LEADER 05452nam 22006855 450 001 9911031568003321 005 20251001130723.0 010 $a981-9663-48-2 024 7 $a10.1007/978-981-96-6348-4 035 $a(CKB)41521119200041 035 $a(MiAaPQ)EBC32323759 035 $a(Au-PeEL)EBL32323759 035 $a(DE-He213)978-981-96-6348-4 035 $a(EXLCZ)9941521119200041 100 $a20251001d2025 u| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aProceedings of International Conference on Network Security and Blockchain Technology $eICNSBT 2025 /$fedited by Debasis Giri, Georgios Kambourakis, SK Hafizul Islam, Gautam Srivastava, Tanmoy Maitra 205 $a1st ed. 2025. 210 1$aSingapore :$cSpringer Nature Singapore :$cImprint: Springer,$d2025. 215 $a1 online resource (600 pages) 225 1 $aLecture Notes in Networks and Systems,$x2367-3389 ;$v1405 311 08$a981-9663-47-4 327 $aFPGA Implementation of LSB Steganography Without Multiplier and Divider -- Cryptanalysis and improvement on low cost CL-ASS for wireless sensor networks -- Image Steganography with Efficient Utilization of Difference of Gaussian Edge Detection and Dilation -- LBP based Robust medical image watermarking in wavelet domain -- Cryptanalysis over Xu et al.?s CLAS scheme for VANETs -- Optimizing Cybersecurity Defences: Leveraging YARA Rules for Enhanced Detection of Custom PDF Spyware -- Template security in Biometrics system for fingerprint minutiae templates using Fuzzy vault method -- A Multilingual PDF Text-to-Speech Converter with Translation Capabilities -- An Image Watermarking approach using Hybrid GWO-GA in IWT Domain -- Developing a Secure Authentication and Key Agreement Protocol for Internet of Vehicles (IOV) Utilizing 5G Networks -- On Detection of Phishing URLs using Plant Propagation Algorithm -- Phishing URL Detection via Machine Learning: A Comprehensive Survey -- A Novel Synonym-Based Attack Algorithm for Generating Undetectable Adversarial Text Examples in Machine Learning -- Open-Audit: Enhancing Software Compliance with Blockchain and Zero-Knowledge Proofs -- Privacy-Preserved Efficient Contact Tracing in Contact Graph Components of Body Area Networks using Blockchain -- Integration of Blockchain to Internet of Things (IoT) -- Anomaly Detection in IoT Networks Using WGAN-GP: A Novel Approach for Robust IoT Security -- Urban Resilience: Using Autoencoder-Decoder LSTM Model with Green Roofs and Vertical Gardens to Combat Air Pollution -- Smart Cities' Clean Air: Federated Bidirectional Long Short-term Memory for Enhanced Air Quality Index Forecasting -- Min-Cart: An Eco-Friendly Approach to Minimize Air Pollution and Carbon Footprint -- Augmented Transfer Learning for Skin Cancer Detection: Enhancing Accuracy using Edge Detection -- Advanced Brain Tumor Classification with UNet Segmentation and Deep Maxout Classifier Techniques -- Enhancing Classification of Gemstones through Deep Learning Analysis: A Comparative Study -- LSTM-Based Image Enrichment and Description Generation to Enhance Visual Perception for Visually Challenged People -- Deforestation Detection Using Domain Adversarial Neural Network -- GeoLands: Machine Learning-Powered Landslide Risk Assessment -- Performance Improvement of an Automated Alzheimer Classification System -- Integrated Energy-Efficient Air Pollution Prediction and Control Framework -- Automatic Detection and Classification of Brain Tumors Using Deep Learning Model. 330 $aThe book is a collection of best selected research papers presented at International Conference on Network Security and Blockchain Technology (ICNSBT 2025), held at Haldia Institute of Technology, Haldia, West Bengal, India, during January 14?16, 2025. The book discusses recent developments and contemporary research in cryptography, network security, cybersecurity, and blockchain technology. Authors are eminent academicians, scientists, researchers, and scholars in their respective fields from across the world. 410 0$aLecture Notes in Networks and Systems,$x2367-3389 ;$v1405 606 $aTelecommunication 606 $aComputer networks$xSecurity measures 606 $aCryptography 606 $aData encryption (Computer science) 606 $aArtificial intelligence 606 $aCommunications Engineering, Networks 606 $aMobile and Network Security 606 $aCryptology 606 $aArtificial Intelligence 615 0$aTelecommunication. 615 0$aComputer networks$xSecurity measures. 615 0$aCryptography. 615 0$aData encryption (Computer science) 615 0$aArtificial intelligence. 615 14$aCommunications Engineering, Networks. 615 24$aMobile and Network Security. 615 24$aCryptology. 615 24$aArtificial Intelligence. 676 $a621.382 700 $aGiri$b Debasis$01380213 701 $aKambourakis$b Georgios$01850280 701 $aIslam$b S. K. Hafizul$01785598 701 $aSrivastava$b Gautam$01802732 701 $aMaitra$b Tanmoy$01850281 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9911031568003321 996 $aProceedings of International Conference on Network Security and Blockchain Technology$94443286 997 $aUNINA