Mazdak Zamani

Orcid: 0000-0002-6421-0053

According to our database1, Mazdak Zamani authored at least 22 papers between 2009 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Framework for Video Steganography Using Integer Wavelet Transform and JPEG Compression.
Future Internet, 2022

Comparison of Data Hiding Techniques for Video Watermarking Applications.
Proceedings of the 7th International Conference on Computer and Communication Systems, 2022

2019
An Optimized Approach for Secure Data Transmission Using Spread Spectrum Audio Steganography, Chaos Theory, and Social Impact Theory Optimizer.
J. Comput. Networks Commun., 2019

A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices.
J. Comput. Networks Commun., 2019

2018
PSW statistical LSB image steganalysis.
Multim. Tools Appl., 2018

2017
Comments and improvements of "HOTA: Handover optimized ticket-based authentication in network-based mobility management".
Proceedings of the 20th Conference on Innovations in Clouds, Internet and Networks, 2017

2016
A robust video watermarking technique for the tamper detection of surveillance systems.
Multim. Tools Appl., 2016

Authentication in mobile cloud computing: A survey.
J. Netw. Comput. Appl., 2016

Innovations in Communications Security.
J. Electr. Comput. Eng., 2016

2015
Genetic algorithm for fragile audio watermarking.
Telecommun. Syst., 2015

Efficient Intelligent Energy Routing Protocol in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

2014
Energy Efficient Routing in Wireless Sensor Networks Based on Fuzzy Ant Colony Optimization.
Int. J. Distributed Sens. Networks, 2014

2013
Pixel Correlation Behavior in Different Themes.
Proceedings of the Geo-Informatics in Resource Management and Sustainable Ecosystem, 2013

Correlation Analysis of the Four Photo Themes in Five Layers.
Proceedings of the Geo-Informatics in Resource Management and Sustainable Ecosystem, 2013

2012
A trust based model for federated identity architecture to mitigate identity theft.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

A survey on security issues of federated identity in the cloud computing.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

A Novel Approach for Rogue Access Point Detection on the Client-Side.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

2010
Capacity and quality improvement in reversible image watermarking approach.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

Genetic Audio Watermarking.
Proceedings of the Information Processing and Management, 2010

2009
A secure audio steganography approach.
Proceedings of the 4th International Conference for Internet Technology and Secured Transactions, 2009

Genetic Algorithm as an Approach to Resolve the Problems of Substitution Techniques of Audio Steganography.
Proceedings of the 2009 International Conference on Genetic and Evolutionary Methods, 2009

A Novel Approach for Audio Watermarking.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...