Vagif Gasimov - Academia.edu (original) (raw)
Uploads
Papers by Vagif Gasimov
2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Jun 11, 2021
There have been developed image encryption algorithm using chaotic map and DNA pseudo-symbols seq... more There have been developed image encryption algorithm using chaotic map and DNA pseudo-symbols sequence gained on the basis of real DNA symbols. In the suggested algorithm, the address for the selecting of DNA symbols sequence from Gene Bank, encoding rule of the DNA symbols, also the initial parameters of the chaotic map are determined on the secret key basis. Image pixels modification is based on the numerical values of the chaotic points sets coordinates obtained with the chaos play description of the DNA pseudo-symbols and the transference of pixels is based on displacement table constructed with the chaotic map.
IOP conference series, Jan 29, 2020
The development of a new image encryption algorithm using real structures of deoxyribonucleic aci... more The development of a new image encryption algorithm using real structures of deoxyribonucleic acid (DNA) molecules is considered. In the proposed algorithm, the encryption process is performed by confusing and rearranging the pixels of the image based on the coordinates of the chaotic points obtained by the chaos game of DNA symbols, the sequence of DNA symbols, and the encoding rule. The selection of a specific DNA sequence from the Databank and the determination of the encoding rule for DNA symbols is based on the secret key.
Procedia Computer Science
International Journal of 3D Printing Technologies and Digital Industry
International Journal of 3D Printing Technologies and Digital Industry, 2020
The article discusses the main components of digital business, including the digital economy. The... more The article discusses the main components of digital business, including the digital economy. The article analyzes the current state, prospects for the development and application of cryptocurrencies, blockchain, cloud technologies and the Internet of things. The inevitability of implementation and application of these technologies everywhere during the Fourth Industrial Revolution (Industry 4.0) is noted. Therefore, it is important to study the possibilities of these technologies, the benefits presented by these technologies for the implementation of digital business. The article also discusses cybersecurity issues that arise as a result of the implementation and application of these technologies.
Covert channels may be used to ensure protection of information during legal transfers, as well a... more Covert channels may be used to ensure protection of information during legal transfers, as well as for illegal and secret transfer of official and commercial secrets, confidential and individual data, and state secret with the purpose of sharing necessary information to commit a crime. Therefore, the problem of transferring hidden information to create covert channels over WhatsApp has been studied in the article, and the possibilities of using different graphic file formats, as well as using existing stenographic software developed for Windows and Android operating systems have
2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)
2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)
2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)
2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA), Jun 11, 2021
There have been developed image encryption algorithm using chaotic map and DNA pseudo-symbols seq... more There have been developed image encryption algorithm using chaotic map and DNA pseudo-symbols sequence gained on the basis of real DNA symbols. In the suggested algorithm, the address for the selecting of DNA symbols sequence from Gene Bank, encoding rule of the DNA symbols, also the initial parameters of the chaotic map are determined on the secret key basis. Image pixels modification is based on the numerical values of the chaotic points sets coordinates obtained with the chaos play description of the DNA pseudo-symbols and the transference of pixels is based on displacement table constructed with the chaotic map.
IOP conference series, Jan 29, 2020
The development of a new image encryption algorithm using real structures of deoxyribonucleic aci... more The development of a new image encryption algorithm using real structures of deoxyribonucleic acid (DNA) molecules is considered. In the proposed algorithm, the encryption process is performed by confusing and rearranging the pixels of the image based on the coordinates of the chaotic points obtained by the chaos game of DNA symbols, the sequence of DNA symbols, and the encoding rule. The selection of a specific DNA sequence from the Databank and the determination of the encoding rule for DNA symbols is based on the secret key.
Procedia Computer Science
International Journal of 3D Printing Technologies and Digital Industry
International Journal of 3D Printing Technologies and Digital Industry, 2020
The article discusses the main components of digital business, including the digital economy. The... more The article discusses the main components of digital business, including the digital economy. The article analyzes the current state, prospects for the development and application of cryptocurrencies, blockchain, cloud technologies and the Internet of things. The inevitability of implementation and application of these technologies everywhere during the Fourth Industrial Revolution (Industry 4.0) is noted. Therefore, it is important to study the possibilities of these technologies, the benefits presented by these technologies for the implementation of digital business. The article also discusses cybersecurity issues that arise as a result of the implementation and application of these technologies.
Covert channels may be used to ensure protection of information during legal transfers, as well a... more Covert channels may be used to ensure protection of information during legal transfers, as well as for illegal and secret transfer of official and commercial secrets, confidential and individual data, and state secret with the purpose of sharing necessary information to commit a crime. Therefore, the problem of transferring hidden information to create covert channels over WhatsApp has been studied in the article, and the possibilities of using different graphic file formats, as well as using existing stenographic software developed for Windows and Android operating systems have
2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)
2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)
2021 3rd International Congress on Human-Computer Interaction, Optimization and Robotic Applications (HORA)