ICCK Transactions on Information Security and Cryptography

Publishing Model:
ISSN:
  ISSN:  request pending (online)  |  request pending (print)
ICCK Transactions on Information Security and Cryptography is a peer-reviewed academic journal dedicated to advancing research and development in the fields of information security, cryptographic technologies, and their applications in protecting data and communications in the digital era.
E-mail:[email protected]  DOI Prefix: 10.62762/TISC
-
Impact Factor
-
CiteScore

Recent Articles

Perspective | 19 August 2025
Singularity Cipher: A Topology-Driven Cryptographic Scheme Based on Visual Paradox and Klein Bottle Illusions
ICCK Transactions on Information Security and Cryptography | Volume 1, Issue 1: 38-53, 2025 | DOI: 10.62762/TISC.2025.186894
Abstract
This paper presents the Singularity Cipher, a novel cryptographic-steganographic framework that integrates topological transformations and visual paradoxes to achieve multidimensional security. Inspired by the non-orientable properties of the Klein bottle—constructed from two Möbius strips—the cipher applies symbolic twist functions to simulate topological traversal, producing high confusion and diffusion in the ciphertext. The resulting binary data is then encoded using perceptual illusions, such as the missing square paradox, to visually obscure the presence of encrypted content. Unlike conventional ciphers that rely solely on algebraic complexity, the Singularity Cipher introduces a... More >

Graphical Abstract
Singularity Cipher: A Topology-Driven Cryptographic Scheme Based on Visual Paradox and Klein Bottle Illusions

Research Article | 18 August 2025
Secure Aware Outlier Detection in Underwater Wireless Sensor Networks using Deep Learning
ICCK Transactions on Information Security and Cryptography | Volume 1, Issue 1: 25-37, 2025 | DOI: 10.62762/TISC.2025.610386
Abstract
The emerging field of underwater sensor networks (UWSN) has a vital potential shaping the modern and future landscape that assists in measuring water quality, pollution tracking, and identification of underwater habitats. The challenging conditions in the UWSN environments raise data and security concerns in terms of outliers related to the complicated communication system, poor visibility, and limited resources. The data quality and network efficiency may be affected due to these unwanted conditions, giving rise to certain malicious activities in the network. This study aims to enhance the outlier identification process in terms of security and quality perspectives using the Long Short-Term... More >

Graphical Abstract
Secure Aware Outlier Detection in Underwater Wireless Sensor Networks using Deep Learning

Free Access | Research Article | 31 July 2025
Joint Compression and Encryption of Virtual Machine Images Using LZMA and Chaotic Maps
ICCK Transactions on Information Security and Cryptography | Volume 1, Issue 1: 3-12, 2025 | DOI: 10.62762/TISC.2025.148753
Abstract
The exponential growth in security and storage requirements has led to increasing demand for high-performance solutions, particularly in managing large-scale data objects such as big binaries. Virtual Machines (VMs), a prime example of such binaries, are widely employed across desktops and dynamic server environments to deliver isolated execution contexts while minimizing hardware overhead. However, the proliferation of big binaries imposes significant challenges on both storage infrastructure and secure data transmission mechanisms. To address these issues, this paper proposes a novel "Combined Big Binaries Compression and Encryption" (CBBCE) scheme that jointly performs compression and enc... More >

Open Access | Editorial | 29 June 2025
Inaugural Editorial of the ICCK Transactions on Information Security and Cryptography
ICCK Transactions on Information Security and Cryptography | Volume 1, Issue 1: 1-2, 2025 | DOI: 10.62762/TISC.2025.393158
Abstract
Presents the inaugural editorial for this issue of the publication. More >
Journal Statistics
5
Authors
3
Author Distribution (Countries/Regions)
4
Articles
0
Citations
2025
Published Since
0
Special Issues
470
Article Views
196
Article Downloads
ICCK Transactions on Information Security and Cryptography

ICCK Transactions on Information Security and Cryptography

eISSN: request pending | pISSN: request pending

Email: [email protected]

Crossref

Crossref

Member of Crossref
https://www.crossref.org

Portico

Portico

All published articles are preserved here permanently:
https://www.portico.org/publishers/icck/