Birla Institute of Technology, Mesra
Dr. Sandip Dutta
Professor, Computer Science and Engg
Ph.D. (BIT Mesra), Ex-HOD(CSE) (2014-2017), Ex-Dean Admission and Academic Control (2017-2020)
Contact Address
Permanent Address Besides Manda Bagicha, Harihar Singh Road, Morabadi, Ranchi, Jharkhand (834008)
Local Address Department of Computer Science and Engineering, Birla Institute of Technology, Mesra, Ranchi, Jharkhand (835215)
Phone (Office) 09431939630
Phone Residence 09431939630
Email Id sandipdutta@bitmesra.ac.in
Joined Institute on : 26-Apr-2001

  Work Experience
 
Teaching : 22 Years

Research : 12 Years

Individual: 34 Years

  Research Areas
 

Network Security and Cryptography, Biometric Security, Cyber Security, Digital Forensics, Data Warehousing, Blockchain, Security in Cloud Computing, Security in MANET, Software Engineering

  Publications
 

Journal

2024

  1. Purushottam Singh, Prashant Pranav, Shamama Anwar, Sandip Dutta, “Leveraging Generative Adversarial Networks for Enhanced Cryptographic Key Generation”, Concurrency and Computation: Practice and Experience, Wiley, 2024, e8226. doi: 10.1002/cpe.8226 (SCIE, Impact Factor – 2)
  2. Purushottam Singh, Sandip Dutta, Prashant Pranav, “A Modified RC-4 Cryptosystems to Enhance Security by using Negative Key Schedule”, Security and Privacy, Wiley, e438. doi: 10.1002/spy2.438 (2024) (ESCI, Impact Factor – 1.9)
  3. Animesh Kumar, Prashant Pranav, Sandip Dutta, Soubhik Chakraborty “Analysis of the Empirical Complexity of AES - 128 Statistically”, Journal of Discrete Mathematical Sciences and Cryptography, Taru Publications, 2024 (SCOPUS, ESCI, Impact Factor – 1.4)
  4. Ankita Kumari, Purushottam Singh, Prashant Pranav, Sandip Dutta, Soubhik Chakraborty, “Prevention of Sleep Deprivation Attack in MANET using Cumulative Priority Based Cluster Head Selection”, Concurrency and Computation: Practice and Experience, 36 (16), Wiley, e8118, https://doi.org/10.1002/cpe.8118 (2024) (SCIE, Impact Factor – 2)
  5. Purushottam Singh, Sandip Dutta, Prashant Pranav, “Optimizing GANs for Cryptography: The Role and Impact of Activation Functions in Neural Layers Assessing the Cryptographic Strength”, Applied Sciences, MDPI (SCIE, IF – 2.4)
  6. Purushottam Singh, Sandip Dutta, Prashant Pranav, “Network Security and Cryptography: Threats, Obstacles and Solutions - A Bibliometric Analysis”, Recent Advances in Computer Science and Communications, Betham Science (SCOPUS)
  7. Nayancy, Sandip Dutta, and Soubhik Chakraborty, “Lightweight Blockchain Approach to Reduce Double-spend and 51% Attacks on Proof-of-Work”, Intelligent Data Analysis, IOS Press, vol. Pre-press, no. Pre-press, pp. 1-11, 2024 (SCIE, IF – 1.7)
  8. Animesh Kumar, Sandip Dutta, Prashant Pranav, “Analysis of SQL injection Attacks in the Cloud and in WEB Applications”, Security and Privacy, Wiley, 7(3), e370, 10.1002/spy2.370 (2024) (ESCI, Impact Factor – 1.9)

