NIT Agartala

Faculty/Staff Profile

Dr. Nirmalya Kar

Assistant Professor

Department: Computer Science and Engineering

Email ID : nirmalya@ieee.org

URL: https://orcid.org/0000-0002-7371-232X

Research Area : Cryptography, Steganography, Information Security, Cyber Analytics with Machine Learning, DNA Computing

UG Courses

Computer Network; Foundation to Cryptography; Data Communication;

PG Courses

Principles of Cryptography; Information Security; Data Hiding;

Student Register For PhD Enrolled OnGoing

Full Time : Priyanka Biswas; Part Time : Bhaskar Biswas; Poulomi Deb; Gourab Bhattacharya

Address Information Security Lab, #229, Dr. APJ Abdul Kalam Block, Department of Computer Science & Engineering. National Institute of Technology Agartala
City AGARTALA
State TRIPURA
Country India
Email Address nirmalya@ieee.org
Phone [Residence] -
Phone [Mobile] -
Degree/Diploma Description Year Subject
Ph. D.  ( Philosophy of Doctorate ) 0 Information Security
Sr. No. Publication Conference Month Year
Podder, S., Harsh, A., Pal, J., Kar, N. (2024). An Approach Towards Modification of Playfair Cipher Using 16 X 16 Matrix. In: Tiwari, S., Trivedi, M.C., Kolhe, M.L., Singh, B.K. (eds) Advances in Data and Information Sciences. ICDIS 2023. Lecture Notes in Networks and Systems, vol 796. Springer, Singapore. https://doi.org/10.1007/978-981-99-6906-7_13 JAN 2024
Pal, P., Ghosh, S., Biswas, P., Kar, N., Sarkar, J.L. (2024). Secured Digital Watermarking Using Neural Networks. In: Kumar Sahu, A. (eds) Multimedia Watermarking. Springer, Singapore. https://doi.org/10.1007/978-981-99-9803-6_3 FEB 2024
P. Pal, S. Ghosh and N. Kar, "Attacks on Social Media Networks and Prevention Measures," 2023 International Conference for Advancement in Technology (ICONAT), Goa, India, 2023, pp. 1-6, doi: 10.1109/ICONAT57137.2023.10080106. 2023
N. Kumar and N. Kar, "Approaches towards Fake News Detection using Machine Learning and Deep Learning," 2023 10th International Conference on Signal Processing and Integrated Networks (SPIN), Noida, India, 2023, pp. 280-285, doi: 10.1109/SPIN57001.2023.10117154. 2023
S. Ghosh, P. Pal and N. Kar, "An Analysis of Chaos-based Cryptographic Algorithms," 2023 Fifth International Conference on Electrical, Computer and Communication Technologies (ICECCT), Erode, India, 2023, pp. 1-7, doi: 10.1109/ICECCT56650.2023.10179844. FEB 2023
Deb, P., Kar, N., Das, N., Datta, V. (2023). Detecting Malware in Windows Environment Using Machine Learning. In: Singh, S.N., Mahanta, S., Singh, Y.J. (eds) Proceedings of the NIELIT's International Conference on Communication, Electronics and Digital Technology. NICE-DT 2023. Lecture Notes in Networks and Systems, vol 676. Springer, Singapore. https://doi.org/10.1007/978-981-99-1699-3_7 FEB 2023
Ray, A., Singh, K., Harsh, A., Thorat, S., Kar, N. (2024). Qualitative and Quantitative Analysis of Modifications in Playfair Cipher. In: Dasgupta, K., Mukhopadhyay, S., Mandal, J.K., Dutta, P. (eds) Computational Intelligence in Communications and Business Analytics. CICBA 2023. Communications in Computer and Information Science, vol 1956. Springer, Cham. https://doi.org/10.1007/978-3-031-48879-5_15 JAN 2023
Debnath, K., Kar, N. (2023). SMS Spam Detection Using Deep Learning Approach. In: Bhattacharyya, S., Banerjee, J.S., Köppen, M. (eds) Human-Centric Smart Computing. Smart Innovation, Systems and Technologies, vol 316. Springer, Singapore. https://doi.org/10.1007/978-981-19-5403-0_29 2022
