lecture Notes in Electrical Engineering, Volume –  673, Springer (SCOPUS), 2021
  5. Nayancy, Sandip Dutta and Soubhik Chakraborty, IoT Based Secure Communication to Enhance Blockchain Model, In: Nath V., Mandal J.K. (eds), Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication Systems, Lecture Notes in Electrical Engineering, Volume –  673, Springer (SCOPUS), 2021
  6. Monalisha and Sandip Dutta, Survey of Lightweight Cryptography Algorithm for Data Security in the Internet of Things, In: Nath V., Mandal J.K. (eds), Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication Systems, Lecture Notes in Electrical Engineering, Volume –  673, Springer (SCOPUS), 2021
  7. Dharmveer Kumar Yadav and Sandip Dutta, Study and Analysis of Test Case Prioritization Techniques, In: Nath V., Mandal J. (eds) Nanoelectronics, Circuits and Communication Systems. Lecture Notes in Electrical Engineering, vol 692. Springer, Singapore. https://doi.org/10.1007/978-981-15-7486-3_42, 2021
  8. Sanyukta and Sandip Dutta, An Improved Pig Latin Algorithm for Lightweight Cryptography, In: Sahana S., Bhattacharjee V. (eds) Advances in Computational Intelligence. Advances in Intelligent Systems and Computing, vol 988. Springer, Singapore. https://doi.org/10.1007/978-981-13-8222-2_28, 2020
  9. Priyanka S, Sandip Dutta, Chakraborty S, Human Tracking System Based on GPS and IOT (Internet of Things). In: Pandian A., Senjyu T., Islam S., Wang H. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018). ICCBI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 31. Springer, Cham. https://doi.org/10.1007/978-3-030-24643-3_61, 2020
  10. Dharmveer Kumar Yadav and Sandip Dutta, A New Cluster-Based Test Case Prioritization using Cat Swarm Optimization Technique, In: Nath V., Mandal J. (eds) Proceedings of the Third International Conference on Microelectronics, Computing and Communication Systems. Lecture Notes in Electrical Engineering, vol 556. Springer, Singapore. https://doi.org/10.1007/978-981-13-7091-5_36, 2019
  11. Dharmveer Kumar Yadavand Sandip Dutta, Regression Test Case Prioritization using Genetic Algorithm, In: Sahana S., Saha S. (eds) Advances in Computational Intelligence. Advances in Intelligent Systems and Computing, vol 509. Springer, Singapore. https://doi.org/10.1007/978-981-10-2525-9_13, 2017
  12. Dharmveer Kumar Yadav and Sandip Dutta, Test Case Prioritization based on Early Fault Detection using Fuzzy Logic, 3rd International Conference for Sustainable Global Development, Springer, 2016
  Text and Reference Books
 
  1. Prashant Pranav, Sandip Dutta and Soubhik Chakraborty, “Recent Trends in Cryptography and its Allied Areas: Securing Voice Communication using Music”, RAR Publication, 2020
  Fellow
 

1. Prashant Pranav (Completion Year - 2020, Area of Research: Cryptography, Music, and Algorithm Analysis)

"DESIGN AND ANALYSIS OF ALGORITHMS WITH SPECIAL EMPHASIS ON CRYPTOGRAPHY"

2. Dharamveer Yadav (Completion Year - 2020, Area of Research: Software Engineering)

"REGRESSION TEST CASE SELECTION AND PRIORITIZATION OF TEST CASE FOR OBJECT-ORIENTED SOFTWARE"

3. Nayancy (Pursuing,  Area of Research: Blockchain)

4. Ankita Kumari (Pursuing, Area of Research: Security in MANET)

5. Animesh Kumar (Pursuing, Area of Research: Security in Cloud Computing)

6.Soumya Ray (Pursuing, Area of Research: Security in Healthcare)

7. Sujit Kumar Chatterjee (Pursuing, Area of Research: Data Warehousing)