Académique Documents
Professionnel Documents
Culture Documents
Banking Technology
Explore, Enable, Excel (Established by Reserve Bank of India)
01
Explore, Enable, Excel
CAOs come together for the Inaugural CAO Forum Meet at IDRBT
02
Explore, Enable, Excel
th
12 IDRBT Banking Technology
IMPACT
Excellence Awards 2015-16
T HE Twelfth edition of the IDRBT Banking
Technology Excellence Awards was held on July 18,
2016. Dr. Raghuram G. Rajan, Governor, Reserve Bank of
focused attention on Mobile Banking, the second
issue dealt with Payment Systems
India, and Visitor, IDRBT was the Chief Guest. He was Organizing the IDRBT Banking Application
joined by Shri R. Gandhi, Deputy Governor, Reserve Contest on April 11, 2016 and the RBI- sponsored
Bank of India, and Chairman, IDRBT. Payment System Innovation Contest on June 24,
Dr. A.S. Ramasastri, Director, IDRBT, extended a warm 2016
welcome to all the distinguished dignitaries and focused Inaugurating the IDRBT BankTech Museum on
attention on the recent achievements of the Institute April 24, 2016.
including:
Shri R. Gandhi, Deputy Governor, RBI and Chairman,
Signing MoUs with NIT, Warangal and NIT, Trichy, IDRBT, presented the Opening Remarks, highlighting
for full-time Ph. D. programmes focusing on the following:
Banking Technology
Banking and nance are eminently suitable,
Re g u l a r l y o r g a n i z i n g r e p u t e d r e s e a r c h co n t i n u o u s , i n n ov a t i ve a p p l i c a t i o n s o f
conferences with the Fifth International technology
Conference on Fuzzy and Neural Computing
(FANCCO), organized in December 2015 and the The ever-increasing volume of transactions and
International Conference on Distributed the ever-changing customer expectations are the
Computing and Networking (ICDCN), being key dierentiating drivers for leveraging better
organized in January 2017 technology
Launching the full-time one-year Post Graduate Reserve Bank has now constituted a Working
Diploma in Banking Technology (PGDBT), with Group on Financial Technology, to fully
the rst batch commencing from July 04, 2016 understand the new paradigm of FinTech and to
chart out the best way of using it
Setting up two new Research Centres on Cloud
Computing and Payment Systems Technology has thrown challenges and the
following ve need special attention:
Starting the bi-annual IDRBT Sta Paper Series on
issues of critical relevance to the Indian Banking w Cyber Security: IT systems of banks are the
and Financial Sector. While the inaugural issue prime target for cyber crimes. For safe and
Dr. Raghuram G Rajan, Governor, RBI and Shri R. Gandhi, Deputy Governor, RBI with Dr. A. S. Ramasastri, Director, IDRBT
during the 12 IDRBT Banking Technology Awards function
03
EVENT secure banking, providing safe IT systems are Non-bank entities are providing innovative
Explore, Enable, Excel
undeniable requirements. The role of the payment products and services, forcing banks to
Chief Information Security Ocer assumes reect upon their strategy to compete or to
importance, especially in keeping continued collaborate
vigilance and warranting concerted proactive
Desirable Features of Payment Systems:
protective actions
w Our regulations governing payment systems
w New Technologies: Cloud based computing,
have to be ownership, institution, and
blockchain processing technologies and
technology-neutral to encourage the most
virtualization of IT systems are a few examples
ecient outcomes
which hold potential for being used in a big way
w First, being more open to experimentation at
w FinTech Companies: The techies have now
the early stages of a product or method of
grown as FinTech companies and are
service will be cleared in the peer-to-peer
emerging as direct competitors. Technology
lending regulations and the need to be more
has dissected the entire value chain of
conscious of the risks to stability as innovations
banking and nance and bundled out the
catch on and expand. This phased approach is
chunks in innovative ways i.e., they who
now being called the sand-box approach
intermediate between savers and investors, or
elsewhere
between sender and receiver of funds.
