Vagif Gasimov - Academia.edu (original) (raw)

Vagif Gasimov

Uploads

Papers by Vagif Gasimov

Research paper thumbnail of Image encryption algorithm using DNA pseudo-symbols and chaotic map

2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Jun 11, 2021

There have been developed image encryption algorithm using chaotic map and DNA pseudo-symbols seq... more There have been developed image encryption algorithm using chaotic map and DNA pseudo-symbols sequence gained on the basis of real DNA symbols. In the suggested algorithm, the address for the selecting of DNA symbols sequence from Gene Bank, encoding rule of the DNA symbols, also the initial parameters of the chaotic map are determined on the secret key basis. Image pixels modification is based on the numerical values of the chaotic points sets coordinates obtained with the chaos play description of the DNA pseudo-symbols and the transference of pixels is based on displacement table constructed with the chaotic map.

Research paper thumbnail of DNA-based image encryption algorithm

IOP conference series, Jan 29, 2020

The development of a new image encryption algorithm using real structures of deoxyribonucleic aci... more The development of a new image encryption algorithm using real structures of deoxyribonucleic acid (DNA) molecules is considered. In the proposed algorithm, the encryption process is performed by confusing and rearranging the pixels of the image based on the coordinates of the chaotic points obtained by the chaos game of DNA symbols, the sequence of DNA symbols, and the encoding rule. The selection of a specific DNA sequence from the Databank and the determination of the encoding rule for DNA symbols is based on the secret key.

Research paper thumbnail of Stream Encryption Method Based on the Chaotic Brownian Motion Model of Molecules

Procedia Computer Science

Research paper thumbnail of Создание эффективных структур распределенных компьютерных сетей: "Развитие технологии компьютерных сетей и узлов Internet, разработка и внедрение программно-технического и информационного обеспечения для Азербайджанских узлов Internet, отвечающих современным сетевым стандартам

Research paper thumbnail of Создание эффективных структур распределенных компьютерных сетей: "Развитие инфраструктуры академической сети, разработка и внедрение новых сетевых и информационных услуг Internet

Research paper thumbnail of Создание систем безопасности информации в компьютерных сетей: "Разработка методов построения и реализации эффективных структур систем службы безопасности информации в открытых компьютерных сетях

Research paper thumbnail of Создание поисковых систем для компьютерных сетей со сверхнасышенными информационными ресурсами: «Проектирование и разработка информационно-поисковых систем для Азербайджанской части Internet»

Research paper thumbnail of Basic components of the digital business: crutocurrency, blockchain, cloud technologies and internet of things

International Journal of 3D Printing Technologies and Digital Industry

Research paper thumbnail of Basic components of the digital business: crutocurrency, blockchain, cloud technologies and internet of things

International Journal of 3D Printing Technologies and Digital Industry, 2020

The article discusses the main components of digital business, including the digital economy. The... more The article discusses the main components of digital business, including the digital economy. The article analyzes the current state, prospects for the development and application of cryptocurrencies, blockchain, cloud technologies and the Internet of things. The inevitability of implementation and application of these technologies everywhere during the Fourth Industrial Revolution (Industry 4.0) is noted. Therefore, it is important to study the possibilities of these technologies, the benefits presented by these technologies for the implementation of digital business. The article also discusses cybersecurity issues that arise as a result of the implementation and application of these technologies.

Research paper thumbnail of Implementing Covert Channels to Transfer Hidden Information Over Whatsapp on Mobile Phones

Covert channels may be used to ensure protection of information during legal transfers, as well a... more Covert channels may be used to ensure protection of information during legal transfers, as well as for illegal and secret transfer of official and commercial secrets, confidential and individual data, and state secret with the purpose of sharing necessary information to commit a crime. Therefore, the problem of transferring hidden information to create covert channels over WhatsApp has been studied in the article, and the possibilities of using different graphic file formats, as well as using existing stenographic software developed for Windows and Android operating systems have

Research paper thumbnail of Image encryption algorithm using DNA pseudo-symbols and chaotic map

2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)

Research paper thumbnail of Assessment of the sustainability of communication networks built on the basis of computer networks

2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)

