Sunita Dhavale

Learn More
Smartphones today are ubiquitous source of sensitive information. Information leakage instances on the smartphones are on the rise because of exponential growth in smartphone market. Android is the most widely used operating system on smartphones. Many information flow tracking and information leakage detection techniques are developed on Android operating(More)
Militaries all over the world have always used the best of the latest technologies to win wars. Recently developed Cloud computing technology can also act as a force multiplier for military organisations due to its merits of economy, flexibility, expansibility and reliability. The critical concern of storing, maintaining and securing mission critical video(More)
Security and privacy of Smartphone data are critical requirements in case of both personal as well as corporate environment. Hence, there is a need to come up with an effective solution in order to address data leakage issues in smartphones. Generally, taint analysis techniques are used for information flow tracking and data leakage detection purpose.(More)
In recent times, the ease in availability and usability of digital video editing tools has become a major challenge to video forensic experts, to accurately authenticate any suspected digital video content. Besides, the wide range and rapid advancement in the field of such editing tools and improvements in anti-forensic techniques has enabled any(More)
— Digital communication has seen exponential growth in the past decade. Consequently, the security of digital data has become a field of extensive research since piracy and unauthorized use of such data is prevalent because of the ease with which data can be replicated or tampered. Visual Cryptography (VC) is a special cryptographic technique where(More)
  • 1