Shirshendu Hore

Shirshendu Hore

M.Tech,Assistant Professor

Computer Science

Teaching Experience :

8 yrs Research: 3 yrs Industry: 1 yrs

Research Interest:

Pattern based Data Authentication and Security , Biometric Authentication & Network Security

Teaching Interest:

Cloud Computing, Compiler Design,Object Technology, Database Management System, Web Technology, Software Engineering & UML, Data Structure, Network Security & Cryptography

Research Publications:

Research Publications:  Journal: 8 & Conference: 12 

Journal Publication: International: 08

  1. “A Novel Secured Data Encryption Technique using Session Key and Biometric Key”  was published in International Journal of Computational Intelligence and Information Security (IJCIIS) pages 42-47 ISSN: 1837-7823 Special Issue June 2010
  2. “A Novel Data Encryption Technique By Genetic Crossover Of Robust Biometric Key And Session Based Password”  was published in International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.2, March 2011 ISSN:0974-9330[Online] ;0975-2370[Print]
  3. “A Novel Data Encryption Technique by Genetic Crossover of  Robust Finger Print Based Key and Handwritten Signature Key “ was published in  IJCSI International Journal of Computer Science Issues, Vol. 8, Issue 5, No 2, pages  209-214  September 2011 ISSN (Online): 1694-0814
  4. “An Image Authentication Technique by Handwritten Signature Verification using DWT and ANN” Was published in International Journal of Computer Applications (IJCA), Volume 47 /Number, pages 35-40 21 June 2012 (ISBN: 973-93-80869-15-1)
  5. A Robust Medical Image Authentication Technique using QR Code and DWT Was published in International Journal of Computer Applications (IJCA), Volume 83 Number 16, December 2013 (ISSN:  0975 – 8887)

6)A Sustainable Medical Image Authentication Technique in Spatial Domain Using Multiple QR Code Was published in Int. Journal of Engineering Research and Applications ISSN: 2248-9622, Vol. 3, Issue 6, Nov-Dec 2013, pp.2042-2047

  1. Sixth Sense Technology: A Brief Literary Survey Was published in International Journal of Engineering Research & Technology (IJERT) Vol. 2 Issue 12, December. 2013,ISSN: 2278-0181
  2. A Semi-Fragile Blind Digital Watermarking Technique for Medical Image File Authentication using Stationary Wavelet Transformation” ,in International Journal of Computer Applications ,Volume 104, Number 11: pp.8-13, October 2014,doi 10.520/18245-9245

Conference Publications:  National: 04

  1. A “Advanced Power Database Management System ” was published in the proceedings of “National Conference on Modern Trends in Electrical Engineering (NCMTEE)” organized by IET(UK) and department of EE, HETC held in July, 09 at HETC
  2. “Sudoku Solving Algorithm A Brief survey” Was published in Recent Trends in Electrical, Electronics and Engineering Physics (RDE3P) Organized by MCKV Institution, Liluha, in association with IEEE Kolkata Section, IET Kolkata Network and IEE , ISBN “ 978-81-8424-877-7, PP-85-89 IET Kolkata Chapter , October 2013
  3. Quantum Cryptography A New Era in Modern CryptographyWas published in Second Michael Faraday India IET Summit Organized by Young People Association , IET Kolkata Network  ,Issue No-1 volume No-1 ; ISBN “ 978-81-8424-877-7, PP 33-34 , in 25th October 2013
  4. “Virtual Mouse using Object Recognition” Abstract was published in First Michael Faraday India IET Summit Organized by Young People Association , IET Kolkata Network  ,Issue No-1 volume No-1 ; Pages 33-34 , in 25th November 2012.


Conference Publications:  International: 08

  1. “A Novel Highly Secured Session Based Data Encryption Technique Using Robust Fingerprint Based Authentication” was published in Advances in
    Networks & Communications, CCSIT Part 2 (2011) pages 422-431, Springer
    ,Jan 2011
  2. “Stationary wavelet transform based audio authentication technique” was  published in “International Conference Proceedings Series(ICPS)”, Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology CCSEIT '12,Pages,575-579 ACM New York, NY, USA ©2012, ISBN: 978-1-4503-1310-0,25th October 2012
  3. “Gesture Based Application in Virtual Environment using Color Object Detection” was published in the Proceedings of ICA3 Organized by JIS College of Engineering, Kalyani  ,in association with  IEEE Kolkata Section , in 11th & 12th January 2013
  4. “Counting All Possible Simple Paths using Artificial Cell Division Mechanism for Directed Acyclic Graphs”.  In Proc. of the 9thINDIACom, INDIACom-2015, IEEE Conference ID: 35071, 2015 pp-1874-1879 ,IEEE ,print ISBN 978-9-3805-4415-1, INSPEC Accession Number: 15109988
  5.  “A Quality Prediction Method of Weight Lifting Activity “, Proceedings in Michael Faraday IET International Summit (MFIIS-2015) September 12-13, 2015, IET Digital Library
  6.  “Detection of Chronic Kidney Disease: A NN-GA based Approach”, Proceedings in CSI 50th Golden jubilee Annual convention, December 2-5 ,2015, Delhi, Springer
  7.  “Indian Sign Language Recognition using Optimized Neural Networks”, proceedings in, International Conferences on Information Technology and Intelligent Transportation system(ITITS), December 12-13 ,2015, Xian, china, Springer
  8.  “Optimized Forest Type Classification: A Machine Intelligence Approach “, Proceedings in Third International Conference on Information System Design and Intelligent Application (ANITS) India 2016, Visakhapatnam, Jan 9-10, 2016, Springer


  1.  “A Real Time Dactylology Based Features Extraction Technique”, Studies in Computational Intelligence, chapters in book: Image Feature Detectors Foundations, Innovations, and Applications” Editors: M. Hassaballah Studies Comp.Intelligence, Vol. 630, Mahmoud Hassaballah and Ali Ismail Awad (Eds): Image Feature Detectors And Descriptors, 978-3-319-28852-9, 329807_1_En (8) , Publisher:   Springer.




o Stood First in M.Tech University Examination[Gold Medalist].