Genetic substitution-based audio steganography for high capacity applications M Zamani, AB Abdul Manaf, HR Zeidanloo, S Shojae Chaeikar International Journal of Internet Technology and Secured Transactions 3 (1 …, 2011 | 31 | 2011 |
A novel approach for genetic audio watermarking M Zamani, AA Manaf, R Ahmad, F Jaryani, H Taherdoost, ... Journal of Information Assurance and Security 5 (1), 102-111, 2010 | 31 | 2010 |
Correlation between PSNR and bit per sample rate in audio steganography M Zamani, ABA Manaf, SM Abdullah, S Shojae Chaeikar 11th International Conference on Signal Processing (SIP'12), 163-168, 2012 | 29 | 2012 |
A proposed framework for P2P Botnet detection HR Zeidanloo, ABA Manaf, RB Ahmad, M Zamani, S Shojae Chaeikar International Journal of Engineering and Technology 2 (2), 161, 2010 | 26 | 2010 |
Genetic Audio Watermarking M Zamani, ABA Manaf, RB Ahmad, F Jaryani, S Shojae Chaeikar Springer Berlin Heidelberg, 2010 | 26 | 2010 |
Mazdak Technique for PSNR Estimation in Audio Steganography M Zamani, ABA Manaf, SM Abdullah, S Shojae Chaeikar 2012 International Conference on Mechanical and Electrical Technology (ICMET …, 2012 | 25* | 2012 |
Genetic audio steganography M Zamani, AA Manaf, R Ahmad, F Jaryani, H Taherdoost, ... International Journal on Recent Trends in Engineering & Technology [IJRTET …, 2010 | 24 | 2010 |
PSW statistical LSB image steganalysis S Shojae Chaeikar, M Zamani, ABA Manaf, AM Zeki Multimedia Tools and Applications 77 (1), 805-835, 2018 | 19 | 2018 |
Definitions and criteria of CIA security triangle in electronic voting system S Shojae Chaeikar, M Jafari, H Taherdoost, N Shojae Chaei Kar International Journal of Advanced Computer Science and Information …, 2013 | 18* | 2013 |
Smart card adoption model: Social and ethical perspectives H Taherdoost, S Sahibuddin, M Namayandeh, N Jalaliyoon, A Kalantari, ... Science 3 (4), 2012 | 16 | 2012 |
Interpretative key management (IKM), A novel framework S Shojae Chaeikar, SA Razak, S Honarbakhsh, HR Zeidanloo, M Zamani, ... 2010 Second International Conference on Computer Research and Development …, 2010 | 16 | 2010 |
A Prospective Study of Mobile Cloud Computing M Alizadeh, WH Hassan, M Zamani, T Khodadadi, S Shojae Chaeikar International Journal of Advancements in Computing Technology(IJACT) 5 (11 …, 2013 | 15* | 2013 |
Comparative analysis of Master-key and Interpretative Key Management (IKM) frameworks S Shojae Chaeikar, ABA Manaf, M Zamani Cryptography and security in computing, 203-218, 2012 | 12 | 2012 |
Security features comparison of master key and IKM cryptographic key management for researchers and developers S Yazdanpanah, S Shojae Chaeikar, M Zamani, R Kourdi Proceedings of the 3rd International Conference on Software Technology and …, 2011 | 10 | 2011 |
Ensemble SW image steganalysis: A low dimension method for LSBR detection S Shojae Chaeikar, A Ahmadi Signal Processing: Image Communication 70, 233-245, 2019 | 9 | 2019 |
Electronic Voting Systems for European Union Countries S Shojae Chaeikar, M Zamani, ... Journal of next Generation Information Technology 4 (5.3), 16-26, 2013 | 7 | 2013 |
Cryptography and Security in Computing J Sen BoD–Books on Demand, 2012 | 5 | 2012 |
Node Based Interpretative Key Management Framework S Shojae Chaeikar, H Sabet Moghaddam, H Rouhani Zeidanloo Proceedings of The 2010 Congress in Computer science, Computer engineering …, 2010 | 5* | 2010 |
SW: a blind LSBR image steganalysis technique S Shojae Chaeikar, A Ahmadi Proceedings of the 10th International Conference on Computer Modeling and …, 2018 | 2 | 2018 |
IKM-based Security Usability Enhancement Model S Yazdanpanah, S Shojae Chaeikar IRACST-International Journal of Computer Science and Information Technology …, 2012 | 2 | 2012 |