Volume 15 (2023)
Volume 14 (2022)
Volume 13 (2021)
Volume 12 (2020)
Volume 11 (2019)
Volume 10 (2018)
Volume 9 (2017)
Volume 8 (2016)
Volume 7 (2015)
Volume 6 (2014)
Volume 4 (2012)
Volume 3 (2011)
Volume 2 (2010)
Volume 1 (2009)
Review Article
A survey on digital data hiding schemes: principals, algorithms, and applications

M. A. Akhaee; F. Marvasti

Volume 5, Issue 1 , January 2013, Pages 5-36


  This paper investigates digital data hiding schemes. The concept of information hiding will be explained at first, and its traits, requirements, and applications will be described subsequently. In order to design a digital data hiding system, one should first become familiar with the concepts and criteria ...  Read More

Research Article
Design and formal verification of DZMBE+

M. Soodkhah Mohammadi; A. Ghaemi Bafghi

Volume 5, Issue 1 , January 2013, Pages 37-53


  In this paper, a new broadcast encryption scheme is presented based on threshold secret sharing and secure multiparty computation. This scheme is maintained to be dynamic in that a broadcaster can broadcast a message to any of the dynamic groups of users in the system and it is also fair in the sense ...  Read More

Research Article
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC

M. Sabzinejad Farash; M. Ahmadian Attari

Volume 5, Issue 1 , January 2013, Pages 55-70


  Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public ...  Read More

Research Article
DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers

M. Ghiasi; A. Sami; Z. Salehi

Volume 5, Issue 1 , January 2013, Pages 71-82


  To control the exponential growth of malware files, security analysts pursue dynamic approaches that automatically identify and analyze malicious software samples. Obfuscation and polymorphism employed by malwares make it difficult for signature-based systems to detect sophisticated malware files. The ...  Read More

Research Article
Robust multiplicative video watermarking using statistical modeling

A. Diyanat; M. A. Akhaee; Sh. Ghaemmaghami

Volume 5, Issue 1 , January 2013, Pages 83-95


  The present paper is intended to present a robust multiplicative video watermarking scheme. In this regard, the video signal is segmented into 3-D blocks like cubes, and then, the 3-D wavelet transform is applied to each block. The low frequency components of the wavelet coefficients are then used for ...  Read More

Research Article
Image encryption based on chaotic tent map in time and frequency domains

E. Hassani; M. Eshghi

Volume 5, Issue 1 , January 2013, Pages 97-110


  The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is ...  Read More