Therefore, banks have to nd ways to co- w Second preference would be given to
operate, co-opt and compete with FinTech payment platforms that oer broad based
companies access, rather than that limit access
w Payment Revolution: New initiatives in w Third payment mechanisms should be cheap
payment systems need to aim at providing and scalable, so that they are suited to our
better customer comfort and ensure that the economy where ticket sizes are small but
systems are safe, thus, resulting in the overall transaction volumes huge
eciencies including reduced costs to the
w Fourth need for systems that oer security
common man
even to the unsophisticated user, which
w Varied Choices of Technology for Financial requires greater emphasis on transaction
Inclusion: Financial Inclusion is an achievable monitoring and identication of suspicious
reality, and the role of IT is very signicant and patterns by the system operator
fundamental. Integrating account opening
w Fifth need for an eective process of
and KYC related requirements with other
consumer redressal that allows speedy and
systems such as Aadhaar, allowing use of
fair resolution of customer complaints.
funds without actual movement of cash, and
ensuring that the common persons have Ro l e s a n d Re s p o n s i b i l i t i e s o f B a n k s
access to banking and nancial services at Challenges
their doorsteps are key steps forward.
w Does the bank's vision and strategy take into
Dr. Raghuram G. Rajan, Governor, Reserve Bank of account payment services aspects? Are there
India, and Visitor, IDRBT, delivered the Keynote Address adequate human resources to project
on this special occasion and turned the spotlight on the requirements and implement them?
following:
w Adopting technology is more than
Payment Systems are the plumbing of the automation cal ling for eor ts at re-
nancial system. The Reserve Bank, as the engineering business processes. There has to
regulator of payment and settlement systems, be a conscious evaluation of process
aims to ensure easy accessibility and interoperability dependencies taking into account customer
of the payment infrastructure, while ensuring experience, security issues, etc., besides
safety and security of transactions having a long term view of the developments
04
Explore, Enable, Excel
th
Winners of 12 IDRBT Banking Technology Excellence Awards 2015-16, with the Governor, Deputy Governor, RBI and Director, IDRBT
05
EVENT Explore, Enable, Excel
Dr. Raghuram G. Rajan, presented the IDRBT Banking Technology Excellence Awards for the year 2015 16, at a very
special function at IDRBT and the winners were:
Best Bank Award for Analytics and Big Data among Large Banks ICICI Bank Ltd.
Best Bank Award for Digital Banking among Large Banks State Bank of India
Best Bank Award for Digital Banking among Mid-Size Banks Andhra Bank
Best Bank Award for Digital Banking among Small Banks The Karur Vysya Bank Ltd.
Best Bank Award for Electronic Payments among Large Banks Bank of India
Best Bank Award for Electronic Payments among Mid-Size Banks Vijaya Bank
Best Bank Award for Electronic Payments among Small Banks South Indian Bank Ltd.
Best Bank Award for Use of Technology for Fraud Prevention and NPA Management HDFC Bank Ltd.
among Large Banks
Best Bank Award for Managing IT Ecosystem among Large Banks Bank of India
Best Bank Award for Managing IT Ecosystem among Mid-Size Banks Andhra Bank
Best Bank Award for Managing IT Ecosystem among Small Banks The Karur Vysya Bank Ltd.
Best Bank Award for Cyber Defence among Large Banks ICICI Bank Ltd.
Best Bank Award for Cyber Defence among Mid-Size Banks Yes Bank Ltd.
Best Bank Award for Cyber Defence among Small Banks RBL Bank Ltd.
Best Bank Award for Innovative Use of Technology among Large Banks State Bank of India
Best Bank Award for Innovative Use of Technology among Mid-Size Banks State Bank of Hyderabad
Best Bank Award for Innovative Use of Technology among Small Banks IndusInd Bank Ltd.
Best Bank Award for Best IT-Enabled Regional Rural Bank Andhra Pradesh Grameena Vikas
Bank
Special Mention for IT-Enabled Co-operative Bank The Karad Urban Co-operative Bank
Ltd.
Dr. Y. V. Reddy, Former Governor, Reserve Bank of India, the top management of the Reserve Bank of India and the
Indian Banking Sector including Managing Director & CEOs, CIOs and IT Chiefs of Public, Private and Foreign Banks
participated in this special function at IDRBT, Hyderabad.
