Mojtaba Mahdavi

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2023
Hierarchical Deterministic Wallets for Secure Steganography in Blockchain.
ISC Int. J. Inf. Secur., 2023

Introducing a New Evaluation Criteria for EMD-Base Steganography Method.
CoRR, 2023

Fully Parallel and Reconfigurable Realization of DFT/IDFT using In-Memory Computing.
Proceedings of the 10th International Conference on Wireless Networks and Mobile Communications, 2023

A Critical Look at Recent Trends in Compression of Channel State Information.
Proceedings of the IEEE International Conference on Acoustics, 2023

A Novel Memristive-Based Data Reordering Scheme.
Proceedings of the 26th Euromicro Conference on Digital System Design, 2023

2021
Image content dependent semi-fragile watermarking with localized tamper detection.
CoRR, 2021

Blockchain for steganography: advantages, new algorithms and open challenges.
Proceedings of the 18th International ISC Conference on Information Security and Cryptology, 2021

2020
Middleman covert channel establishment based on MORE routing protocol using network coding in ad hoc networks.
Int. J. Commun. Syst., 2020

Full Quaternion Representation of Color images: A Case Study on QSVD-based Color Image Compression.
CoRR, 2020

2019
SANUB: A new method for Sharing and Analyzing News Using Blockchain.
Proceedings of the 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2019

2018
A dynamic timing-storage covert channel in vehicular ad hoc networks.
Telecommun. Syst., 2018

Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications.
Multim. Tools Appl., 2018

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks.
ISC Int. J. Inf. Secur., 2018

2017
A 13 Gbps, 0.13 μm CMOS, Multiplication-Free MIMO Detector.
J. Signal Process. Syst., 2017

A Lightweight and Secure Data Sharing Protocol for D2D Communications.
Proceedings of the 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology, 2017

2016
INCP: Practical Wireless Network Coding for Multiple Unicast Sessions.
Wirel. Pers. Commun., 2016

Adaptive ternary timing covert channel in IEEE 802.11.
Secur. Commun. Networks, 2016

Counterfeiting attack on adjusted expanded-bit multiscale quantization-based semi-fragile watermarking technique.
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016

Feature extraction for detection of watermarking algorithm.
Proceedings of the 13th International Iranian Society of Cryptology Conference on Information Security and Cryptology, 2016

2013
Novel MIMO Detection Algorithm for High-Order Constellations in the Complex Domain.
IEEE Trans. Very Large Scale Integr. Syst., 2013

An efficient VLSI architecture of QPP interleaver/deinterleaver for LTE turbo coding.
Proceedings of the 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013), 2013

2012
A low-complexity high-throughput ASIC for the SC-FDMA MIMO detectors.
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012

2010
Steganalysis and payload estimation of embedding in pixel differences using neural networks.
Pattern Recognit., 2010

Real-Time Steganalysis of LSB-Replacement in Digital Audio Streams.
J. Circuits Syst. Comput., 2010

2009
Steganalysis of embedding in difference of image pixel pairs by neural network.
ISC Int. J. Inf. Secur., 2009


  Loading...