Steganalysis and payload estimation of embedding in pixel differences using neural networks V Sabeti, S Samavi, M Mahdavi, S Shirani Pattern Recognition 43 (1), 405-415, 2010 | 70 | 2010 |
Steganalysis of pixel-value differencing steganographic method V Sabeti, S Samavi, M Mahdavi, S Shirani 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal …, 2007 | 42 | 2007 |
Steganalysis method for LSB replacement based on local gradient of image histogram M Mahdavi, S Samavi, N Zaker, HM MODARES Iranian Journal of Electrical and Electronic Engineering 4 (3), 59-70, 2008 | 30 | 2008 |
Sanub: A new method for sharing and analyzing news using blockchain A Balouchestani, M Mahdavi, Y Hallaj, D Javdani 2019 16th International ISC (Iranian Society of Cryptology) Conference on …, 2019 | 13 | 2019 |
Security analysis of two key based watermarking schemes based on QR decomposition S Arasteh, M Mahdavi, PN Bideh, S Hosseini, AA Chapnevis Electrical Engineering (ICEE), Iranian Conference on, 1499-1504, 2018 | 13 | 2018 |
Targeted watermark removal of a SVD-based image watermarking scheme P Nikbakht, M Mahdavi 2015 7th Conference on Information and Knowledge Technology (IKT), 1-6, 2015 | 12 | 2015 |
A dynamic timing-storage covert channel in vehicular ad hoc networks S Taheri, M Mahdavi, N Moghim Telecommunication Systems 69, 415-429, 2018 | 11 | 2018 |
Blockchain for steganography: advantages, new algorithms and open challenges O Torki, M Ashouri-Talouki, M Mahdavi 2021 18th International ISC Conference on Information Security and …, 2021 | 10 | 2021 |
A reliable and efficient micro-protocol for data transmission over an RTP-based covert channel M Azadmanesh, M Mahdavi, B Shahgholi Ghahfarokhi Multimedia Systems 26, 173-190, 2020 | 10 | 2020 |
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks. A Mohseni-Ejiyeh, M Ashouri-Talouki, M Mahdavi ISeCure 10 (1), 2018 | 9 | 2018 |
Adaptive ternary timing covert channel in IEEE 802.11 F Tahmasbi, N Moghim, M Mahdavi Security and Communication Networks 9 (16), 3388-3400, 2016 | 9 | 2016 |
Steganalysis of Embedding in Difference of Image Pixel Pairs by Neural Network. V Sabeti, S Samavi, M Mahdavi, S Shirani ISeCure 1 (1), 2009 | 8 | 2009 |
Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications PN Bideh, M Mahdavi, SE Borujeni, S Arasteh Multimedia Tools and Applications 77, 31713-31735, 2018 | 7 | 2018 |
Code-based timing Covert channel in IEEE 802.11 F Tahmasbi, N Moghim, M Mahdavi 2015 5th International Conference on Computer and Knowledge Engineering …, 2015 | 7 | 2015 |
Targeted dewatermarking of two non-blind SVD-based image watermarking schemes P Nikbakht, M Mahdavi 2015 5th International Conference on Computer and Knowledge Engineering …, 2015 | 6 | 2015 |
A lightweight and secure data sharing protocol for D2D communications A Mohseni-Ejiyeh, M Ashouri-Talouki, M Mahdavi 2017 14th International ISC (Iranian Society of Cryptology) Conference on …, 2017 | 5 | 2017 |
A semi-blind watermarking method for authentication of face images using autoencoders S Khalilidan, M Mahdavi, A Balouchestani, Z Moti, Y Hallaj 2020 6th International Conference on Web Research (ICWR), 229-233, 2020 | 4 | 2020 |
F plus ks: A new feature selection strategy for steganalysis MDM Hosseini, M Mahdavi 2015 International Symposium on Computer Science and Software Engineering …, 2015 | 4 | 2015 |
Robust audio watermarking based on HWD and SVD S Karimimehr, S Samavi, HR Kaviani, M Mahdavi 20th Iranian Conference on Electrical Engineering (ICEE2012), 1363-1367, 2012 | 4 | 2012 |
Middleman covert channel establishment based on MORE routing protocol using network coding in ad hoc networks S Akhtari, N Moghim, M Mahdavi International Journal of Communication Systems 33 (7), e4320, 2020 | 3 | 2020 |