06
Explore, Enable, Excel
EXECUTIVE
Seminar on Banking Technology for Directors on Bank Boards
07
Explore, Enable, Excel
PROGRAMMES
Fifth International Programme on Information Assurance & Management
08
Explore, Enable, Excel
09
Explore, Enable, Excel
FORUMS
Meeting on November 24-25, 2016
Shri Gopal Murli Bhagat, Executive Director,
Corporation Bank, welcomed the Forum
The Director, IDRBT set the agenda for
deliberation on following key points: Recent card
data compromise in India; setting up task force
for major security breaches to ensure that the
escalation of frauds do not take place; measures
to increase usefulness of IB-CART to banks; VAPT
for IB-CART; empanelment of Security Auditors
with the help of CISO Forum Shri Bharat Panchal, NPCI explained the case of
Shri Anjibabu, Corporation Bank, shared his views card data compromise in detail
on Onion Layered Security Incidents and Shri Babu K., RSA, discussed about advanced
emphasised on the importance of studying the machine learning capabilities to identify
pattern of logs to detect anomalies and to potential threats
conduct proper root-cause analysis of the events
in this context Shri Tarique Ansari, Palo Alto Networks,
explained the modus operandi of few recent
Prof. B. M. Mehtre, Professor, IDRBT, presented a malware attacks
th
summary report of the 7 Cyber Drill
Shri Kunal Pande, KPMG highlighted the
Dr. Rajarshi Pal, Assistant Professor, IDRBT, importance of following points in the context of
presented the latest developments of IB-CART recent cyber-attacks threat intelligence, cyber
Shri V. S. Mahesh, AGM, IDRBT presented security drills, establishing baseline, appropriate
information about recent card data compromise management oversight and team, adequate and
in India and highlighted the importance of the properly deployed technology, Intelligent and
following proper auditing of ATMs and quick response capability
switches; protection of ATMs from malwares and CISOs suggested that IDRBT share the list of tools
skimming devices; vigilance on sta members capable of successfully detecting cyber attacks
who handle critical infrastructure and also deliver selected crucial information
through SMS
CISOs from 34 banks attended the meet.
10
Explore, Enable, Excel
5 Predicting Amendments via Right to Information Query Analysis Nayantara Kotoky IIT Guwahati
6 Renarrating Web for Better Web Accessibility Gollapudi VRJ Sai Prasad IIIT Hyderabad
11
Explore, Enable, Excel
RESEARCH
And the Winners were:
A Joint First-Second Prize was shared among three
research scholars which carried a reward of Rs. 50, 000/-
and a citation each.
Mr. Ajoy Mondal, Indian Statistical Institute,
Kolkata, for his contribution entitled Object
Tr a c k i n g i n C o m p l e x E n v i r o n m e n t l i k e
Camouage and Occlusion
Inaugural Address by Prof. Chin-Teng Lin
Mr. Earnest Paul Ijjina, Indian Institute of
Awards and Evaluation Technology Hyderabad for his contribution
The Jury for the Sixth IDRBT Doctoral Colloquium entitled Classication of Human Actions Using
consisted of: Pose-based Features and Stacked Auto Encoder
Prof. Shalabh Bhatnagar, Indian Institute of Mr. Suvam Mukherjee, Indian Institute of
Science, Bangalore Science Bangalore, for his contribution entitled
Keep it Concurrent and Correct".
Prof. Bala Subramanian, Indian Institute of
Technology, Roorkee Third Prize: Mr. Samrat Gupta, Indian Institute of
Management, Lucknow, for his contribution entitled A
Prof. Panduranga Rao, Indian Institute of Rough Set Approach to Find Cohesive Subgroups in
Technology, Hyderabad. rd
Financial Credit Networks. The 3 prize carried a reward
The Jury evaluated the paper presentations on the of INR 35,000/- a citation.
parameters of Originality, Depth of Work (Modelling, The Colloquium , now emerging as the preferred
Design, Experimentation, Results), Technical Content platform for technology researchers in India to
(Models, Optimization, Technologies, Analysis), demonstrate and discuss their research ideas and get
Presentation (PPTs, Graphs, Explanations, Language, invaluable feedback, was coordinated by Dr. N. V.