S. Debnath and N. Kar, "An Approach Towards Data Security Based on DCT and Chaotic Map," 2022 2nd Asian Conference on Innovation in Technology (ASIANCON), 2022, pp. 1-5, doi: 10.1109/ASIANCON55314.2022.9908893. 2022
K. Debnath and N. Kar, "Email Spam Detection using Deep Learning Approach," 2022 International Conference on Machine Learning, Big Data, Cloud and Parallel Computing (COM-IT-CON), 2022, pp. 37-41, doi: 10.1109/COM-IT-CON54601.2022.9850588. 2022
Das, A.K., Kar, N. (2021). g-EoN: A Non-salient Approach Towards Encryption Using Gamma Function ??(-????)=-??????(??-????). In: Abdullah, N., Manickam, S., Anbar, M. (eds) Advances in Cyber Security. ACeS 2021. Communications in Computer and Information Science, vol 1487. Springer, Singapore. https://doi.org/10.1007/978-981-16-8059-5_6 2021
Das, A.K., Kar, N. (2021). A Novel Approach of Text Encryption Using Random Numbers and Hash Table. In: Anbar, M., Abdullah, N., Manickam, S. (eds) Advances in Cyber Security. ACeS 2020. Communications in Computer and Information Science, vol 1347. Springer, Singapore. https://doi.org/10.1007/978-981-33-6835-4_16 2021
Das, A.K., Kar, N. (2021). A Novel Approach of Text Encryption Using Random Numbers and Hash Table. In: Anbar, M., Abdullah, N., Manickam, S. (eds) Advances in Cyber Security. ACeS 2020. Communications in Computer and Information Science, vol 1347. Springer, Singapore. https://doi.org/10.1007/978-981-33-6835-4_16 2021
Das, A.K., Das, A., Kar, N. (2020). An Approach Towards Encrypting Paired Digits Using Dynamic Programming and Diffie-Hellman Key Exchange. In: Saha, A., Kar, N., Deb, S. (eds) Advances in Computational Intelligence, Security and Internet of Things. ICCISIoT 2019. Communications in Computer and Information Science, vol 1192. Springer, Singapore. https://doi.org/10.1007/978-981-15-3666-3_15 2020
Das, A., Das, A.K., Kar, N. (2020). An Improved Chaos Based Medical Image Encryption Using DNA Encoding Techniques. In: Saha, A., Kar, N., Deb, S. (eds) Advances in Computational Intelligence, Security and Internet of Things. ICCISIoT 2019. Communications in Computer and Information Science, vol 1192. Springer, Singapore. https://doi.org/10.1007/978-981-15-3666-3_18 2020
Satija, T., Kar, N. (2020). Detecting Malicious Twitter Bots Using Machine Learning. In: Saha, A., Kar, N., Deb, S. (eds) Advances in Computational Intelligence, Security and Internet of Things. ICCISIoT 2019. Communications in Computer and Information Science, vol 1192. Springer, Singapore. https://doi.org/10.1007/978-981-15-3666-3_16 2020
Negi, V.S., Kar, N. (2020). Security and Anonymity Aspects in Tails and Windows 10 Operating Systems. In: Kar, N., Saha, A., Deb, S. (eds) Trends in Computational Intelligence, Security and Internet of Things. ICCISIoT 2020. Communications in Computer and Information Science, vol 1358. Springer, Cham. https://doi.org/10.1007/978-3-030-66763-4_17 2020
Das, T., Kar, N. (2020). A Novel Cryptographic Approach to Implement Confidentiality Using Point Reflection Property. In: Kar, N., Saha, A., Deb, S. (eds) Trends in Computational Intelligence, Security and Internet of Things. ICCISIoT 2020. Communications in Computer and Information Science, vol 1358. Springer, Cham. https://doi.org/10.1007/978-3-030-66763-4_16 2020
Satija, T., Kar, N. (2020). Analysing Social Media Responses in Natural Disaster. In: Kar, N., Saha, A., Deb, S. (eds) Trends in Computational Intelligence, Security and Internet of Things. ICCISIoT 2020. Communications in Computer and Information Science, vol 1358. Springer, Cham. https://doi.org/10.1007/978-3-030-66763-4_9 2020
