Welcome...

dr. D.K. Sarmah MSc (Dipti)

Lecturer

About Me

Dipti K. Sarmah is a Lecturer in the group Services and Cyber Security (SCS) in the department of EEMCS at the University of Twente. She worked on developing a high capacity and robust image steganography method using an optimization algorithm. Her research interests are not only limited to the field of steganography, and cryptography, and its applications, but also the study and analysis of human behavior for Cyber security.

In addition to research, she also enjoys teaching and supervising project sessions for undergraduate and master's students.

 

 

 

Expertise

Engineering & Materials Science
Cryptography
Local Search (Optimization)
Particle Swarm Optimization (Pso)
Steganography
Mathematics
Intelligence
Steganography
Business & Economics
Cybersecurity
Vulnerability Analysis

Publications

Recent
Sarmah, D. K., Kulkarni, A. J., & Abraham, A. (2020). Steganalysis on All Approaches/Vulnerability Analysis of Stego Image(s). In D. K. Sarmah, A. J. Kulkarni, & A. Abraham (Eds.), Optimization Models in Steganography Using Metaheuristics (pp. 147-161). (Intelligent Systems Reference Library; Vol. 187). Springer. https://doi.org/10.1007/978-3-030-42044-4_7
Sarmah, D. K., Kulkarni, A. J., & Abraham, A. (2020). Heuristics and Metaheuristic Optimization Algorithms. In D. K. Sarmah, A. J. Kulkarni, & A. Abraham (Eds.), Optimization Models in Steganography Using Metaheuristics (pp. 49-61). (Intelligent Systems Reference Library; Vol. 187). Springer. https://doi.org/10.1007/978-3-030-42044-4_3
Mahajan, S. , & Sarmah, D. K. (2019). Application of blowfish algorithm for secure transactions in decentralized disruption-tolerant networks. In A. H. Kashan, T. Kang, A. J. Kulkarni, & S. C. Satapathy (Eds.), Proceedings of the 2nd International Conference on Data Engineering and Communication Technology - ICDECT 2017 (pp. 13-22). (Advances in Intelligent Systems and Computing; Vol. 828). Springer. https://doi.org/10.1007/978-981-13-1610-4_2
Other Contributions

1. Sarmah, D.K., Kulkarni, A.J. (2019): “Improved Cohort Intelligence-a High Capacity, Swift and Secure Approach on JPEG image Steganography”, Journal of Information Security and Applications, 45, pp 90-106. (link: https://www.sciencedirect.com/science/article/abs/pii/S2214212618304824)

2. Sarmah, D.K., Kulkarni, A.J.(2018): “JPEG based Steganography Methods using Cohort Intelligence with Cognitive Computing and Modified Multi Random Start Local Search Optimization Algorithms”, Information Sciences, 430-431, PP 378-396. (link: https://www.sciencedirect.com/science/article/abs/pii/S0020025516313056)

 

 

UT Research Information System

Google Scholar Link

Affiliated Study Programmes

Bachelor

Master

Courses Academic Year  2022/2023

Courses in the current academic year are added at the moment they are finalised in the Osiris system. Therefore it is possible that the list is not yet complete for the whole academic year.
 

Courses Academic Year  2021/2022

Media

1. A small contribution of our research was published in an interview conducted by Eveline Meijer from AG Connect at the following link: https://www.agconnect.nl/artikel/social-engineering-groter-risico-door-coronacrisis

News on utwente.nl

Contact Details

Visiting Address

University of Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling (building no. 11), room 2062
Hallenweg 19
7522NH  Enschede
The Netherlands

Navigate to location

Mailing Address

University of Twente
Faculty of Electrical Engineering, Mathematics and Computer Science
Zilverling  2062
P.O. Box 217
7500 AE Enschede
The Netherlands

Social Media