Clarity), Relevance (Applicability, Modernism) and Narendra Kumar and Dr. Nagesh. S. Bhattu, Faculty,
Correctness of Work (Correct, Complete, Gaps). IDRBT.
Winners of the Sixth IDC along with the Jury, Director, IDRBT and Colloquium Coordinators
12
Explore, Enable, Excel
13
Explore, Enable, Excel
PUBLICATIONS
Book on Banking Technology in
India: Present Status and
Future Trends
F OR over a decade, the Institute has been evaluating
and presenting the IDRBT Banking Technology
Excellence Awards. In the process, we have been closely
watching the developments in the adoption of
technology by banks and attempting to share insights
with all by bringing out a book every year. Workshop on Application of
We enhanced the book last year by publishing invited Blockchain Technology in
articles from banking professionals, in addition to the
status of technology adoption based on the information Banking and Finance
furnished by the banks as part of the awards process.
While continuing the invited articles and the status of
the technology adoption; this year, we have included a
T HE Institute is working in the area of blockchain
technology so as to explore the possibilities of its
adoption in banking, payments and other nancial
section by the Knowledge Partner for this year's Banking
applications. Taking forward this work, the Institute
Technology Awards, Deloitte, on what they see as future
organized a one-day Workshop on Application of
trends in Banking Technology.
Blockchain Technology in Banking and Financial Sector
The book, containing contributions from the top on August 19, 2016.
management of Indian Banks' Association, Indian
Senior ocials from RBI, NPCI, CCIL, IBA and banks
Institute of Banking and Finance, IT Heads of seven
along with experts from academia and industry
Public and Private Sector Banks, a Foreign Bank, the
participated and deliberated on the implementation
Knowledge Partner, Deloitte, and a section on IDRBT
strategies, concerns, issues and use-cases of blockchain
Banking Technology Excellence Awards 2015 2016:
technology in the Banking and Financial Sector.
Who won and why?, is evolving into a useful document
detailing the present status and dwelling on future While Dr. Sourav Sen Gupta from Indian Statistical
trends in Banking Technology in India, with glimpses of Institute focused attention on the principles of
global scenario. Blockchain Technology; Shri Deepak Hoshing of Infosys,
presented use cases on storing documents on
Dr. Raghuram G. Rajan released the Book on Banking
Blockchain and Dr. Dilip Krishnaswamy, IBM Research
Technology in India: Present Status & Future Trends on
Labs, spoke on Hyperledger an open source project on
July 18, 2016.
a BCT platform.
Towards the end of the workshop, a Working Group with
representatives from RBI, IDRBT, ISI, NPCI, CCIL, IBA
and a few banks & IT companies was formed to prepare a
white paper on application of Blockchain Technology in
relevant areas of banking and nance in India. The white
paper is expected to be released in January 2017. It was
also agreed to conduct a PoC with active participation
from IDRBT, NPCI and a few banks.
The next two workshops on Blockchain Technology are
Dr. Raghuram G. Rajan releasing the Book on Banking scheduled during January 2-4, 2017 along with IIT
Technology in India: Present Status and Future Trends Bombay and on January 7, 2017 as part of ICDCN 2017.
14
Explore, Enable, Excel
15
Explore, Enable, Excel
GENNEXT Deliverables
We tested and analyzed Zeus toolkit and Snort IDS for
botnet detection. The performance of Snort IDS was
evaluated on CTU-13 datasets. The CTU-13 contains 13
datasets of dierent botnets. The overall eciency of the
Objectives present Snort rules for botnet detection is 70% for all
For data analysis, bankers would require in-depth datasets, but for some datasets like BOTNET-44, 47, and
knowledge of programming languages to 49 is very less. The Snort rules are revised and tested on
implement data analysis algorithms for huge data the same datasets. These revised rules contain the new
To develop a GUI for R language users in banking
botnet signatures that was not present in old Snort rules.
technology with basic knowledge of statistics and Because of the addition of new signatures, the botnet
no knowledge of programming languages. detection eciency improved up to 80% and was a
signicant improvement in datasets like BOTNET 44, 47
Deliverables and 49.
