Sunil Kumar Muttoo

Learn More
Theft or loss of a mobile device could be an information security risk as it can result in loss of con fidential personal data. Traditional cryptographic algorithms are not suitable for resource constrained and handheld devices. In this paper, we have developed an efficient and user friendly tool called “NCRYPT” on Android platform.(More)
Data hiding is an emerging field of research for secure data transmission over internet, ensuring ownership identification and copyright protection. A couple of techniques have been proposed based on pixel value differencing (PVD) and eight queens' solutions. In this paper, a new data hiding method based on inter-block difference in eight queen's solutions(More)
For the public usage, there are various utilities that exists and operates in many countries. Major utility are in the sector of Power, Gas and Water distribution. Their major role is to distribute the essentials to the customers and in turn provide Customer support and Billing system through offline and online mode. Most of them fall under government(More)
Grid computing is a high performance computing environment to solve larger scale computational demands. Grid computing contains resource management, task scheduling, security problems, information management and so on. Task scheduling in an important aspect of distributed computing. As grid computing is a form of distributed computing with heterogeneous(More)