BINDU MADAVI K P

@gitam.edu

Assistant Professor, Department of Computer Science and Engineering
GITAM University



                 

https://researchid.co/bindu

Seeking a challenging position to utilize my skills and abilities in the area of Teaching and education that offers professional growth while being resourceful, innovative, and flexible

EDUCATION

Ph.D. in Computer Science & Engineering, Sir MVIT, VTU,2022
Master of Technology in Computer Science passed out 2013 from SET, Jain University
Bachelor of Engineering in Information Science passed out 2010 from JVIT, VTU

RESEARCH INTERESTS

Cloud Computing, Cryptography, Deep Learning

12

Scopus Publications

31

Scholar Citations

3

Scholar h-index

1

Scholar i10-index

Scopus Publications

  • Quantum cryptography: An in-depth exploration of principles and techniques
    Sowjanya K. Krishna and Madavi K. P. Bindu

    CRC Press


  • Game Theory in the Metaverse: Strategies, Interactions, and Implications
    Renuka R. Patil, B N Chaithanya, Vamsidhar Yendapalli, K P Bindu Madavi, and K Geetha

    CRC Press

  • Security and Privacy Issues in Cloud and IoT Technology and Their Countermeasures
    K. P. Bindu Madavi, Panditi Neelaveni, Pujari Rakesh, and Singamsetty Asish

    Springer Nature Singapore

  • Credit Card Fraud Detection Using Big Data Analytics and Machine Learning
    K P Bindu Madavi and K Krishna Sowjanya

    CRC Press


  • DeepKidney: Multiclass Classification of Kidney Stones, Cysts, Tumors, and Normal Cases Using Convolutional Neural Networks
    Krishna Sowjanya K, Bindu Madavi K P, Neha Patwari, and Shobharani D A

    IEEE
    Accurately classifying kidney diseases, such as stones, cysts, tumors, and normal cases, is vital in effective diagnosis and treatment planning. A method for multi class classification of kidney conditions using Convolutional Neural Networks (CNNs) is proposed in this paper. The main aim is to develop a system, termed DeepKidney, that can accurately classify medical imaging data automatically. This study focuses on the multiclass classification of kidney stones, cysts, tumors, and normal cases using CNNs. We propose a novel approach called DeepKidney, which utilizes CNNs to analyze medical imaging data and extract relevant features for classification. A large and diverse dataset comprising kidney images representing different conditions is used for training the CNN model. DeepKidney aims to achieve high classification accuracy and improve diagnostic outcomes. This approach provides a comprehensive solution for distinguishing between different kidney conditions, aiding in precise diagnoses. DeepKidney's implementation has the potential to increase kidney disease classification's precision and effectiveness, resulting in better patient outcomes and less work for medical professionals.

  • Sequential Computational Time-Released Encryption Technique Using Variable Time Delay
    Krishna Sowjanya K, Bindu Madavi K P, Neha Patwari, Shobharani D A, and Manju V N

    IEEE
    Time-released encryption (TRE) is a cryptographic technique that enables encrypted data to be automatically decrypted or made accessible after a certain period of time. The receiver is usually made known the decryption time or release time of the encrypted text. TRE uses a time delay between encryption and decryption to provide an additional layer of security. TRE produces a higher level of security when combined with other cryptographic algorithms. In this paper, the process of encryption and decryption of plain text is performed with the help of the Sequential computation technique of the TRE algorithm along with sender-induced time delay. An additional layer of security is also added by combining the TRE algorithm with two traditional algorithms i.e; RSA and RSA-OAEP to provide security for the data. Both methods are compared and the results are shown accordingly.