A GUI for R users in the banking domain, which is
free from any programming Anti-Forensics Analysis of File Wiping Tools
The GUI has been included with the basic data
mining tasks like basic Classication Techniques, K-
means Clustering, Association Rule Mining,
Multiple Linear Regression. Narendra Panwar
MS (Cyber Security) Final Year
Botnet Detection Tools and Techniques: A Review Sardar Patel University of Police Security
and Criminal Justice, Jodhpur
Guide: Dr. B. M. Mehtre
Description
Kanchan Bhale This study deals with the scope of Anti-Forensics (AF)
Summer Research Fellowship tools and verication of three Anti-Forensics File Wiping
Indian Academy of Sciences, Bangalore Tools. Anti-Forensics is a collection of tools and
Guide: Dr. B. M. Mehtre techniques to counter the forensics process and to
frustrate the forensics investigation. Anti-Forensics tools
Description are either used for privacy or to avoid forensics
Botnet detection techniques are broadly based on either investigation. In this research, we have tested three AF
setting up of a honeypot to collect bot binaries or le wiping tools namely, Eraser, File Shredder and R-
developing intrusion detection system IDS. The IDS Wipe and Clean and examined the Anti-Forensics
identies botnet trac by monitoring network and qualities of these tools.
system logs. It can be based on anomaly behavior or Objectives
signature or DNS. The NetFlow analyzer is a popular tool
for detecting botnet anomaly based detection. The Snort, To identify whether Eraser, File Shredder and R-Wipe
Suricata, ntop and BotHunter are the other tools which and Clean tools are better Anti-Forensics tools or not,
are based on signatures of botnet. The DNS based botnet and to nd out les artifact after wiping the les using
trac is monitored by Wireshark. The BotMiner tool uses these tools.
clustering algorithm to detect botnet. Zeus toolkit is Deliverables
popular among hackers' community for analysis of
All the three tools which we have tested are not
botnet internals.
entirely AF, they leave some le related artifacts in
Objectives the system
To analyze and test botnet detection tools and
techniques.
16
Explore, Enable, Excel
Description
Collecting Threat Intelligence from Tor
The popularity of Security Apps has increased the
dependency of the users on these apps. Essentially,
Security Apps claim complete protection for the devices
Tarun Trivedi on par with traditional PC Security Tools. This study
MS (Cyber Security) Final Year evaluates Security Apps to validate their claims against
Sardar Patel University of Police well-known OS-level vulnerabilities on dierent Android
Security and Criminal Justice, Jodhpur OS versions. Apart from this, we introduced a Privacy-
Guide: Dr. B. M. Mehtre Sensitive String Analyzer (PssA), a Python-based script,
which is capable of analyzing apps' source code and nd
Description privacy related sensitive strings in application source
We have developed the tool for extracting the keywords code.
from the onion sites using Tor proxy. Our tool collects all Deliverables
the keywords related to attacks such as hacking, tracing,
tracking, bandwidth, etc., from the onion sites. After We have identied two issues in Security Apps, including
collecting keywords, our tool identies URLs of onion insucient permission documentation and eectiveness
sites whenever the keywords are found. Once URLs are of Security Apps against OS-Level attacks on unpatched
extracted, we send an e-mail to the owner of the onion Android OS versions.
site as a client. The onion site owner replied to the mail
and was received as an e-mail header. Finally, we have Multi-Layer Intrusion Detection and Prevention
located the geographical location of the site and IP as System: A New Approach
well from the e-mail header.
