Upload
krishna-chaitanya
View
84
Download
3
Embed Size (px)
Citation preview
PERSONAL DETAILS:FULL NAME: M KRISHNA CHAITANYA
FATHER’S NAME: M SHIVA RAM PRASAD
DATE OF BIRTH : 16/06/1994 GENDER: M
INSTITUTE: VIGNAN INSTITUTE OF TECHNOLOGY OF AERONAUTICAL AND ENGINEERING.DESHMUKHI,NALGOND.
STUDDENT (Roll No) ID: 11UQ1A0552 BRANCH: CSE
HOME/PERMANENT ADDRESS: CHANCHAL GUDA,NEW QUARTERS BLOCK1,HYDERABAD-500024
TELEPHONE: 8686929086 E-MAIL: [email protected]
CAREER OBJECTIVE:
To work in a challenging environment and thereby acquire knowledge and experience that adds to the development of the organization and my career.
ACADEMIC DETAILS:
QUALIFICATION INSTITUTE YEAR OF PASSING PERCENTAGE
B.TECH(JNTU)
INTERMEDIATE(STATE BOARD)
CLASS X(STATE BOARD)
VIGNAN INSTITUTE OF TECHNOLOGY OF
AERONAUTICAL AND ENGINEERING
NARAYANA JUNIOR COLLEGE
BHASHYAM PUBLIC SCHOOL
2015
2011
2009
65.68
84.64
71.34
- 1 -
OTHER SKILLS AND ACHIEVEMENTS:
I am well acquainted with basics of C, Core Java,html. I can work efficiently both as an individual and as a team. I try to be optimistic.
PROJECT WORK:
Project1 : Title : security through typing patternTechnology : java Description : The deficiencies of traditional password-based access systems have become more acute as these systems have grown in size and scope. Genarally a text password no matter how many you change it or how many logical symbol you incorporate into it , has some inherit weakness. To avoid this we use typing patterns, is an approach which seeks to identify an individual by their typing characters. At the time of registration it takes some references sample based on those samples authentication of user is done.Project2 : Title : Sepearable Reversible Data hiding in Encrypted Images Technology : java Description :
The use of computer networks for data transmissions has created the need of security. Many robust message encryption techniques have been developed to supply this demand. The amount of digital images has increased rapidly on the Internet. Image security becomes increasingly important for many applications. The first one is based on content protection through encryption. There are several methods to encrypt binary images or gray level images. In this group proper decryption of data requires a key. The second group bases the protection on digital watermarking or data hiding, aimed at secretly embedding a message into the data.
INTERESTS, ACTIVITIES AND RESPONSIBILITIES:INTERESTS:
Writing dialogues, scripts, and quotes. I am passionate about books. I like playing Football and Cricket, watching sports.
ACTIVITIES: . Won 2st prize in volleyball sports event conducted at VIGNAN TARANG 2K14 .Won 1st prize in volleyball on event of ZARA-2K11
DECLARATION: To the best of my knowledge the above statements are true and I understand that withholding or misstating any fact may result in the refusal for placement.
SIGNATURE KRISHNA CHAITANYA DATE
- 2 -