N. Kar, M. A. A. A. Aman, K. Mandal and B. Bhattacharya, "Chaos-based video steganography," 2017 8th International Conference on Information Technology (ICIT), 2017, pp. 482-487, doi: 10.1109/ICITECH.2017.8080046. 2017
D. Debnath, S. Deb and N. Kar, "An Advanced Image Encryption Standard Providing Dual Security: Encryption Using Hill Cipher & RGB Image Steganography," 2015 International Conference on Computational Intelligence and Networks, 2015, pp. 178-183, doi: 10.1109/CINE.2015.41. 2015
Das, P., Kar, N. (2015). ILSB: Indicator-Based LSB Steganography. In: Jain, L., Patnaik, S., Ichalkaranje, N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 309. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2009-1_55 2015
Das, P., Kar, N. (2015). A Hybrid Motion Based-Object Tracking Algorithm for VTS. In: Jain, L., Patnaik, S., Ichalkaranje, N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 309. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2009-1_23 2015
Majumdar, A., Podder, T., Majumder, A., Kar, N., Sharma, M. (2015). DNA-Based Cryptographic Approach Toward Information Security. In: Jain, L., Patnaik, S., Ichalkaranje, N. (eds) Intelligent Computing, Communication and Devices. Advances in Intelligent Systems and Computing, vol 308. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2012-1_22 2015
Nirmalya Kar, Bhaskar Biswas, Subhrajyoti Deb, Baby Bhattacharya, "DETERMINISTIC FAULT ATTACK OVER THE STREAM CIPHER MICKEY", 12th International Conference on Applied Computing, 2015, Dublin, Ireland, pp:49-55, ISBN: 978-989-8533-45-6. 2015
Deb, S., Biswas, B., Kar, N. (2015). Study of NLFSR and Reasonable Security Improvement on Trivium Cipher. In: Mandal, J., Satapathy, S., Kumar Sanyal, M., Sarkar, P., Mukhopadhyay, A. (eds) Information Systems Design and Intelligent Applications. Advances in Intelligent Systems and Computing, vol 339. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2250-7_73 2015
A. Biswas, M. Sharma, T. Poddder and N. Kar, "An approach towards multilevel and multiagent based intrusion detection system," 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies, 2014, pp. 1787-1790, doi: 10.1109/ICACCCT.2014.7019417. 2014
A. Majumder, A. Majumdar, T. Podder, N. Kar and M. Sharma, "Secure data communication and cryptography based on DNA based message encoding," 2014 IEEE International Conference on Advanced Communications, Control and Computing Technologies, 2014, pp. 360-363, doi: 10.1109/ICACCCT.2014.7019464. 2014
P. Das and N. Kar, "A highly secure DNA based image steganography," 2014 International Conference on Green Computing Communication and Electrical Engineering (ICGCCEE), 2014, pp. 1-5, doi: 10.1109/ICGCCEE.2014.6921419. 2014
P. Das and N. Kar, "A DNA based image steganography using 2D chaotic map," 2014 International Conference on Electronics and Communication Systems (ICECS), 2014, pp. 1-5, doi: 10.1109/ECS.2014.6892654. 2014
Majumdar A, Sharma M, Kar N. "An Improved Approach to Steganography using DNA Characteristics", ICCN-2014 Editors: K. R. Venugopal and L. M. Patnaik 2014. 2014
Nirmalya Kar, Atanu Majumder, Ashim Saha, Anupam Jamatia, Kunal Chakma, and Mukul Chandra Pal. 2013. An improved data security using DNA sequencing. In Proceedings of the 3rd ACM MobiHoc workshop on Pervasive wireless healthcare (MobileHealth '13). Association for Computing Machinery, New York, NY, USA, 13–18. https://doi.org/10.1145/2491148.2491152 2013
Singh, L.D.; Das, P.; Kar, N.: 'A Pre-processing Algorithm for Faster Convex Hull Computation', IET Conference Proceedings, 2013, p. 8.01-8.01, DOI: 10.1049/cp.2013.2348, IET Digital Library, 2013