  • Embedded Light-Weight Cryptography Technique to Preserve Privacy of Healthcare Wearable IoT Device Data
    Bindu Madavi K P, Krishna Sowjanya K, and Neha Patwari

    IEEE
    Internet of Things (IoT) technology is widely applied in various domains such as agriculture, health, business, etc. IoT devices mainly deal with collecting sensory data and communicating with each other with the help of the Internet. The dependability on the Internet has made these IoT devices more vulnerable to attacks done by third-party users. To ensure privacy, security, and confidentiality for the data generated by these IoT devices, there is a need for cryptographic techniques. Light-Weight Cryptography (LWC) is the most commonly used cryptographic technique to ensure security for the data generated by IoT devices. The LWC techniques consume less power for computation and are most suitable for IoT devices as they have limited capacity in terms of memory and power. This paper proposes an LWC technique for healthcare Wearable IoT device data. In the proposed method, the plain text size is 64 bits which combine the IoT-generated data, i.e., Step count, BP level, Heart rate, etc., into a single plaintext and encrypts the same. The proposed method’s performance is better than the Present LWC technique as it reduces the time for encryption and decryption.

  • Enhanced Cloud Security using Cryptography and Steganography Techniques
    K P Bindu Madavi and P. Vijaya Karthick

    IEEE
    Data security is a key concern for organizations considering a transfer of their on-premises applications to the cloud. Organizations must shift their security controls from historical perimeter and detection-based technologies to a focus on establishing enhanced protection at the application and data levels to ensure the confidentiality, integrity, and availability of these various systems and datasets. Data integrity is a critical component of cloud data security, preventing unauthorized alteration or removal and guaranteeing that data stays as it was when it was initially uploaded. This article presents a compacting with steganography technique which is used to hide data with substantial security and also perfect invisibility while utilizing a combination of DES, AES, and RC4 encryption methods. The objective of this study is to provide data security using steganography with the Least Significant Bit (LSB) Algorithm and Hybrid Encryption that encrypts user input and conceals it in an image file to provide the highest level of security for messages sent and received.

  • Decoy technique for preserving the privacy in fog computing
    K. P. Bindu Madavi and P. Vijayakarthick

    Springer Singapore


RECENT SCHOLAR PUBLICATIONS

  • Quantum cryptography
    K Krishna Sowjanya, BM KP
    Next Generation Mechanisms for Data Encryption, 93 2025

  • Preventive Health Care System for Early Heart Disease Detection Using IoT and Machine Learning
    KK Sowjanya, KPB Madavi
    Revolutionizing Healthcare: AI Integration with IoT for Enhanced Patient 2024

  • DNA-Based Secure Image Transmission Framework Using Encryption and LSB Steganography
    KPB Madavi, KK Sowjanya
    Revolutionizing Healthcare: AI Integration with IoT for Enhanced Patient 2024

  • Security and privacy issues in cloud and IoT technology and their countermeasures
    KP Bindu Madavi, P Neelaveni, P Rakesh, S Asish
    Communication technologies and security challenges in IoT: Present and 2024

  • 14 Credit Card Fraud
    DUB Data, KPB Madavi, KK Sowjanya
    Big Data Computing: Advances in Technologies, Methodologies, and 2024

  • 2 Large-Scale Data Processing in Cloud Computing Environment
    KK Sowjanya, KPB Madavi
    Big Data Computing: Advances in Technologies, Methodologies, and 2024

  • Credit Card Fraud Detection Using Big Data Analytics and Machine Learning
    KPB Madavi, KK Sowjanya
    Big Data Computing, 266-280 2024

  • SYSTEM AND METHOD FOR BIOMEDICAL DATA CLUSTERING
    DSG Dr. Tanvir Habib Sardar,Dr. Showkat A.Dar , Dr. Bindu Madavi K P ,Dr ...
    IN Patent 202,341,076,534 A 2023

  • DeepKidney: Multiclass Classification of Kidney Stones, Cysts, Tumors, and Normal Cases Using Convolutional Neural Networks
    BM KP, N Patwari, DA Shobharani
    2023 4th International Conference on Communication, Computing and Industry 6 2023

  • Sequential Computational Time-Released Encryption Technique Using Variable Time Delay
    BM KP, N Patwari, DA Shobharani, VN Manju
    2023 14th International Conference on Computing Communication and Networking 2023

  • Preserving the Privacy of Wearable IoT Device Data Using Blockchain
    KPBMGTKK Sowjanya
    Blockchain Applications in Cybersecurity Solutions 1, 97-116 2023