2023

  1. Ankita Kumari, Sandip Dutta, Soubhik Chakraborty. "A fuzzy based Q–learning approach to prevent sinkhole attacks in MANET (FQ–SPM)." Journal of Intelligent & Fuzzy Systems Preprint: 1-12 (SCIE, IF – 2)
  2. Animesh Kumar, Sandip Dutta, Prashant Pranav, “FQBDDA: fuzzy Q-learning based DDoS attack detection algorithm for cloud computing environment”, International Journal of Information Technology, Springer (2023), https://doi.org/10.1007/s41870-023-01509-y (SCOPUS)
  3. Animesh Kumar, Sandip Dutta, Prashant Pranav, Supervised Learning for Attack Detection in Cloud, International Journal of Experimental Research and Review: Vol 31 No Spl Volume (2023): Recent trends in Science, Technology & Design (SCOPUS)
  4. Animesh Kumar, Sandip Dutta, Prashant Pranav, Prevention of VM Timing Side-channel Attack in a Cloud Environment using Randomized Timing Approach in AES – 128, International Journal of Experimental Research and Review: Vol 31 No Spl Volume (2023): Recent trends in Science, Technology & Design (SCOPUS)
  5. Animesh Kumar, Sandip Dutta, Prashant Pranav, "A Comparative Study of DDoS Attack in Cloud Computing Environment," SSRG International Journal of Electronics and Communication Engineering, vol. 10, no. 7, pp. 87-96, 2023 (SCOPUS)
  6. Ankita Kumari, Sandip Dutta, Soubhik Chakraborty, A comparative study of different security issues in MANET, International Journal of Experimental Research and Review: Vol 31 No Spl Volume (2023): Recent trends in Science, Technology & Design (SCOPUS)
  7. Ankita Kumari, Sandip Dutta, Soubhik Chakraborty, Use of Node credibility and Andrews plot to detect and prevent BHA in MANET, International Journal of Experimental Research and Review: Vol 30 (2023) (SCOPUS)

2022

  1. Soumya Ray, Kamta Nath Mishra, Sandip Dutta, “An Innovative Technique for DDoS attack Recognition and Deterrence on M-health Sensitive Data”, Wireless Personal Communications (Springer), pp. 1-25, August 2022 (SCIE, IF - 2.017)
  2. Soumya Ray, Kamta Nath Mishra, Sandip Dutta, "Sensitive Data Identification and Security Assurance in cloud and IoT based Networks", I. J. Computer Network and Information Security, MECS Press Hong Kong, vol.5, pp. 11-27, 2022 (SCOPUS)
  3. Soumya Ray, Kamta Nath Mishra, Sandip Dutta, “Detection and prevention of DDoS attacks on M-healthcare sensitive data: a novel approach”, International Journal of Information Technology (Springer), pp. 1-10,2022 (SCOPUS)

2021

  1. Prashant Pranav, Sandip Dutta, Soubhik Chakraborty, “Empirical and Statistical Comparison of Intermediate Steps of AES – 128 and RSA in Terms of Time Consumption”, Soft Computing Springer, 2021 (SCIE, IF – 4.2)
  2. Saumya Ray, Kamta Nath Mishra, Sandip Dutta, Susceptible data classification and security reassurance in cloud-IoT based computing environment. Sadhna, Springer, 46, 215 (2021) (SCIE, IF – 1.6)
  3. Soumya Ray, Kamta Nath Mishra, Sandip Dutta, Big Data Security Issues from the Perspective of IoT and Cloud Computing: A Review, Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science), Volume 14, Number 7, 2021, pp. 2057-2078(22), Bentham Science Publishers (SCOPUS)
  4. Dharmveer Kumar Yadav, Sandip Dutta, Test Case Prioritization Based on Early Fault Detection Technique, Recent Advances in Computer Science and Communications (Formerly: Recent Patents on Computer Science), Volume 14, Number 1, 2021, pp. 302-316(15), Bentham Science Publishers (SCOPUS)

2020

  1. Prashant Pranav, Soubhik Chakraborty, Sandip Dutta, “A New Cipher System using Semi – natural Composition in Indian Raga”, Soft Computing Springer, 2020, Volume – 24, pp. 1529 – 1537 (SCIE, IF – 4.2)
  2. Dharamveer Kumar Yadav, Sandip Dutta, “Regression Test Case Selection and Prioritization for Object-Oriented Software”, Microsystem Technologies, 26, 1463–1477. https://doi.org/10.1007/s00542-019-04679-7, 2020 (SCIE, IF – 2.1)
  3. Nayancy, Sandip Dutta, Chakraborty, Soubhik, “A Survey on Implementation of Lightweight Block Ciphers for Resource Constraints Devices”, Journal of Discrete Mathematical Sciences and Cryptography. 1-22. 10.1080/09720502.2020.1766764, 2020 (SCOPUS)
  4. Soumya Ray, Kamta Nath Mishra, Sandip Dutta, Big Data Security Issues from the Perspective of IoT and Cloud Computing: A Review. Recent Advances in Computer Science and Communications, 2020 (SCOPUS)
  5. Shailly Ranjan, Soubhik Chakraborty, Sandip Dutta, “Musical Cryptography. Empirical Analysis of Algorithms”, GRIN Verlag, 2020

2019

  1. Dharmveer Kumar Yadav, Sandip Dutta, “Test Case Prioritization Using Clustering Approach for Object Oriented Software”, International Journal of Information System Modeling and Design. 10. 92-109. 10.4018/IJISMD.2019070106, 2019 (SCOPUS)