Kar, N., Roy, S., Saha, A., Chakma, K., Jamatia, A. (2013). A Biometric Based Design Pattern for Implementation of a Security Conscious E-Voting System Using Cryptographic Protocols. In: Das, V.V., Chaba, Y. (eds) Mobile Communication and Power Engineering. AIM 2012. Communications in Computer and Information Science, vol 296. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35864-7_11 2013
Kar Nirmalya, Majumder Atanu, Saha Ashim, Rudrapal Dwijen. "An Improved DNA Based Cryptosystem", International Conference on Signal, Image Processing and Pattern Recognition (SIPP-2013), February 18-20, 2013, Bangalore, India, Springer LNICST series. 2013
Prasenjit Das and Nirmalya Kar, "An Improved Trusted Full Disk Encryption Model", K. R. Venugopal, P. Deepa Shenoy and L. M. Patnaik (Eds.) ICDMW 2013, pp. 9–16. 2013 2013
M. K. Debbarma, N. Kar and A. Saha, "Static and dynamic software metrics complexity analysis in regression testing," 2012 International Conference on Computer Communication and Informatics, 2012, pp. 1-6, doi: 10.1109/ICCCI.2012.6158825. 2012
Sr. No. Publication Journal Month Year
Biswas, P., Kar, N. & Deb, S. ML based assessment and prediction of air pollution from satellite images during COVID-19 pandemic. Multimed Tools Appl (2024), pp: 1-19. https://doi.org/10.1007/s11042-023-18102-x (SCIE, IF: 3.6) JAN 2024
Durgabati Podder, Keya Chowdhury, Subhrajyoti Deb and Nirmalya Kar. "Messed up(): a key generator-based image cryptosystem". International Journal of Ad Hoc and Ubiquitous Computing. Vol. 44, No. 1, 2023. https://doi.org/10.1504/IJAHUC.2023.133447 (SCIE, IF: 0.773) 2023
Subhrajyoti Deb, Abhilash Das, and Nirmalya Kar. "An applied Image Cryptosystem on Moore’s Automaton operating on d (qk)/??2. ACM Transactions on Multimedia Computing, Communications, and Applications. Volume 20, Issue 2, Article No.: 52, pp 1–20. 2023. https://doi.org/10.1145/3614433 (SCIE, IF: 5.1) 2023
Das AK, Kar N, Deb S, Singh MP. bFLEX-gamma: A Lightweight Block Cipher Utilizing Key Cross Approach via Probability Density Function. Arabian Journal for Science and Engineering. 47. 10563–10578 (2022). https://doi.org/10.1007/s13369-022-06651-6 (SCIE, IF: 2.807) 2022
Deb S, Bhuyan B, Kar N, Reddy KS. Colour image encryption using an improved version of stream cipher and chaos. International Journal of Ad Hoc and Ubiquitous Computing. 2022;41(2):118-33. DOI: 10.1504/ijahuc.2022.10045645 (SCIE, IF: 0.773) 2022
Das, A., Das, A. & Kar, N. A metamorphic cryptography approach towards securing medical data using chaotic sequences and Ramanujan conjecture. Journal of Ambient Intelligence and Humanized Computing, 13, 1021–1036 (2022). https://doi.org/10.1007/s12652-021-02943-1 (SCIE, IF: 3.66) 2021
Kar N, Mandal K, Bhattacharya B. Improved chaos-based video steganography using DNA alphabets. ICT Express. 2018 Mar 1;4(1):6-13. https://doi.org/10.1016/j.icte.2018.01.003 (SCIE, IF: 4.754) 2018
Das A, Satija T, Zilpe S, Kavya J, Kar N. A Study of Threat Model on Mobile Wallet Based Payment System. International Journal of Computational Intelligence & IoT. 2018;2(4). 2018
Chakraborty, Sourit and Kar, Nirmalya, An Approach Towards Linguistic Steganography (2018). International Journal of Computational Intelligence & IoT, Vol. 2, No. 4, 2018, Available at SSRN: https://ssrn.com/abstract=3361200 2018
Das P, Deb S, Kar N, Bhattacharya B. An improved DNA based dual cover steganography. Procedia Computer Science. 2015 Jan 1;46:604-11. https://doi.org/10.1016/j.procs.2015.02.103. (SCOPUS, IF: 0.883) 2015