Objectives
Vikash Kumar Saini
This application is useful for intelligence agencies who MS (Cyber Security)
are collecting threats and evidence to monitor and Sardar Patel University of Police
conduct surveillance on the activity in the hidden dark Security and Criminal Justice, Jodhpur
web. We use this technique to prevent the DDoS attack, Guide: Dr. B. M. Mehtre
SYN ood attack, and Snier attack. It also helps to
detect attacks which was done in the past like website Description
attack, e-mail hacking, social account hacking and money
The study focusses on detection and prevention of
fraud.
network attacks. A multi-layer architecture is proposed
Deliverables for intrusion detection and prevention. Two devices
(Snort, Suricata) are used in this scheme. Multi-layer
We monitored and eavesdropped on onion site,
architecture is based on the signatures as well as
where attackers comment and blog about future
anomaly based detection and prevention mechanisms. A
attacks
decision-making process is implemented in the
We predicted the type of attack possible in the architecture. Intrusions and data ood attacks are
near future. detected and blocked by the proposed design. On the
17
Explore, Enable, Excel
basis of test results, it is clear that the proposed To detect all types of post-operation based attacks
architecture gives better performance compared to like noise, blurring, compression, etc., in copy-
individual (single) unit of IDS/IPS. It also collects move forgery.
dropped packets for analysis. This can be used for
Deliverables
prediction and prevention of new attacks. Thus, the
proposed architecture gives enhanced security to the We have implemented a tool (Desktop application) for
network. CMFD which can detect geometric-based attack like
translation, rotation (degree range 0 to 330) and scaling
Objectives
(size range 0.5 to 2).
There is a possibility of bypassing single-level (IDS/IPS)
security by using intrusions. Therefore, a new An Automated Tool for Vulnerability
architecture is proposed for detecting and preventing Assessment of HTTPS Web Applications
intrusions.
Deliverables
We have implemented and tested multi-layer scheme
using the combination of Snort and Suricata. It is Anand Ramesh
observed that Snort detects and prevents more B. Tech. (Avionics) II Year
intrusions as compared to Suricata. Indian Academy of Sciences, Bangalore
Guide: Dr. B. M. Mehtre
Copy Move Forgery Detection Using
Description
Key-Points Structure
This study proposes an ecient method to assess the
vulnerability of HTTPS web applications. We have
developed a completely automated tool using Python,
Vinod Parihar
MS (Cyber Security) Final Year
which can be used to conduct Vulnerability Assessment
Sardar Patel University of Police on web applications which use HTTPS protocol. This tool
Security and Criminal Justice, Jodhpur is user-friendly and no technical knowledge is required to
Guide: Dr. B. M. Mehtre use the tool. It is developed in such a way that it is open to
further development and new functionalities can be
Description easily added in the form of modules. The tool successfully
establishes connection with SSL servers. The test was
Modication of information of an image is an easy task conducted on both local and remote servers. Web
due to increasing number of image editing tools and applications were analyzed and vulnerabilities found.
techniques. This leads to widespread usage of forged
images for various purposes intently and unintently. In Objectives
copy-move image forgery, a region of an image is copied To develop a test web application (HTTP)
and pasted on the same image. In this study, a Copy Move
Manual test of various attacks on the web
Forgery Detection (CMFD) method is proposed, which
application
works well for geometric based attacks like translation,
rotation and scaling. This method is based on keypoint Conversion of the test web application to HTTPS
structure. Another method is also proposed for CMFD Development of an automated tool to analyze the
which is based on Texture feature (Localized Angular vulnerabilities in HTTPS application
Phase (LAP) feature). Testing of the tool on various web applications.
Objectives Deliverables
A basic web application which simulates banking
To detect all types of geometric based attacks like
environment
translation, rotation and scaling in copy-move
forgery A completely automated tool for the vulnerability
assessment of HTTPS web application.
18
Explore, Enable, Excel
19
Explore, Enable, Excel
Rishi Yadav
Integrated Dual Degree (CSE) III Year
IIT (BHU), Varanasi
Guide: Dr. G. R. Gangadharan
Description
In web service composition, QoS is an important
criterion to focus on, because it fullls the non-functional
requirements of composition. In this study, we used
'Canonical Correlation Analysis (CCA)', which analyzes
correlation extent between two sets of variables. We
used this method in our algorithm to nd out optimal closest ATMs and bank branches and also obtain
service composition from a service plan. information about the bank such as services available,
IFSC code and working hours. We used mapping tools like
Objectives Quantum Geographic Information System (QGIS),
To nd out optimal web service composition from a QGIS2WEB.