2015

  1. Chandan Kumar, Sandip Dutta, Soubhik Chakraborty, “Hiding Messages using Musical Notes: A Fuzzy Logic Approach.” International Journal of Security and its Applications, Vol. 9 No.1 (2015) pp.237-248, 2015
  2. Chandan Kumar, Sandip Dutta, Soubhik Chakraborty, “A Hybrid Polybius-Playfair Music Cipher”, International Journal of Multimedia and Ubiquitous Engineering, 10(8):187-198, 2015

2014

  1. Dharamveer Kumar Yadav, Sandip Dutta, “Study on Regression Test Selection Techniques for Object Oriented Programming”, International Journal of Applied Engineering Research, 9(22):12259-12278 · January 2014

2013

  1. Sandip Dutta, Chandan Kumar, Soubhik Chakraborty, “A Symmetric Key Algorithm for Cryptography using Music”, International Journal of Engineering & Technology (0975-4024), 5(3), 2013

2011

  1. Sandip Dutta, Soubhik Chakraborty S, N.C. Mahanti, “Fingerprint Based Cryptography Technique for Improved Network Security”, Journal of Computer Science and Engineering, Volume 5, Issue 2, February 2011
  2. Sandip Dutta, M.K. Singh, N.C. Mahanti, “Prolific Generation of Williamson Type Matrices”, Global Journal of Computer Science and Technology (GJCST), Volume 11, Issue 8, April/May 2011
  3. Sandip Dutta, Anand Kumar, N.C. Mahanti, “Network Security Based on Quantum Cryptography & Multi-qubit Hadamard Matrices”, Global Journal of Computer Science and Technology (GJCST), Volume 11, Issue 12, May/June 2011
  4. Sandip Dutta, Soubhik Chakraborty, N. C. Mahanti. "Fingerprint based cryptography technique for improved network security." Journal of Computer Science and Engineering 5, no. 2 (2011): 11-18, 2011

2010

  1. Sandip Dutta, Soubhik Chakraborty, N.C. Mahanti, “A Novel Method of Hiding Message Using Musical Notes”, IJFCA (International Journal on Futuristic Computer Applications), International Journal of Computer Applications (0975 - 8887), Volume 1 – No. 16, 2010

