I am an aspiring Artificial Intelligence professional with a Master's degree from Northeastern University, holding a 4.00 GPA and deep expertise in machine learning, natural language processing, and reinforcement learning. With diverse work experience across industries—from developing AI-driven solutions at Ribbon Communications and Universal Music Group to contributing to machine learning research at Northeastern—I bring a unique combination of technical proficiency and creative problem-solving. My technical arsenal includes Python, cloud platforms, and an array of tools like Keras, PyTorch, and Langchain. My passion lies in building data-driven solutions that deliver tangible business impact.
MS in Artificial Intelligence
B.E. in Computer Engineering
Data Scientist
Data Science and Machine Learning Intern
Data Science Analyst Intern
Graduate Machine Learning Research Assistant
Analyst, Software Developer
Published in: ITM Web of Conferences 32, 03009 (2020)
Abstract: One of the important application of image encryption is storing confidential and important images on a local device or a database in such a way that only the authorized party can view or perceive it. The current image encryption technique employs the genetic algorithm to increase confusion in the image, but compromises in time and space complexity. The other method employs chaos or pseudo random number generating systems which have fast and highly sensitive keys but fails to make the image sufficiently noisy and is risky due to its deterministic nature. We propose a technique which employs the non-deterministic, optimizing power of genetic algorithm and the space efficiency and key sensitivity of chaotic systems into a unified, efficient algorithm which will retain the merits of both the methods whereas tries to minimize their demerits in a software system. The encryption process proceeds in two steps, generating two keys. First, an encryption sequence is generated using Lorenz Chaotic system of differential equation. The seed values used are the user’s actual key having key sensitivity of 10-14. Second, the encrypted image’s genetic encryption sequence is generated which will result in an encrypted image with entropy value greater than 7.999 thus ensuring the image is very noisy. Proposed technique uses variations of Lorenz system seed sets to generate all random mutations and candidate solutions in Genetic encryption. Since only the seed sets leading to desired solution is stored, space efficiency is higher compared to storing the entire sequences. Using this image encryption technique we will ensure that the images are hidden securely under two layers of security, one chaotic and other non-deterministic.
Link to Publication: View Publication
36 Egremont st
Unit 212
Brighton, MA 02135
ghosh.anu@northeastern.edu
+1 857-540-6982