SHIVANI PANDEY

@iimtu.edu.in

Assistant Professor, CSE, SET,
IIMT UNIVERSITY, MEERUT,UP



              

https://researchid.co/p_shivani9

RESEARCH INTERESTS

BLOCKCHAIN, SECURITY

4

Scopus Publications

11

Scholar Citations

2

Scholar h-index

Scopus Publications

  • Implemented Model for CNN Facial Expressions: Emotion Recognition
    Pratik Singh, Shivani Pandey, Aditi Sharma, Archana, and Tanaya Gupta

    IEEE
    By aggregating real and active expressions and motions, the proposed paper obtains useful results that can provide any beneficial result to the useful concept so that the dynamic part of the incoming expression is in the picture in front. This article is able to identify the various manifestations with dynamic platform and then design for the subsequent action as per the situation. The situation has been realized by the natural environment and of course a number of techniques have been produced in many articles and the latest implemented graphs, which are capable of taking images as input values of the running system. Now, a live video is playing in place of the saved images and an objective has been created to achieve accuracy in the result as live video is usually described as a realistic expression of the active object. In a broad sense, the video mainly conveys a varied expression of inner emotion as several changes have been considered at a time to make this research article very functional for others by recognizing the active environment for the current screenplay. In this paper a Convolutional Neural Network (CNN) model is implemented with Python programming for better analysis with different expressions and shows the analysis by comparison with existing techniques.

  • A Robust and Secure Image to Multi-Images Steganography
    Pratik Singh, Shivani Pandey, Priya Kumari, Alok Singh Chauhan, and Prashant Tomer

    IEEE
    With the enhancement in technology sharing of information in different forms like text, images or videos is being adopted worldwide. But this sharing of information also led to cybercrime, to overcome this image steganography approach has been widely used in which messages in the form of text, image or video can be enclosed within another image which will be invisible to other users. This research paper proposed an enhanced method of image steganography by concealing the secret image within several cover images, each of which conceals a portion of the secret image that has already been encrypted with a key. By partially blending into these cover images, secret images can be transmitted through comparable or other open channels more reliably and securely.

  • Advanced Steganography: Key Pairing
    Pratik Singh, Nidhi Bansal, Shivani Pandey, and Priya Kumari

    Springer Nature Singapore

  • Intelligent Extension with Smart Connections using Bluetooth with IoT
    Nidhi Bansal, Khel Prakash Jayant, Pratik Singh, and Shivani Pandey

    IEEE
    Wise work is always appropriate to achieve the comfort and ease of working style of life. Through low energy consumption, smart communication can make the campus useful to all living people. By achieving higher goals and improving in a more comprehensive way, results can be achieved from a customized level. With the core concepts of Bluetooth, IoT came in various faces to underline different results with various improvements. With the advancement of technology and advanced IoT networks, the range and capacity of communication channels are becoming very wide, and the ability to communicate with each other within their range also comes into consideration. Without using the Internet, the proposed paper shows a wide range model via a limited range of Bluetooth to extend the direct communication of IoT devices over a wide area without any loss in data and network connections. Extensive communication is offered through many Bluetooth-based IoT devices that act as slaves and communicate via their master Bluetooth which acts as a central device and Bluetooth for all other areas Devices are working. The entire network area will be divided into areas monitored by Masters Bluetooth devices that enable communication between different regions with extended range. Moves from one device to another and moves it to the active phase.

RECENT SCHOLAR PUBLICATIONS

  • Towards Securing the Digital Document Using Blockchain Technology with Off-Chain Attribute Based Encryption Framework
    S Pandey, V Rishiwal, DS Jat, P Yadav, M Yadav, A Jain
    2024 International Conference on Emerging Trends in Networks and Computer 2024

  • Implemented Model for CNN Facial Expressions: Emotion Recognition
    P Singh, S Pandey, A Sharma, T Gupta
    2023 International Conference on Sustainable Emerging Innovations in 2023

  • A Robust and Secure Image to Multi-Images Steganography
    P Singh, S Pandey, P Kumari, AS Chauhan, P Tomer
    2023 IEEE International Conference on Contemporary Computing and 2023

  • Advanced Steganography: Key Pairing
    P Singh, N Bansal, S Pandey, P Kumari
    ICT Systems and Sustainability: Proceedings of ICT4SD 2022, 153-160 2022

  • Low Priority Cluster Based TDMA Protocol For VANET: Vehicle's Communication Scenario.
    S Pandey, N Bansal, Y Masud
    Journal of Information Assurance & Security 17 (1) 2022

  • Intelligent extension with smart connections using Bluetooth with IoT
    N Bansal, KP Jayant, P Singh, S Pandey
    2021 5th International Conference on Trends in Electronics and Informatics 2021

  • An Effective TDMA Based Routing for VANET to Reduce Delay
    S Pandey, A Kumar


MOST CITED SCHOLAR PUBLICATIONS

  • Intelligent extension with smart connections using Bluetooth with IoT
    N Bansal, KP Jayant, P Singh, S Pandey
    2021 5th International Conference on Trends in Electronics and Informatics 2021
    Citations: 7

  • Implemented Model for CNN Facial Expressions: Emotion Recognition
    P Singh, S Pandey, A Sharma, T Gupta
    2023 International Conference on Sustainable Emerging Innovations in 2023
    Citations: 2

  • Low Priority Cluster Based TDMA Protocol For VANET: Vehicle's Communication Scenario.
    S Pandey, N Bansal, Y Masud
    Journal of Information Assurance & Security 17 (1) 2022
    Citations: 2