Jamatia A, Chakma K, Kar N, Rudrapal D, Debbarmai S. Performance analysis of hierarchical and flat network routing protocols in wireless sensor network using Ns-2. International Journal of Modeling and Optimization. 2015 Feb 1;5(1):40. 2014
Kar N, Majumder A, Saha A, Deb S, Pal MC. Data security and cryptography based on DNA sequencing. International Journal of Information Technology & Computer Science (IJITCS). 2013 Aug;10(3). 2013
Saha A, Das H, Kar N, Pal MC. An Approach of Extracting Facial Components for Facial Expression Detection using Fiducial Point Detection. International Journal of Computer Applications. 2013 Jan 1;80(10). 2013
Kar N, Debbarma MK, Saha A, Pal DR. Study of implementing automated attendance system using face recognition technique. International Journal of computer and communication engineering. 2012 Jul 1;1(2):100. 2012
No. Book Published Year
Kar N, Saha A, Deb S. Trends in Computational Intelligence, Security and Internet of Things. Springer Nature; 2020. DOI: 10.1007/978-3-030-66763-4. ISBN: 978-3-030-66762-7 2020
Saha A, Kar N, Deb S. Advances in Computational Intelligence, Security and Internet of Things, Springer Nature; 2019. DOI: 10.1007/978-981-15-3666-3. ISBN: 978-981-15-3665-6 2019
No. Conference Attended Information Month Year
International Conference on Software Engineering, Information System and Applications ( ICSEISA 2017 )” July 30 – 31, 2017 in Seoul, South Korea jointly organized by Gukje Cyber University, South Korea, Open Learning Society and SRC Corporation, South Korea. JULY 2017
The 8th International Conference on Information Technology, May 17-18, 2017, Amman, Jordon organized jointly by Al-Zaytoonah University of Jordan (ZUJ) & Universiti Sains Malaysia (USM) MAY 2017
The 12th International Conference on Applied Computing 2015 during 24 – 26 October 2015 in Maynooth, Greater Dublin, Ireland organized by the International Association for Development of the Information Society (IADIS) and co-organized by the Maynooth University. OCT 2015
The 14th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 29th July-1st Aug 2013, Bangalore, India JULY 2013
The 2nd International Conference on Human Computing, Education & Information Management System (ICHCEIMS 2013), June 17-18, 2013 in Sydney, Australia. JUN 2013
International Conference on Communication and Broadband Networking (ICCBN 2012), Phuket, Thailand supported by Universiti Putra Malaysia (UPM), and Universiti Teknologi MARA (UiTM). MAY 2012
No. Conference Conducted Information Month Year
Third International Conference on Computational Intelligence, Security & IoT, (ICCISIoT) 2020 Agartala, India, December 29–30, 2020. Proceedings published in Springer Communications in Computer and Information Science Vol-1358. DEC 2020
Second International Conference on Computational Intelligence, Security & IoT, (ICCISIoT) 2019 Agartala, India, December 13–14, 2019. Proceedings published in Springer Communications in Computer and Information Science Vol-1192. DEC 2019
International Conference on Computational Intelligence & IoT (ICCIIoT -2018) in collaboration with IAASSE during December 14 – 15 , 2018. DEC 2018
No. Patent Information Year
Dr. Munesh Chandra Trivedi, Dr. Nirmalya Kar and Dr. Harivans Pratap Singh. "Real-Time Face Recognition And Verification System”, Indian Patent, Status: Published. 2023
N Kar, S Das, S Deb and Udit M. "IoT Based Wearable Device for Monitoring of Vital Information", Indian Design Patent, Status: Design Accepted and Published, Design Number: 382360-001, Journal No is 21/2023 and Journal Date is 26/05/2023. Design Inforce up to : 27/03/2033 2023