Research paper thumbnail of Using blockchain technology to ensure security in the cloud and IoT environment

2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)

Research paper thumbnail of Image encryption algorithm using DNA pseudo-symbols and chaotic map

2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Jun 11, 2021

There have been developed image encryption algorithm using chaotic map and DNA pseudo-symbols seq... more There have been developed image encryption algorithm using chaotic map and DNA pseudo-symbols sequence gained on the basis of real DNA symbols. In the suggested algorithm, the address for the selecting of DNA symbols sequence from Gene Bank, encoding rule of the DNA symbols, also the initial parameters of the chaotic map are determined on the secret key basis. Image pixels modification is based on the numerical values of the chaotic points sets coordinates obtained with the chaos play description of the DNA pseudo-symbols and the transference of pixels is based on displacement table constructed with the chaotic map.

Research paper thumbnail of DNA-based image encryption algorithm

IOP conference series, Jan 29, 2020

The development of a new image encryption algorithm using real structures of deoxyribonucleic aci... more The development of a new image encryption algorithm using real structures of deoxyribonucleic acid (DNA) molecules is considered. In the proposed algorithm, the encryption process is performed by confusing and rearranging the pixels of the image based on the coordinates of the chaotic points obtained by the chaos game of DNA symbols, the sequence of DNA symbols, and the encoding rule. The selection of a specific DNA sequence from the Databank and the determination of the encoding rule for DNA symbols is based on the secret key.

Research paper thumbnail of Stream Encryption Method Based on the Chaotic Brownian Motion Model of Molecules

Procedia Computer Science

Research paper thumbnail of Создание эффективных структур распределенных компьютерных сетей: "Развитие технологии компьютерных сетей и узлов Internet, разработка и внедрение программно-технического и информационного обеспечения для Азербайджанских узлов Internet, отвечающих современным сетевым стандартам

Research paper thumbnail of Создание эффективных структур распределенных компьютерных сетей: "Развитие инфраструктуры академической сети, разработка и внедрение новых сетевых и информационных услуг Internet

Research paper thumbnail of Создание систем безопасности информации в компьютерных сетей: "Разработка методов построения и реализации эффективных структур систем службы безопасности информации в открытых компьютерных сетях

Research paper thumbnail of Создание поисковых систем для компьютерных сетей со сверхнасышенными информационными ресурсами: «Проектирование и разработка информационно-поисковых систем для Азербайджанской части Internet»

Research paper thumbnail of Basic components of the digital business: crutocurrency, blockchain, cloud technologies and internet of things

International Journal of 3D Printing Technologies and Digital Industry

Research paper thumbnail of Basic components of the digital business: crutocurrency, blockchain, cloud technologies and internet of things

International Journal of 3D Printing Technologies and Digital Industry, 2020

The article discusses the main components of digital business, including the digital economy. The... more The article discusses the main components of digital business, including the digital economy. The article analyzes the current state, prospects for the development and application of cryptocurrencies, blockchain, cloud technologies and the Internet of things. The inevitability of implementation and application of these technologies everywhere during the Fourth Industrial Revolution (Industry 4.0) is noted. Therefore, it is important to study the possibilities of these technologies, the benefits presented by these technologies for the implementation of digital business. The article also discusses cybersecurity issues that arise as a result of the implementation and application of these technologies.

Research paper thumbnail of Implementing Covert Channels to Transfer Hidden Information Over Whatsapp on Mobile Phones

Covert channels may be used to ensure protection of information during legal transfers, as well a... more Covert channels may be used to ensure protection of information during legal transfers, as well as for illegal and secret transfer of official and commercial secrets, confidential and individual data, and state secret with the purpose of sharing necessary information to commit a crime. Therefore, the problem of transferring hidden information to create covert channels over WhatsApp has been studied in the article, and the possibilities of using different graphic file formats, as well as using existing stenographic software developed for Windows and Android operating systems have

Research paper thumbnail of Image encryption algorithm using DNA pseudo-symbols and chaotic map

2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)

Research paper thumbnail of Assessment of the sustainability of communication networks built on the basis of computer networks

2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)

Research paper thumbnail of Using blockchain technology to ensure security in the cloud and IoT environment

2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)

Log In