Suivre
mojtaba mahdavi
mojtaba mahdavi
Professor of Information Technology, University of Isfahan
Adresse e-mail validée de eng.ui.ac.ir
Titre
Citée par
Citée par
Année
Steganalysis and payload estimation of embedding in pixel differences using neural networks
V Sabeti, S Samavi, M Mahdavi, S Shirani
Pattern Recognition 43 (1), 405-415, 2010
642010
Steganalysis of pixel-value differencing steganographic method
V Sabeti, S Samavi, M Mahdavi, S Shirani
2007 IEEE Pacific Rim Conference on Communications, Computers and Signal …, 2007
432007
Steganalysis method for LSB replacement based on local gradient of image histogram
M Mahdavi, S Samavi, N Zaker, HM MODARES
Iranian Journal of Electrical and Electronic Engineering 4 (3), 59-70, 2008
302008
Sanub: A new method for sharing and analyzing news using blockchain
A Balouchestani, M Mahdavi, Y Hallaj, D Javdani
2019 16th International ISC (Iranian Society of Cryptology) Conference on …, 2019
132019
Security analysis of two key based watermarking schemes based on QR decomposition
S Arasteh, M Mahdavi, PN Bideh, S Hosseini, AA Chapnevis
Electrical Engineering (ICEE), Iranian Conference on, 1499-1504, 2018
132018
Targeted watermark removal of a SVD-based image watermarking scheme
P Nikbakht, M Mahdavi
2015 7th Conference on Information and Knowledge Technology (IKT), 1-6, 2015
122015
A dynamic timing-storage covert channel in vehicular ad hoc networks
S Taheri, M Mahdavi, N Moghim
Telecommunication Systems 69, 415-429, 2018
112018
A reliable and efficient micro-protocol for data transmission over an RTP-based covert channel
M Azadmanesh, M Mahdavi, B Shahgholi Ghahfarokhi
Multimedia Systems 26, 173-190, 2020
102020
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks.
A Mohseni-Ejiyeh, M Ashouri-Talouki, M Mahdavi
ISeCure 10 (1), 2018
92018
Adaptive ternary timing covert channel in IEEE 802.11
F Tahmasbi, N Moghim, M Mahdavi
Security and Communication Networks 9 (16), 3388-3400, 2016
92016
Blockchain for steganography: advantages, new algorithms and open challenges
O Torki, M Ashouri-Talouki, M Mahdavi
2021 18th International ISC Conference on Information Security and …, 2021
82021
Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications
PN Bideh, M Mahdavi, SE Borujeni, S Arasteh
Multimedia Tools and Applications 77, 31713-31735, 2018
72018
Code-based timing covert channel in IEEE 802.11
F Tahmasbi, N Moghim, M Mahdavi
2015 5th International Conference on Computer and Knowledge Engineering …, 2015
72015
Steganalysis of Embedding in Difference of Image Pixel Pairs by Neural Network.
V Sabeti, S Samavi, M Mahdavi, S Shirani
ISeCure 1 (1), 2009
72009
Targeted dewatermarking of two non-blind SVD-based image watermarking schemes
P Nikbakht, M Mahdavi
2015 5th International Conference on Computer and Knowledge Engineering …, 2015
62015
A lightweight and secure data sharing protocol for D2D communications
A Mohseni-Ejiyeh, M Ashouri-Talouki, M Mahdavi
2017 14th International ISC (Iranian Society of Cryptology) Conference on …, 2017
52017
F plus ks: A new feature selection strategy for steganalysis
MDM Hosseini, M Mahdavi
2015 International Symposium on Computer Science and Software Engineering …, 2015
42015
Robust audio watermarking based on HWD and SVD
S Karimimehr, S Samavi, HR Kaviani, M Mahdavi
20th Iranian Conference on Electrical Engineering (ICEE2012), 1363-1367, 2012
42012
Middleman covert channel establishment based on MORE routing protocol using network coding in ad hoc networks
S Akhtari, N Moghim, M Mahdavi
International Journal of Communication Systems 33 (7), e4320, 2020
32020
Image content dependent semi-fragile watermarking with localized tamper detection
S Hosseini, M Mahdavi
arXiv preprint arXiv:2106.14150, 2021
22021
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20