Abolfazl Diyanat

Learn More
Several analytical models of different wireless networking schemes such as wireless LANs and meshes have been reported in the literature. To the best of our knowledge, all these models fail to address the accurate end-to-end delay analysis of multi-hop wireless networks under unsaturated traffic condition considering the hidden and exposed terminal(More)
Multi-dimensional spatial analysis of image pixels have not been much investigated for the steganalysis of the LSB Steganographic methods. Pixel distribution based steganalysis methods could be thwarted by intelligently compensating statistical characteristics of image pixels, as reported in several papers. Simple LSB replacement methods have been improved(More)
We propose a novel image steganalysis method, based on singular value decomposition and noise estimation, for the spatial domain LSB embedding families. We first define a content independence parameter, DS, that is calculated for each LSB embedding rate. Next, we estimate the DS curve and use noise estimation to improve the curve approximation accuracy. It(More)
Non-local means (a.k.a. NL-means) method for image de-noising averages the similar parts of an image to reduce random noise. The de-noising performance of the algorithm, however, highly depends on the values of its parameters. In this paper, we introduce a method for finding the optimum parameters, present a linear estimation for the h parameter, and(More)
So far, various components of image characteristics have been used for steganalysis, including the histogram characteristic function, adjacent colors distribution, and sample pair analysis. However, some certain steganography methods have been proposed that can thwart some analysis approaches through managing the embedding patterns. In this regard, the(More)
Recent studies reveal that an adversary might trace the apparently insignificant traffic rate of source nodes over the net and turn such data to invaluable information so as to breach the privacy of the victim sources. Inhibiting the adversary of being able to extract information from the traffic rate of source nodes is a complicated task unless taking into(More)
In this paper, a robust multiplicative video watermarking scheme is presented. We segment the video signal into 3-D blocks like cubes, and then apply 3-D wavelet transform to each block. The watermark is inserted through multiplying the low frequency wavelet coefficients by a constant parameter that controls the power of the watermark. The proposed(More)