Tora, Hakan

Loading...
Profile Picture
Name Variants
Tora,H.
T., Hakan
Tora, Hakan
H., Tora
H.,Tora
T.,Hakan
Hakan, Tora
Job Title
Doktor Öğretim Üyesi
Email Address
hakan.tora@atilim.edu.tr
Main Affiliation
Airframe and Powerplant Maintenance
Status
Former Staff
Website
ORCID ID
Scopus Author ID
Turkish CoHE Profile ID
Google Scholar ID
WoS Researcher ID

Sustainable Development Goals

14

LIFE BELOW WATER
LIFE BELOW WATER Logo

1

Research Products

2

ZERO HUNGER
ZERO HUNGER Logo

0

Research Products

11

SUSTAINABLE CITIES AND COMMUNITIES
SUSTAINABLE CITIES AND COMMUNITIES Logo

1

Research Products

1

NO POVERTY
NO POVERTY Logo

0

Research Products

12

RESPONSIBLE CONSUMPTION AND PRODUCTION
RESPONSIBLE CONSUMPTION AND PRODUCTION Logo

0

Research Products

7

AFFORDABLE AND CLEAN ENERGY
AFFORDABLE AND CLEAN ENERGY Logo

2

Research Products

5

GENDER EQUALITY
GENDER EQUALITY Logo

0

Research Products

3

GOOD HEALTH AND WELL-BEING
GOOD HEALTH AND WELL-BEING Logo

1

Research Products

9

INDUSTRY, INNOVATION AND INFRASTRUCTURE
INDUSTRY, INNOVATION AND INFRASTRUCTURE Logo

0

Research Products

13

CLIMATE ACTION
CLIMATE ACTION Logo

2

Research Products

6

CLEAN WATER AND SANITATION
CLEAN WATER AND SANITATION Logo

0

Research Products

10

REDUCED INEQUALITIES
REDUCED INEQUALITIES Logo

0

Research Products

4

QUALITY EDUCATION
QUALITY EDUCATION Logo

0

Research Products

15

LIFE ON LAND
LIFE ON LAND Logo

0

Research Products

16

PEACE, JUSTICE AND STRONG INSTITUTIONS
PEACE, JUSTICE AND STRONG INSTITUTIONS Logo

0

Research Products

17

PARTNERSHIPS FOR THE GOALS
PARTNERSHIPS FOR THE GOALS Logo

1

Research Products

8

DECENT WORK AND ECONOMIC GROWTH
DECENT WORK AND ECONOMIC GROWTH Logo

0

Research Products
This researcher does not have a Scopus ID.
This researcher does not have a WoS ID.
Scholarly Output

57

Articles

11

Views / Downloads

2/0

Supervised MSc Theses

14

Supervised PhD Theses

5

WoS Citation Count

57

Scopus Citation Count

88

WoS h-index

5

Scopus h-index

5

Patents

0

Projects

0

WoS Citations per Publication

1.00

Scopus Citations per Publication

1.54

Open Access Source

7

Supervised Theses

19

Google Analytics Visitor Traffic

JournalCount
2014 22nd Signal Processing and Communications Applications Conference, SIU 2014 - Proceedings -- 2014 22nd Signal Processing and Communications Applications Conference, SIU 2014 -- 23 April 2014 through 25 April 2014 -- Trabzon -- 1060533
22nd IEEE Signal Processing and Communications Applications Conference (SIU) -- APR 23-25, 2014 -- Karadeniz Teknik Univ, Trabzon, TURKEY3
ICECS 2017 - 24th IEEE International Conference on Electronics, Circuits and Systems -- 24th IEEE International Conference on Electronics, Circuits and Systems, ICECS 2017 -- 5 December 2017 through 8 December 2017 -- Batumi -- 1346752
24th IEEE International Conference on Electronics, Circuits and Systems (ICECS) -- DEC 05-08, 2017 -- Batumi, GEORGIA2
24th Signal Processing and Communication Application Conference (SIU) -- MAY 16-19, 2016 -- Zonguldak, TURKEY2
Current Page: 1 / 6

Scopus Quartile Distribution

Competency Cloud

GCRIS Competency Cloud

Scholarly Output Search Results

Now showing 1 - 3 of 3
  • Article
    Citation - WoS: 13
    Citation - Scopus: 16
    A Novel Data Encryption Method Using an Interlaced Chaotic Transform
    (Pergamon-elsevier Science Ltd, 2024) Gokcay, Erhan; Tora, Hakan
    We present a novel data encryption approach that utilizes a cascaded chaotic map application. The chaotic map used in both permutation and diffusion is Arnold's Cat Map (ACM), where the transformation is periodic and the encrypted data can be recovered. The original format of ACM is a two-dimensional mapping, and therefore it is suitable to randomize the pixel locations in an image. Since the values of pixels stay intact during the transformation, the process cannot encrypt an image, and known-text attacks can be used to get back the transformation matrix. The proposed approach uses ACM to shuffle the positions and values of two-dimensional data in an interlaced and nested process. This combination extends the period of the transformation, which is significantly longer than the period of the initial transformation. Furthermore, the nested process's possible combinations vastly expand the key space. At the same time, the interlaced pixel and value transformation makes the encryption highly resistant to any known-text attacks. The encrypted data passes all random-data tests proposed by the National Institute of Standards and Technology. Any type of data, including ASCII text, can be encrypted so long as it can be rearranged into a two-dimensional format.
  • Article
    Citation - WoS: 13
    Citation - Scopus: 20
    A Generalized Arnold's Cat Map Transformation for Image Scrambling
    (Springer, 2022) Tora, Hakan; Gokcay, Erhan; Turan, Mehmet; Buker, Mohamed
    This study presents a new approach to generate the transformation matrix for Arnold's Cat Map (ACM). Matrices of standard and modified ACM are well known by many users. Since the structure of the possible matrices is known, one can easily select one of them and use it to recover the image with several trials. However, the proposed method generates a larger set of transform matrices. Thus, one will have difficulty in estimating the transform matrix used for scrambling. There is no fixed structure for our matrix as in standard or modified ACM, making it much harder for the transform matrix to be discovered. It is possible to use different type, order and number of operations to generate the transform matrix. The quality of the shuffling process and the strength against brute-force attacks of the proposed method is tested on several benchmark images.
  • Conference Object
    Effect of Secret Image Transformation on the Steganography Process
    (Ieee, 2017) Buker, Mohamed; Tora, Hakan; Gokcay, Erhan
    Steganography is the art of hiding information in something else. It is favorable over encryption because encryption only hides the meaning of the information; whereas steganography hides the existence of the information. The existence of a hidden image decreases Peak Signal to Noise Ratio (PSNR) and increases Mean Square Error (MSE) values of the stego image. We propose an approach to improve PSNR and MSE values in stego images. In this method a transformation is applied to the secret image, concealed within another image, before embedding into the cover image. The effect of the transformation is tested with Least Significant Bit (LSB) insertion and Discrete Cosine Transformation (DCT) techniques. MSE and PSNR are calculated for both techniques with and without transformation. Results show a better MSE and PSNR values when a transformation is applied for LSB technique but no significant difference was shown in DCT technique.