Follow
mojtaba mahdavi
mojtaba mahdavi
Professor of Information Technology, University of Isfahan
Verified email at eng.ui.ac.ir
Title
Cited by
Cited by
Year
Steganalysis and payload estimation of embedding in pixel differences using neural networks
V Sabeti, S Samavi, M Mahdavi, S Shirani
Pattern Recognition 43 (1), 405-415, 2010
642010
Steganalysis of pixel-value differencing steganographic method
V Sabeti, S Samavi, M Mahdavi, S Shirani
2007 IEEE Pacific Rim Conference on Communications, Computers and Signal …, 2007
432007
Steganalysis method for LSB replacement based on local gradient of image histogram
M Mahdavi, S Samavi, N Zaker, HM MODARES
Iranian Journal of Electrical and Electronic Engineering 4 (3), 59-70, 2008
302008
Sanub: A new method for sharing and analyzing news using blockchain
A Balouchestani, M Mahdavi, Y Hallaj, D Javdani
2019 16th International ISC (Iranian Society of Cryptology) Conference on …, 2019
132019
Security analysis of two key based watermarking schemes based on QR decomposition
S Arasteh, M Mahdavi, PN Bideh, S Hosseini, AA Chapnevis
Electrical Engineering (ICEE), Iranian Conference on, 1499-1504, 2018
132018
Targeted watermark removal of a SVD-based image watermarking scheme
P Nikbakht, M Mahdavi
2015 7th Conference on Information and Knowledge Technology (IKT), 1-6, 2015
122015
A dynamic timing-storage covert channel in vehicular ad hoc networks
S Taheri, M Mahdavi, N Moghim
Telecommunication Systems 69, 415-429, 2018
112018
A reliable and efficient micro-protocol for data transmission over an RTP-based covert channel
M Azadmanesh, M Mahdavi, B Shahgholi Ghahfarokhi
Multimedia Systems 26, 173-190, 2020
102020
An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks.
A Mohseni-Ejiyeh, M Ashouri-Talouki, M Mahdavi
ISeCure 10 (1), 2018
92018
Adaptive ternary timing covert channel in IEEE 802.11
F Tahmasbi, N Moghim, M Mahdavi
Security and Communication Networks 9 (16), 3388-3400, 2016
92016
Blockchain for steganography: advantages, new algorithms and open challenges
O Torki, M Ashouri-Talouki, M Mahdavi
2021 18th International ISC Conference on Information Security and …, 2021
82021
Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications
PN Bideh, M Mahdavi, SE Borujeni, S Arasteh
Multimedia Tools and Applications 77, 31713-31735, 2018
72018
Code-based timing covert channel in IEEE 802.11
F Tahmasbi, N Moghim, M Mahdavi
2015 5th International Conference on Computer and Knowledge Engineering …, 2015
72015
Steganalysis of Embedding in Difference of Image Pixel Pairs by Neural Network.
V Sabeti, S Samavi, M Mahdavi, S Shirani
ISeCure 1 (1), 2009
72009
Targeted dewatermarking of two non-blind SVD-based image watermarking schemes
P Nikbakht, M Mahdavi
2015 5th International Conference on Computer and Knowledge Engineering …, 2015
62015
A lightweight and secure data sharing protocol for D2D communications
A Mohseni-Ejiyeh, M Ashouri-Talouki, M Mahdavi
2017 14th International ISC (Iranian Society of Cryptology) Conference on …, 2017
52017
F plus ks: A new feature selection strategy for steganalysis
MDM Hosseini, M Mahdavi
2015 International Symposium on Computer Science and Software Engineering …, 2015
42015
Robust audio watermarking based on HWD and SVD
S Karimimehr, S Samavi, HR Kaviani, M Mahdavi
20th Iranian Conference on Electrical Engineering (ICEE2012), 1363-1367, 2012
42012
Middleman covert channel establishment based on MORE routing protocol using network coding in ad hoc networks
S Akhtari, N Moghim, M Mahdavi
International Journal of Communication Systems 33 (7), e4320, 2020
32020
Image content dependent semi-fragile watermarking with localized tamper detection
S Hosseini, M Mahdavi
arXiv preprint arXiv:2106.14150, 2021
22021
The system can't perform the operation now. Try again later.
Articles 1–20