service plan of dierent tasks, each having a number of The second part of the project was to identify the best
candidate services. open source tool for visualization of geospatial data. For
Deliverables this, the map containing the information had to be
published on the web with the help of some publishing
A novel approach to nd out an optimal web service software or plug-in like QGIS2WEB XAMPP along with
composition, considering all the transactional properties MySQL. In the last part, an idea of mobile-based
and QoS metric values at a time. application was proposed to provide specic user-
oriented information based on his/her current location
A Detailed and Practical Analysis of Various Tools and other preferences related to him/her.
for Visualization of Geographic Information in
Banking Sector Objectives
To empirically analyze data visualization tools for
geographic data and then recommend the most
suitable one which provides a mechanism for
& spatial queries
To practically analyze the various tools for
visualization of geographic data and then
recommend the most suitable one which provides
K. L. Harsha Vardhan S. Geetha Reddy the entire query-related facilities.
B. Tech. (CSE) IV Year
Deliverables
JNTU, Hyderabad
Guide: Dr. N. Raghu Kisore After detailed analysis, we concluded that QGIS is the
best tool for the visualization of data on a desktop. On
Description
the other hand, various options are available for
The aim of this study is to build a visualization platform publishing the map on the web. For instance, a XAMPP
for performing geospatial analytics and sharing the server congured with PostgreSQL (spatial database)
results with various stakeholders bank customers, bank along with QGIS2WEB is the best choice for a stable and
ocials and government entities. To the bank customer, systematic visualization application capable of handling
the data visualization tool provides a means to search for data.
20
Explore, Enable, Excel
Prediction-error Expansion based Reversible systems by combining threshold secret sharing (k, n) and
Watermarking using Quad-tree Decomposition proxy re-encryption techniques. In our method, multiple
authorities co-exist and each authority is able to issue
attributes independently and attribute revocation
method can eciently achieve both forward and
backward security.
Aniruddha Rao
M. E. (Embedded Systems) II Year Objectives
BITS-Pilani, Hyderabad
To improve security and eciency in public cloud
Guide: Dr. Rajarshi Pal
storage systems, give data owners more direct
Description control on their access policies, and to
accommodate many data contributors and data
This study aims to exploit the feature of quad-tree
users to access the data in cloud
decomposition to divide the image into homogeneous
regions. The basic objective of reversible data hiding is to To design an ecient and ne-grained data access
make slightest modications in the cover media for control system for public cloud systems
embedding the watermark and at the same time ensure To deal with the shortcomings of multi-authority
that the recovery does not aect the delity of the cover attribute systems by introducing threshold secret
image. The embedding distortion is minimum when data sharing mechanism
is embedded in smoother regions of the image. This study To eciently revoke users from the current
exploits the idea by considering each of the system while minimizing the impact on the
homogeneous blocks as a separate image and embeds remaining legitimate users.
data in each block using the existing PVO-based mapping
scheme in two dimensions. Deliverables
21
Explore, Enable, Excel
Deliverables Description
A noble secure protocol based on rateless code for cloud We investigated the quality of VoIP trac sent over a
storage system with parity check matrix for integrity network that use either IPv4 or IPv6 with the help of
check and encryption for securing the data. network simulation using OPNET Modeler 14.5 simulator.
22
Explore, Enable, Excel
We built a network scenario where a set of handsets domain. Our goal is to derive the hidden aspect which has
(both cal ling and cal led) are connected to a been discussed in the text data. Further, we retrieve the
wired/wireless switch which is in turn connected to a aspect intensity with which the user emphasis on a given
router, and the routers in calling and called sides are aspect in the review and give a score to each aspect.
connected through internet with default conguration
Deliverables
present in the simulator. We used a set of performance
metrics like end-to-end delay, voice jitter, packet delay An algorithm to retrieve aspect-based intrinsic
variation, mean opinion score, trac delivery ratio information for analysis of service quality of banks
available in the simulator. and other public entities
Objectives A prepared review dataset of banking domain by
crawling from web sources.
To investigate the feasibility of availing the
services of VoIP over IPv6 enabled network File Transfer API: An Interface between SFMS
To evaluate the performance gain in IPv6 for the and CBS
same.
