Dr. Sunil Kumar Muttoo
Department of Computer Science
University of Delhi

Researh Papers

Click Here to Download Complete List

Published In Peer Reviewed Journals

LIST WILL BE UPDATED SOON

  • Hans, H., Ahuja L. and Muttoo, S.K. (Accepted for publication) 'A Fuzzy Logic Approach for Detecting Redirection Spam', Int. J. Electronic Security and Digital Forensics, Vol. X, No. Y,
  • Bansal A., Muttoo S. K., Kumar V. (2016), "Secure Data Hiding Along Randomly Selected Closed Knight Tour", International Journal of Applied Security Research, Taylor & Francis, vol. 11 no. 1, pp. 90-100.
  • Bansal A, Muttoo S. K., Kumar V., (2015), "Secure Data hiding by opti-mal placement of Queen along closed knight tour", I-manager's Journal of Information Technology, Vol. 4, no. 3, pp. 18-24
  • Kumar V., Bansal A., Muttoo S. K., (2014), "Data Hiding Method Based on Inter-block difference in Eight queens Solutions and LSB Substitution", International Journal of Information Security & Privacy, USA, Vol. 8, no. 2, pp. 42-52
  • Bansal A., Muttoo S. K., Kumar V., (2014), Data Hiding approach based on Eight-Queens Problem and Pixel Mapping Method, International Jour-nal of Signal Processing Image Processing and Pattern Recognition, Vol.7 No. 5, pp 47-58
  • B. Ahuja, S.K. Muttoo, Aggarwal D., (2014), "Analysis of effect of varying quantization level on the image communication scheme based on combination of compression, cryptography and steganography", International Journal of Enhanced Research in Management & Computer Applications, Vol. 3, no. 2, pp: 30-36.
  • MK Bhatia, SK Muttoo, MPS Bhatia, (2013), "Secure Requirement Prioritized Grid Scheduling Model International", Journal of Network Security, Vol. 15 no. 6, pp. 478-483 2013.
  • S Kumar, SK Muttoo, (2013), "Image Steganography Based on Complex Double Dual Tree Wavelet Transform", International Journal of Computer & Electrical Engineering Vol. 5,no. 2.
  • S Kumar, SK Muttoo, (2013), "A comparative study of image steganography in wavelet domain", International Journal of Computer Science and Mobile Computing, IJCSMC, Vol 2, no. 2.
  • M Bhatia, SK Muttoo, MPS Bhatia, (2013), Secure Group Communication with Hidden Group Key Information Security Journal: A Global Perspective Vol. 22, no.1, pp. 21-34.
  • SK Muttoo, (2013), Data Security Mass Communicator: International Journal of Communication Studies, Vol.7, no. 1, pp. 39-40.
  • S Kumar, SK Muttoo, (2013), "Image Steganography Based on Wavelet Families", International Journal of Electronic Security and Digital Forensics, Vol. 5 2013.
  • V Gaur, A Soni, SK Muttoo, N Jain, (2013), "Comparative analysis of Mamdani and Sugeno inference systems for evaluating inter-agent dependency requirements", J Comput Eng Inf Technol, Vol. 2.
  • Muttoo S. K., Kumar V and Bansal A, (2012) "Secure Data Hiding Using Eight Queens Solutions", International Journal of Information Security & Privacy, USA, Vol. 6, no. 4, Oct-Dec 2012, pp 55-70
  • Kumar V, Bansal A and Muttoo S. K., (2012), "Hiding Information in Vec-tor Layer while Extracting Layers from Raster Data", Information Security Journal: A Global Perspective, Taylor & Francis, Vol. 21, pp 317-327.
  • SKMuttoo, Abdul Satar, (2012), "A NEW STEGO-SYSTEM BASED ON LFSR GENERATOR", International Journal of Engineering and In-novative Technology (IJEIT), Vol. 1 Issue 1. 2012.
  • Kumar, V. and Muttoo, S.K., (2011), "A Graph Theoretic Approach to Sus-tainable Steganography", Int. J. of Tiawan , Vol.17, no.1. 2011.
  • Sushil Kumar and S.K. Muttoo, (2011), "Steganography based on Coun-terlet Transform", Bharti Vidyapeeth", International Journal of Information Technology. Vol. 9 No. 6.
  • S.K. Muttoo and Sushil Kumar, (2011), "A multilayered secure, robust and high capacity image steganographic algorithm" World Computer science and IT Journal", Vol.1, No.6,pp 239-246.
  • Muttoo, S.K. and Kumar, V., (2010), 'Hamiltonian Graph Approach to Steganography', International Journal of Electronic Security and Digital Forensic, Inderscience, Vol.3, No.4, pp 311–332.