Conferences

  1. Purushottam Singh, Prashant Pranav, Vijay Nath, and Sandip Dutta, “Unmasking the Digital Illusion: A Comprehensive Bibliometric Analysis of Deepfake Detection Research”, 9th International Conference on Nanoelectronics, Computational Intelligence and Communication Systems (NCCS – 2023)
  2. Deepshikha Kumari, Abhinav Sinha, Sandip Dutta and Prashant Pranav, “SMO-ANN: A Hybrid Classifier for Network Intrusion Detection System using Spider Monkey Optimization Algorithm”, 4th International Conference on Paradigms of Communication, Computing and Data Analytics (PCCDA 2024), Springer (SCOPUS)
  3. Deepshikha Kumari, Abhinav Sinha, Sandip Dutta and Prashant Pranav, “A Comprehensive Analysis of Various Cyber Attack Datasets used for Intrusion Detection System”, International Conference on Machine Intelligence with Applications (ICMIA 2023), Springer (SCOPUS)
  4. Chandan Kumar, Sandip Dutta, Soubhik Chakraborty, "Cryptography key extraction from Music”, International Conference on Computational Intelligence, ICCI, 2015
  5. Chandan Kumar, Sandip Dutta, Soubhik Chakraborty, "Musical Cryptography using Genetic Algorithm", IEEE International Conference on Circuits, Power and Computing Technologies ICCPCT-2014 Noorul Islam Centre for Higher Education, Kumaracoil, Thuckalay,Kanyakumari district, Tamilnadu-629180, INDIA, 2014
  6. Sandip Dutta, Soubhik Chakraborty, N.C. Mahanti, “Using Raga as a Cryptographic Tool” 196. 178-183. 10.1007/978-3-642-22540-6_18, 2011
  7. Sandip Dutta, A Kar, N.C. Mahanti, B.N. Chatterji, “Network Security using Biometric and Cryptography”, In: Blanc-Talon J., Bourennane S., Philips W., Popescu D., Scheunders P. (eds) Advanced Concepts for Intelligent Vision Systems. ACIVS 2008. Lecture Notes in Computer Science, vol 5259. Springer, Berlin, Heidelberg
  8. Deepshikha Kumari, Abhinav Sinha, Sandip Dutta, Prashant Pranav, “A Comprehensive Analysis of Various Cyber Attack Datasets Used for Intrusion Detection System”, International Conference on Machine Intelligence with Applications (ICMIA 2023), Springer
  9. Ankita Kumari, Prashant Pranav, Sandip Dutta, Soubhik Chakraborty, “Empirical and Statistical Comparison of RSA and El-Gamal in Terms of Time Complexity”, In: Hemanth, J., Pelusi, D., Chen, J.IZ. (eds), Proceedings of the International Conference on Intelligent Cyber Physical Systems and Internet of Things, Engineering Cyber – Physical Systems and Critical Infrastructure, 2023, Springer
  10. Animesh Kumar, Sandip Dutta, "A Review on Cloud Computing Architecture." Electronic Systems and Intelligent Computing: Proceedings of ESIC 2021 (2022): 197-202
  11. Prashant Pranav, Sandip Dutta, Soubhik Chakraborty, “An Involution Function-Based Symmetric Stream Cipher”, In: Nath V., Mandal J.K. (eds), Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication Systems, Lecture Notes in Electrical Engineering, Volume – 673, Springer (SCOPUS), 2021
  12. Nayancy, Sandip Dutta, Soubhik Chakraborty, IoT Based Secure Communication to Enhance Blockchain Model, In: Nath V., Mandal J.K. (eds), Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication Systems, Lecture Notes in Electrical Engineering, Volume – 673, Springer (SCOPUS), 2021
  13. Monalisha, Sandip Dutta, Survey of Lightweight Cryptography Algorithm for Data Security in the Internet of Things, In: Nath V., Mandal J.K. (eds), Proceedings of the Fourth International Conference on Microelectronics, Computing and Communication Systems, Lecture Notes in Electrical Engineering, Volume – 673, Springer (SCOPUS), 2021
  14. Dharmveer Kumar Yadav, Sandip Dutta, “Study and Analysis of Test Case Prioritization Techniques”, In: Nath V., Mandal J. (eds) Nanoelectronics, Circuits and Communication Systems. Lecture Notes in Electrical Engineering, vol 692. Springer, Singapore. https://doi.org/10.1007/978-981-15-7486-3_42, 2021
  15. Sanyukta, Sandip Dutta, “An Improved Pig Latin Algorithm for Lightweight Cryptography”, In: Sahana S., Bhattacharjee V. (eds) Advances in Computational Intelligence. Advances in Intelligent Systems and Computing, vol 988. Springer, Singapore. https://doi.org/10.1007/978-981-13-8222-2_28, 2020
  16. Priyanka, Sandip Dutta, Soubhik Chakraborty, “Human Tracking System Based on GPS and IOT (Internet of Things)”. In: Pandian A., Senjyu T., Islam S., Wang H. (eds) Proceeding of the International Conference on Computer Networks, Big Data and IoT (ICCBI - 2018). ICCBI 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 31. Springer, Cham. https://doi.org/10.1007/978-3-030-24643-3_61, 2020
  17. Dharmveer Kumar Yadav, Sandip Dutta, “A New Cluster-Based Test Case Prioritization using Cat Swarm Optimization Technique”, In: Nath V., Mandal J. (eds) Proceedings of the Third International Conference on Microelectronics, Computing and Communication Systems. Lecture Notes in Electrical Engineering, vol 556. Springer, Singapore. https://doi.org/10.1007/978-981-13-7091-5_36, 2019
  18. Dharmveer Kumar Yadav, Sandip Dutta, “Regression Test Case Prioritization using Genetic Algorithm”, In: Sahana S., Saha S. (eds) Advances in Computational Intelligence. Advances in Intelligent Systems and Computing, vol 509. Springer, Singapore. https://doi.org/10.1007/978-981-10-2525-9_13, 2017
  19. Dharmveer Kumar Yadav, Sandip Dutta, “Test Case Prioritization based on Early Fault Detection using Fuzzy Logic”, 3rd International Conference for Sustainable Global Development, Springer, 2016
  20. Sandip Dutta, “Image Compression using Wavelet Technique”, National Conference on Image Processing, 2015
  21. Sandip Dutta, N.C. Mahanti, Smita Bhowmik, Jayeeta Nayak “Algorithm for Registration of IR and MMW Images”, National Conference on Mathematical Techniques: Emerging Paradigms for electronics and IT Industries (MATEIT 2006), Pg 123-129, 2006
  22. Sandip Dutta, “Information Security in Big data perspective”, Big Data Initiatives: Trends and Applications (BDI 2015), 2015