Deliverables
A detailed project report on the performance
measurement of VoIP over IPv6 and IPv4 enabled &
networks. The measurement is made over both wired and
wireless networks.
Sparse Aspect Rating Model for Sentiment Pranavi Jalapati Satya Naraparaju
Summarization B. Tech. (CSE) II Year
JNTU, Hyderabad
Guide: Shri G. Raghuraj
Description
Agni Besh Chauhan
B. Tech. (CSE) III Year This study proposes an interface between the SFMS
IIT Patna (Structured Financial Messaging System) and CBS (Core
Guide: Dr. S. Nagesh Bhattu Banking System) which invokes two primary functions of
the SFMS Bank API namely 'Send' and 'Receive'
Description messages. The message sent can either be in a le format
This study deals with rigorous analysis of review data or a string structure. The received message has to be in a
crawled from various sources to deliver aspect string structure which is a requirement of the SFMS.
segmented sentiment. It tackles the latent aspect mining After an authorised activation of the interface server, it
problem in an unsupervised manner by considering the dynamically connects to the SFMS server using the port
user and item side information of review text for specied at the client end. The interface supports
modeling of aspect generation leading to improvement multiple le transfer averting network congestion. The
on the accuracy and reliability of predicted aspect server acknowledges successful transfer and reports a
ratings. The task investigated here takes a collection of NAK (Negative Acknowledgment) otherwise. On
review text in banking domain as input with overall receiving a positive acknowledgment, the les at the
numerical rating; and with the goal of discovering a set of parent location are deleted to avoid redundancy.
aspect and predict ratings on each aspect for each review Moreover, all the transactions and login activity is logged
by applying unsupervised machine learning techniques. using a database for accountability.
Objectives Objectives
To investigate aspect mining problem that aims to deliver Transfer multiple les and push messages across
opinion based summarization of text reviews in nancial SFMS and CBS avoiding manual intervention
23
Explore, Enable, Excel
24
Explore, Enable, Excel
25
FORTHCOMING PROGRAMMES
JANUARY 2017
Migrating to IPv6 09 11
Cyber Defence for Banks 09 13
R for Analytics 17 20
Data Centre Management 18 20
Trends and Technologies in Mobile Banking 23 24
IT Vendor Management 23 25
IT for Functional Executives in Banks 30 01
Digital Forensics for Banks 30 03
FEBRUARY 2017
Big Data Analytics for Banks 01 04
Emerging Trends on Operational DBMS for Banks 06 10
Banking Technologies 06 10
Cloud Adoption in Banks 13 17
Network Security 13 17
Data Quality 20 21
Payment Systems 20 22
Mobile App Development for Banks 27 03
SFMS Platform for LCs, BGs, RTGS & NEFT 27 03
MARCH 2017
Registration Authority Operations 02 03
Secure Coding Practices 06 10
Information Systems Control & Audit 20 24
APRIL 2017
Social Media Analytics for Banks 17 21
Technologies for Financial Inclusion 24 26
Website Security 24 26
MAY 2017
Mobile Security and Mobile Application Testing 01 03
Payment Systems 01 03
SFMS Platform for LCs, BGs, RTGS & NEFT 01 05
Registration Authority Operations 08 09
Data Warehousing for CRM & Analytics 15 18
Security Operations Centre 15 19
Digital Forensics for Banks 15 19
Migrating to IPv6 22 24
Emerging Authentication Techniques for Banks 22 24
Virtualization and Cloud Computing 22 26
JUNE 2017
Open Source Technologies 05 07
Fraud Analytics 12 16
Big Data & Cloud Computing Challenges 19 23
Network Security 19 23
SFMS Platform for LCs, BGs, RTGS & NEFT 19 23
Technologies for Financial Inclusion 27 29
Mobile Governance and Mobile Cloud Services 28 29
Design of Secure Enterprise LAN 28 30
Published by:
Castle Hills, Road No. 1, Masab Tank, Hyderabad - 500 057, India.
EPABX : +91 - 40 - 2329 4999, Fax : +91 - 40 - 23535157
Web : www.idrbt.ac.in E-mail : publisher@idrbt.ac.in