An introduction to image steganography techniques

AAJ Altaay, SB Sahib, M Zamani - … international conference on …, 2012 - ieeexplore.ieee.org
Steganography is a form of security technique through obscurity, the science and art of
hiding the existence of a message between sender and intended recipient. Steganography …

Methods of pornography detection

S Karamizadeh, A Arabsorkhi - … of the 10th international conference on …, 2018 - dl.acm.org
In recent years, prone images and other such indecent matter are available on the social
media and the Internet for children. Filtering of image porn has become one of the big …

SIKM–a smart cryptographic key management framework

SS Chaeikar, A Ahmadi, S Karamizadeh… - Open Computer …, 2022 - degruyter.com
For a secure data transmission in symmetric cryptography, data are encrypted and
decrypted using an identical key. The process of creating, distributing, storing, deploying …

Secure SMS transmission based on social network messages

SS Chaeikar, S Yazdanpanah… - International Journal of …, 2021 - inderscienceonline.com
Nowadays, short message communication has a wide range of applications in modern lives.
Authentication, announcements, reports, and personal communications are the common …

[PDF][PDF] A secure model for prevention of black hole attack in wireless mobile ad hoc networks

TK Araghi, M Zamani, ABA Manaf… - … conference on applied …, 2013 - academia.edu
Implementing Ad hoc networks are becoming very prevalent during recent years. Security is
the most important issue for developing mobile ad hoc networks (MANETs). They expose to …

SW: A blind LSBR image steganalysis technique

SS Chaeikar, A Ahmadi - … of the 10th International Conference on …, 2018 - dl.acm.org
Blind image steganalysis is exploring body of digital images for the likely presence of hidden
secret messages without knowledge of the employed steganographic technique. This paper …

[PDF][PDF] IKM-based security usability enhancement model

S Yazdanpanah, SS Chaeikar - IRACST-International Journal of …, 2012 - researchgate.net
Today by growth of hardware and software technologies new developed products are
delivering more facilities while their security configuration is becoming more and more …

[PDF][PDF] Multimedia Data Hiding Evaluation Metrics

AAJ Al-Taay, SB Sahib, M Zamani - Recent Researches in …, 2013 - academia.edu
Multimedia Data Hiding Evaluation Metrics Page 1 Multimedia Data Hiding Evaluation Metrics
ALAA A. JABBAR AL-TAAY 1 , SHAHRIN BIN SAHIB 2 Faculty of Information & Communication …

[PDF][PDF] Secure SMS Method Based on Social Networks

S Yazdanpanah, S Shojae Chaeikar - International Journal of …, 2016 - academia.edu
ABSTRACT Nowadays, Short Message Service (SMS) communications play important role
in daily lives. Authentication, reports and personal communications are the common …

[PDF][PDF] A survey for prevention of black hole attacks in wireless mobile adhoc networks using cryptographic techniques

TK Araghi, M Zamani, ABA Manaf… - Latest Trends in …, 2014 - researchgate.net
Since MANET is getting more ubiquitous, the need for offering sufficient security
mechanisms in them seems noticeable. The security schemes measured in such networks …