  • Muttoo, S. K. and Kumar, V., (2010), 'Hiding Message in Map along pre Hamiltonian Path'. Int.J. of information Security and Privacy, Idea Group USA, Vol.4, No.4,pp.21-34.
  • Kumar, V. and Muttoo, S.K.,(2010), 'Graph Theoretic Approach to Steganography to Secure Message Digest'. Information Security Journal: A global perspective, Taylor & Francis, Vol.19, No.6, pp.328-335.
  • Kumar, V. and Muttoo, S.K.,(2009), 'Principle of Graph Theoretic Approach to Digital Steganography'. Proceedings of the Third INDIA-COM National Conference, February, New Delhi, pp.161-165.
  • Vinay Kumar and S K Muttoo, (2009), 'A data structure for graph To fa-cilitate hiding of information in a graph's segments–a graph theoretic ap-proach to steganography' Int. J. Communication Networks and Distributed Systems, Vol. 3, No. 3, pp 268-282.
  • S.K. Muttoo and Sushil Kumar, (2009), 'Robust Source coding Ste-ganographic technique using Wavelet transforms', Bharti Vidyapeeth International Journal of Information Technology, Vol. 1 No. 2.
  • S.K. Muttoo and Sushil Kumar, (2009), 'Data hiding in JPEG images' In-ternational Journal of Information Technology (IJIT), Vol 1, pp-13-16.
  • Kumar, V. and Muttoo, S.K.,(2008), 'Relevance of Steganography' in General, and Graph Theoretic Approach in particular, in Indian Security Concern and Measure'. Proceedings' of the Second INDIACOM National Conference, February, New Delhi, pp.183-188.
  • S.K.Muttoo, Manoj Rana, (2008),'A note on dual generlized Reed-Muller code of order r+(r+ 1)ms Invertis Journal of Science & Technology Vol. 2,No.3, pp. 67-76.
  • S.K.Pal, P.K.Saxena and S.K.Muttoo, (2006), 'Designing Secure & Sur-vivable Stegosystems', Defence Science Journal, Vol. 56, No.-2, April 2006, pp. 239-250.
  • S.K.Pal, P.K.Saxena and S.K.Muttoo, (2005),'Steganography & water-marking of Digital Images Using Singular Value Decomposition', Journal of Discrete Mathematical Sciences and Cryptography, Vol. 8, No.3, pp. 343-353.
  • SK Pal, RK Khanna, SK Muttoo, (2004), "Information Theoretic Models for Improving the Security of Steganographic Systems" 'Mathematics and information theory recent topics and applications, 192-197.
  • Pal SK, Saxena PK and Muttoo SK, (2003),'Smart Wardens, Smarter Steganography Proceedings of the Pacific Rim Workshop on Digital Steganography, STEG'03,Japan, 109-121.
  • Saxena PK, Pal SK and Muttoo SK ,(2003)'SVD Based Information Hiding & Attacks, Proceedings of the Pacific Rim Workshop on Digital Steganography, STEG'03, Japan, 59-67.
  • Pal SK, Saxena PK and Muttoo SK, (2002) 'The Future of Audio Steganography Proceedings of the Pacific Rim Workshop on Digital Steganography, STEG'02,Japan, 136-145.
  • Pal SK, Saxena PK and Muttoo SK, (2002) 'A Systematic Approach to Steganalysis of Images , Proceedings of the Pacific Rim Workshop on Digital Steganography, STEG'02, Japan, 179-188.
  • Pal SK, Saxena PK and Muttoo SK, (2002) 'Smart Steganographic Application, Proceedings of the Pacific Rim Workshop on Digital Steganography, STEG'02,Japan, 11-19.
  • Muttoo SK , Pal SK, Saxena PK, (2002) 'Information Hiding for Secure Communication' Journal of CSI March 2002 (pp6-11), April 2002(pp11-19).
  • Sunil Kumar Muttoo; Shankar Lal, (1986), A reversible code over GF( q ) Kybernetika, Vol. 22 (1986), No. 1, pp. 85—91.
  • S K Muttoo, V Tyagi, (1981), An upper bound for codes detecting low- density closed-loop bursts Information Sciences 24 (3), 195-199.
  • B Dass, S Muttoo, (1981), "Comments on Error-locating codes-A new concept in error control" by Wolf, JK, and Elspas, B. Information Theory, IEEE Transactions on 27 (1), 136-1365,1981
  • BK Dass, SK Muttoo, (1980), Correction of random and burst errors IEE Proceedings E: Computers and Digital Techniques Vol. 127, 249-252.
  • BK Dass, SK Muttoo, (1980), A bound for random and closed loop burst error detecting codes Information Sciences vol. 20, no.2, pp. 151-156.
  • BK Dass, SK Muttoo, (1980), A note on Reed-Muller codes Discrete Ap-plied Mathematics, 1980