Book Chapters

  1. Purushottam Singh, Prashant Pranav, Sandip Dutta, "GAN Cryptography”, Chapter – 14 In: Pranav P., Patel A., Jain S. (eds), Machine Learning in Healthcare and Security (pp. 184-194), CRC Press
  2. Prashant Pranav, Sandip Dutta, Soubhik Chakraborty, “Security Issues for the Semantic Web”, Chapter – 18 In: Jain S., Jain A., Balas V. (eds), Web Semantics: Cutting Edge and Future Directions in Healthcare, 2021, Elsevier
  3. Prashant Pranav, Soubhik Chakraborty, Sandip Dutta, “Statistical Comparative Study of the Execution Time of AES-128, RSA and Blowfish through ANOVA”, In: S. Chakraborty, P. Pal Choudhury, S. S. Hassan, J. K. Das and A. Sengupta (Eds.), A Treatise on Computational Mathematics, Kolkata Press Books, Ist Ed., 2022, p.289-298 (ISBN: 978-93-94689-08-4)
  Current Sponsored Projects
 
  1. Title: Cyber Security Assessment of DDCS of Prototype Fast Breeder Reactor (PFBR) against Cyber Threats (IGCAR/EIG/DDCSD/2023/W.O.No. BITM-01)

    Role: PI

    Funding Agency: IGCAR (Indira Gandhi Centre for Atomic Research)

    Grant: Rs. 29,77,000

    Duration: 2023 - 2026

  2. Title: Center for Advanced Research on Machine Learning for Geospatial Analytics and Solutions for the state of Jharkhand

    Role: Co-PI

    Funding Agency: PURSE, DST

    Grant: Rs. 8.5 Cr

    Duration: 2023 - 2027

  3. Title: Development of Intelligent Blockchain Techniques for providing efficient management and storage security solutions for E healthcare (BT/AGCJC0094/01/22)

    Role: CO – PI

    Funding Agency: BIRAC (Biotechnology Industry Research Assistance Council), DBT

    Grant: Rs. 10,00,000

    Duration: 2023

  Text and Reference Books
 
  1. Prashant Pranav, Sandip Dutta, Soubhik Chakraborty, Nayancy “Applied Cryptography for Researchers and Practitioners”, Nova Science Publishers, 2023
  2. Soubhik Chakraborty, Prashant Pranav, Naghma Khatoon, Sandip Dutta, “A Guide to Design and Analysis of Algorithms”, Nova Science Publishers, 2022
  3. Prashant Pranav, Sandip Dutta, Soubhik Chakraborty, “Recent Trends in Cryptography and its Allied Areas: Securing Voice Communication using Music”, RAR Publication, 2020
  Intellectual Property Rights (IPR)
 
  1. Title: An Encryption Based Portable Device for Generating Electronic Health Records (EHRs) and Method Thereof

           Patent No.: 202431032969

           Status: Published

           Date: 3rd May, 2024

           Inventors: Shamama Anwar, Prashant Pranav, Sandip Dutta

  1. Title: Network Security Defending Device

           Patent No.: 409757-001

           Status: Published

           Date: 8th March, 2024

           Inventors: Animesh Kumar, Saurabh Srivastava, Prashant Pranav, Sandip Dutta

 

  Fellow
 
  1. Prashant Pranav (Awarded, Completion Year – 2020, Area of Research: Cryptography, Music, and Algorithm Analysis, Thesis Title: Design and Analysis of Algorithms with Special Emphasis on Cryptography)
  2. Dharamveer Kumar Yadav (Awarded, Completion Year – 2020, Area of Research: Software Engineering, Thesis Title: Regression Test Case Selection and Prioritization of Test Case for Object-Oriented Software)
  3. Soumya Ray (Awarded, Completion Year – 2022, Area of Research: Security in Healthcare)
  4. Animesh Kumar (Awarded, Completion Year – 2024, Area of Research: Cryptography, Cloud Computing, Thesis Title: Design and Analysis of Security Protocols with a Special Emphasis on Cloud Computing)
  5. Nayancy (Awarded, Completion Year – 2024, Area of Research: Lightweight Cryptography, Blockchain, Thesis Title: Design and Analysis of Blockchain Protocols with a Special Emphasis on Lightweight Cryptography)
  6. Ankita Kumari (Awarded, Completion Year – 2024, Area of Research: Cryptography, MANET, Thesis Title: Design and Analysis of Security Protocols with a Special Emphasis on Mobile Ad-hoc Networks)
  7. Purushottam Singh (Pursuing, Area of Research: GAN Cryptography)
  8. Deepshikha Kumari (Pursuing, Area of Research: Intrusion Detection System)
  9. Sujit Kumar Chatterjee (Pursuing, Area of Research: Data Warehousing)