  • Embedded light-weight cryptography technique to preserve privacy of healthcare wearable IoT device data
    BM KP, N Patwari
    2023 International Conference on Distributed Computing and Electrical 2023

  • Uncovered Manhole Detection and Alert System on Roads During Rainfall
    DRBMKP KRISHNA SOWJANYA K ,DR. V N MANJU,CMRIT INSTITUTE OF TECHNOLOGY,NEHA ...
    IN Patent 202,241,050,160 2023

  • Analysis of Security Challenges and Threats in Social Network and Cloud Computing
    KPB Madavi, P Vijayakarthik
    Cloud and Fog Computing Platforms for Internet of Things, 143-155 2022

  • Enhanced cloud security using cryptography and steganography techniques
    KPB Madavi, PV Karthick
    2021 International Conference on Disruptive Technologies for Multi 2021

  • Tribrid Secure Encryption Technique to Protect the data in the Cloud
    KP BinduMadavi, P Vijayakarthick, S Dhanasekaran, SN Sheshappa
    Design Engineering, 7423-7433 2021

  • AUTO SCALING OF WEB APPLICATION
    K Vaishali, T Lakshmi Supraja, MM Krupashree, U Manjari, BM KP
    Advance and Innovative Research, 113 2021

  • A Comparison of Data Encryption Algorithm’s Performance in Cloud
    BM K P
    International Journal of Advanced Research Trends in Engineering and 2021

  • A Homomorphic Encryption for Preserving the Privacy of Data: Wearable IoT Devices
    BMKP Krishna Sowjanya K
    Indian Journal of Natural Sciences 12 (67), 33438-33444 2021

  • A Novel Lightweight Cloud Storage Examinee with De-Duplication Authorizing Secure Protection with Hybrid Encryption
    Bindu Madavi K P, Akanksha Kumari, Gitoshri Bera, Shashwat Balajee, Tenzin ...
    Indian Journal of Natural Sciences 12 (67), 33457-33463 2021

MOST CITED SCHOLAR PUBLICATIONS

  • Enhanced cloud security using cryptography and steganography techniques
    KPB Madavi, PV Karthick
    2021 International Conference on Disruptive Technologies for Multi 2021
    Citations: 12

  • Embedded light-weight cryptography technique to preserve privacy of healthcare wearable IoT device data
    BM KP, N Patwari
    2023 International Conference on Distributed Computing and Electrical 2023
    Citations: 5

  • Decoy technique for preserving the privacy in fog computing
    KP Bindu Madavi, P Vijayakarthick
    Evolutionary Computing and Mobile Sustainable Networks: Proceedings of 2021
    Citations: 5

  • DeepKidney: Multiclass Classification of Kidney Stones, Cysts, Tumors, and Normal Cases Using Convolutional Neural Networks
    BM KP, N Patwari, DA Shobharani
    2023 4th International Conference on Communication, Computing and Industry 6 2023
    Citations: 3

  • Preventive Health Care System for Early Heart Disease Detection Using IoT and Machine Learning
    KK Sowjanya, KPB Madavi
    Revolutionizing Healthcare: AI Integration with IoT for Enhanced Patient 2024
    Citations: 2

  • Security and privacy issues in cloud and IoT technology and their countermeasures
    KP Bindu Madavi, P Neelaveni, P Rakesh, S Asish
    Communication technologies and security challenges in IoT: Present and 2024
    Citations: 1

  • 14 Credit Card Fraud
    DUB Data, KPB Madavi, KK Sowjanya
    Big Data Computing: Advances in Technologies, Methodologies, and 2024
    Citations: 1

  • Credit Card Fraud Detection Using Big Data Analytics and Machine Learning
    KPB Madavi, KK Sowjanya
    Big Data Computing, 266-280 2024
    Citations: 1

  • Preserving the Privacy of Wearable IoT Device Data Using Blockchain
    KPBMGTKK Sowjanya
    Blockchain Applications in Cybersecurity Solutions 1, 97-116 2023
    Citations: 1