Saman Shojae Chaeikar
Saman Shojae Chaeikar
Assistant Professor at Iranians University, e-Institute of Higher Education
E-mail confirmado em
Citado por
Citado por
Genetic substitution-based audio steganography for high capacity applications
M Zamani, AB Abdul Manaf, HR Zeidanloo, S Shojae Chaeikar
International Journal of Internet Technology and Secured Transactions 3 (1 …, 2011
A novel approach for genetic audio watermarking
M Zamani, AA Manaf, R Ahmad, F Jaryani, H Taherdoost, ...
Journal of Information Assurance and Security 5 (1), 102-111, 2010
Correlation between PSNR and bit per sample rate in audio steganography
M Zamani, ABA Manaf, SM Abdullah, S Shojae Chaeikar
11th International Conference on Signal Processing (SIP'12), 163-168, 2012
A proposed framework for P2P Botnet detection
HR Zeidanloo, ABA Manaf, RB Ahmad, M Zamani, S Shojae Chaeikar
International Journal of Engineering and Technology 2 (2), 161, 2010
Genetic Audio Watermarking
M Zamani, ABA Manaf, RB Ahmad, F Jaryani, S Shojae Chaeikar
Springer Berlin Heidelberg, 2010
Mazdak Technique for PSNR Estimation in Audio Steganography
M Zamani, ABA Manaf, SM Abdullah, S Shojae Chaeikar
2012 International Conference on Mechanical and Electrical Technology (ICMET …, 2012
Genetic audio steganography
M Zamani, AA Manaf, R Ahmad, F Jaryani, H Taherdoost, ...
International Journal on Recent Trends in Engineering & Technology [IJRTET …, 2010
PSW statistical LSB image steganalysis
S Shojae Chaeikar, M Zamani, ABA Manaf, AM Zeki
Multimedia Tools and Applications 77 (1), 805-835, 2018
Definitions and criteria of CIA security triangle in electronic voting system
S Shojae Chaeikar, M Jafari, H Taherdoost, N Shojae Chaei Kar
International Journal of Advanced Computer Science and Information …, 2013
Smart card adoption model: Social and ethical perspectives
H Taherdoost, S Sahibuddin, M Namayandeh, N Jalaliyoon, A Kalantari, ...
Science 3 (4), 2012
Interpretative key management (IKM), A novel framework
S Shojae Chaeikar, SA Razak, S Honarbakhsh, HR Zeidanloo, M Zamani, ...
2010 Second International Conference on Computer Research and Development …, 2010
A Prospective Study of Mobile Cloud Computing
M Alizadeh, WH Hassan, M Zamani, T Khodadadi, S Shojae Chaeikar
International Journal of Advancements in Computing Technology(IJACT) 5 (11 …, 2013
Comparative analysis of Master-key and Interpretative Key Management (IKM) frameworks
S Shojae Chaeikar, ABA Manaf, M Zamani
Cryptography and security in computing, 203-218, 2012
Security features comparison of master key and IKM cryptographic key management for researchers and developers
S Yazdanpanah, S Shojae Chaeikar, M Zamani, R Kourdi
Proceedings of the 3rd International Conference on Software Technology and …, 2011
Ensemble SW image steganalysis: A low dimension method for LSBR detection
S Shojae Chaeikar, A Ahmadi
Signal Processing: Image Communication 70, 233-245, 2019
Electronic Voting Systems for European Union Countries
S Shojae Chaeikar, M Zamani, ...
Journal of next Generation Information Technology 4 (5.3), 16-26, 2013
Cryptography and Security in Computing
J Sen
BoD–Books on Demand, 2012
Node Based Interpretative Key Management Framework
S Shojae Chaeikar, H Sabet Moghaddam, H Rouhani Zeidanloo
Proceedings of The 2010 Congress in Computer science, Computer engineering …, 2010
SW: a blind LSBR image steganalysis technique
S Shojae Chaeikar, A Ahmadi
Proceedings of the 10th International Conference on Computer Modeling and …, 2018
IKM-based Security Usability Enhancement Model
S Yazdanpanah, S Shojae Chaeikar
IRACST-International Journal of Computer Science and Information Technology …, 2012
O sistema não pode executar a operação agora. Tente novamente mais tarde.
Artigos 1–20