An introduction to image steganography techniques
Steganography is a form of security technique through obscurity, the science and art of
hiding the existence of a message between sender and intended recipient. Steganography …
hiding the existence of a message between sender and intended recipient. Steganography …
Methods of pornography detection
S Karamizadeh, A Arabsorkhi - … of the 10th international conference on …, 2018 - dl.acm.org
In recent years, prone images and other such indecent matter are available on the social
media and the Internet for children. Filtering of image porn has become one of the big …
media and the Internet for children. Filtering of image porn has become one of the big …
SIKM–a smart cryptographic key management framework
SS Chaeikar, A Ahmadi, S Karamizadeh… - Open Computer …, 2022 - degruyter.com
For a secure data transmission in symmetric cryptography, data are encrypted and
decrypted using an identical key. The process of creating, distributing, storing, deploying …
decrypted using an identical key. The process of creating, distributing, storing, deploying …
Secure SMS transmission based on social network messages
SS Chaeikar, S Yazdanpanah… - International Journal of …, 2021 - inderscienceonline.com
Nowadays, short message communication has a wide range of applications in modern lives.
Authentication, announcements, reports, and personal communications are the common …
Authentication, announcements, reports, and personal communications are the common …
[PDF][PDF] A secure model for prevention of black hole attack in wireless mobile ad hoc networks
Implementing Ad hoc networks are becoming very prevalent during recent years. Security is
the most important issue for developing mobile ad hoc networks (MANETs). They expose to …
the most important issue for developing mobile ad hoc networks (MANETs). They expose to …
SW: A blind LSBR image steganalysis technique
SS Chaeikar, A Ahmadi - … of the 10th International Conference on …, 2018 - dl.acm.org
Blind image steganalysis is exploring body of digital images for the likely presence of hidden
secret messages without knowledge of the employed steganographic technique. This paper …
secret messages without knowledge of the employed steganographic technique. This paper …
[PDF][PDF] IKM-based security usability enhancement model
S Yazdanpanah, SS Chaeikar - IRACST-International Journal of …, 2012 - researchgate.net
Today by growth of hardware and software technologies new developed products are
delivering more facilities while their security configuration is becoming more and more …
delivering more facilities while their security configuration is becoming more and more …
[PDF][PDF] Multimedia Data Hiding Evaluation Metrics
Multimedia Data Hiding Evaluation Metrics Page 1 Multimedia Data Hiding Evaluation Metrics
ALAA A. JABBAR AL-TAAY 1 , SHAHRIN BIN SAHIB 2 Faculty of Information & Communication …
ALAA A. JABBAR AL-TAAY 1 , SHAHRIN BIN SAHIB 2 Faculty of Information & Communication …
[PDF][PDF] Secure SMS Method Based on Social Networks
S Yazdanpanah, S Shojae Chaeikar - International Journal of …, 2016 - academia.edu
ABSTRACT Nowadays, Short Message Service (SMS) communications play important role
in daily lives. Authentication, reports and personal communications are the common …
in daily lives. Authentication, reports and personal communications are the common …
[PDF][PDF] A survey for prevention of black hole attacks in wireless mobile adhoc networks using cryptographic techniques
Since MANET is getting more ubiquitous, the need for offering sufficient security
mechanisms in them seems noticeable. The security schemes measured in such networks …
mechanisms in them seems noticeable. The security schemes measured in such networks …