Subutay Giray Baskir

  • Citations Per Year
Learn More
Digital images are used in many areas. Because of that, digital image watermarking has become an important research topic by the view of protecting copyright. Several methods have being developed to protect the watermarking on the image from additional processes. DCT is one of the methods used for robustness of watermarking. In this work, Hardware/Software(More)
RFID is an ever prevalent becoming technology. This increase of use brings its disadvantage, efforts to breach its security. As a result, generating cryptology algorithms is a solution that should be worked upon. In this project an implementation of an RFID authentication protocol is described. In the implementation, in order to simulate tag and reader,(More)
In this project a system design and implementation has made for allowing usage of Near Field Communication (NFC) enabled devices securely. In order to make the design appropriate to NFC standards, primarily an implementation environment infrastructure has been built. Additionally, the method of hardware & software codesign is operated. At the stage of(More)
  • 1