Novel image encryption algorithm using hybrid 3D-ICPCM and hessenberg decomposition

V Verma, S Kumar, N Rani - Nonlinear Dynamics, 2024 - Springer
This study introduces a novel image encryption algorithm by combining the capabilities of a
three-dimensional chaotic map (3D-ICPCM) and Hessenberg decomposition. By harnessing …

OTA 2.0: An advanced and secure blockchain steganography algorithm

M Takaoğlu, A Özyavaş, N Ajlouni… - … of Computational and …, 2023 - dergipark.org.tr
Blockchain technology, a disruptive force beyond Bitcoin, is finding applications across
various fields, including scientific disciplines like steganography–the art of data hiding …

[PDF][PDF] Comparison of different machine learning techniques in river flow prediction

U Akbulut, MA Çifçi, B İşler, Z Aslan… - Journal of the Faculty of …, 2025 - researchgate.net
Purpose: River flow forecasting to ensure optimized use of water planning in future years
Theory and Methods: In this study, a hybrid model was obtained and analysed by comparing …

Secure IoT Seed-based Matrix Key Generator

NELA Youssef, C LEGHRIS - International Journal of …, 2024 - search.proquest.com
The rapid evolution of the Internet of Things (IoT) has significantly transformed various
aspects of both personal and professional spheres, offering innovative solutions in fields …

NBS: An NFT-Based Blockchain Steganography Method

M Takaoğlu, F Takaoğlu, T Dursun - International Conference on …, 2023 - Springer
Steganography is the name given to the science of hiding information that has been studied
throughout history. With the digitalization of information, traditional physical steganography …

[PDF][PDF] Secure IoT Seed-based Matrix Key Generator, A Novel Algorithm for Steganographic Security application.

Y NOUR-EL AINE, C LEGHRIS - International Journal of …, 2024 - researchgate.net
The rapid evolution of the Internet of Things (IoT) has significantly transformed various
aspects of both personal and professional spheres, offering innovative solutions in fields …

Check for updates NBS: An NFT-Based Blockchain Steganography Method

M Takaoğlu, F Takaoğlu, T Dursun - Computing, Internet of …, 2024 - books.google.com
The Scientific and Technological Research Council of Türkiye, Gebze, Kocaeli, Türkiye
{mustafa. takaoglu, faruk. takaoglu, taner. dursun}@ tubitak. gov. tr Abstract. Steganography …

[PDF][PDF] Sports Industry & Blockchain Technology

M TAKAOĞLU, T DURSUN - Journal of Sport Industry & …, 2024 - researchgate.net
Since the introduction of the Bitcoin solution, decentralized and distributed solution
techniques have significantly evolved. Techniques such as Hirected Acyclic Graphs (DAG) …

An Enhanced Symmetric Cryptography Algorithm Using Image Steganography

AI Adamu - Gombe State Polytechnic Bajoga, Journal of Science …, 2024 - jost.gspb.edu.ng
Information technology is gaining more attention due to its flexibility and potency by different
users, institutions and organizations. The major challenge with the use of IT devices such as …

Secure Image Encryption using Optimum Key generation with Deep learning Technique in Cloud Storage Environment.

S Sheela, N Subbulakshmi - Library of Progress-Library …, 2024 - search.ebscohost.com
Many industries, including healthcare, the military, finance, and more, need extra protection
for the interchange of picture data since images are now sent across open channels that …