Presented in Conferences/Published in Proceedings of A Conference, 2005 onwards:

  • R Gupta, SK Muttoo, SK Pal "Proposal for Integrated System Architecture in Utilities"3rd International Conference on Advances in Computing, Communications and Informatics, IEEE- Explore ,pp 1995-1998, 2014.
  • Rajan Gupta, S.K. Muttoo, S.K. Pal "Awareness, Adoption and Acceptance of e-Government Services in India" Proceedings of International Conference on Research in Marketing (ICRM 2013) -A Refereed International Conference,ICRM-PS2/1-11, Published by IIT D, XLRI, Curtin University(ISBN 9781630419981),2013.
  • Rajan Gupta, S.K. Muttoo, S.K. Pal, "Analysis of Information Systems Security for e-Governance in India" Proceedings ofvNational Workshop on Cryptology,TSII17- 25, Publisher: DESIDOC, DRDO and CRSI ,2013
  • S Verma, SK Pal, SK Muttoo " A new tool for lightweight ` encryption on android " Advance Computing Conference (IACC), 2014 IEEE International, 306-311, 2014.
  • M Bhatia, SK Muttoo, MPS Bhatia" Steganography-Based Secure Communication Proceedings of the Second International Conference on Soft Computing 2014.
  • Sushil Kumar and S.K. Muttoo, "An Overview on Wavelet-like Transforms in Image Data Hiding", Proceeding of the National Conference on computing for Nation Development, 2010, New Delhi, Feb. 25-.26, pp. 263-268.
  • Sushil Kumar and S.K. Muttoo, "Data Hiding techniques based on Wavelet-like Transform and Complex Wavelet Transform", International Symposium on Intelligence Information Processing and Trusted Computing, IPTC 2010, Huanggang, China, Oct. 28-29, 2010, published in IEEE Xplore.
  • Sushil Kumar and S.K. Muttoo, "Image Steganography based on Complex Double Dual Tree Wavelet Transform", 3rd International Conference on Signal Acquisition and Processing (ICSAP 2011), Singapore, Feb.26-28, 2011.
  • Sushil Kumar and S.K. Muttoo, "Steganography based on Contourlet Transform", International Journal of Computer Science and Information Security (IJCSIS), Vol. 9 o. 6, June 2011.
  • Sushil Kumar and S.K. Muttoo , "Image steganography based on Complex Wavelet Transform", 2nd National Conference on Software Engineering and Information Security (NCSEIS10), Acropolis Institute of Technology and Research, Indore,India, 23-24 December, 2010, IEEE Computer Society sponsored, pp.147-151.
  • Sushil Kumar and S.K. Muttoo 'Distortionless Data Hiding based on Slantlet Transform' Conference on Multimedia Information Networking and Security (17-18 Nov.2009)Wuhan,China.To appear in Proceedings of IEEE Computer Society (CS) press and IEEE Xplore.
  • Vinay Kumar and S K Muttoo ,'Relevance of steganography, in general , and graph theoretic approach in particular, in Indian Security Concern and Measure',Proceedings of 2nd National Conference on Computing in Nation Development, February 08 -09 , 2008, pp 183-188.
  • S.K. Muttoo and Sushil Kumar , 'Robust Source coding Watermark technique based on magnitude DFT decomposition', 40th AnnualConvention of ORSI, Dec. 4-6, 2007.
  • S.K. Muttoo and Sushil Kumar , 'High Capacity Image Steganography using Best T-codes', International Symposium on Data,Information and Knowledge spectrum, ISDIKS 2007, Dec 13- 15, 2007.
  • S.K. Muttoo and Sushil Kumar, 'Robust Steganography using T- codes', Proceeding of the National Conference on Computing for Nation Development, BVICAM (IndiaCom 2007), New Delhi, Feb. 23-24, 2007 , pp.221-223.
  • S.K. Muttoo and Sushil Kumar,'Image Steganography using Self- synchronizing variable codes', Presented in International Conference on quality, reliability and Infocom technology, ICQRIT, December 2-4,2006.
  • Pal SK and Muttoo SK, (2005) 'SVD: A Multipurpose Domain for Infor-mation Protection 'Proceedings of the National Conference on Frontiers in Applied and Computational Mathematics, FACM-2005, Thapar Institute of Engineering Technology, Patiala, 290-300,Allied Publishers.
  • Pal SK, Saxena PK and Muttoo SK , (2004) ,'Image Steganography for Wireless Networks Using the Hadamard Transform ,IEEE SPCOM 2004 Con-ference, Bangalore, Dec.2004, Available in CD & IEEE Xplore Online Data.