Hamed Nosrati

  • Citations Per Year
Learn More
In this paper, we intend to introduce a steganography algorithm for embedding a message into a RGB 24bit color image. It will be done by using the concepts of linked list data structure. It will help us to achieve some important advantages. First, we can create a “stego-key” by the address of message blocks. Second, it makes the detection of message harder.(More)
In this paper, we propose using distributed diffusion adaptive networks for acoustic signature identification, as a time-varying autoregressive (TVAR) stochastic model. A distributed adaptive sensor network considers spatio-temporal challenges simultaneously. To analyze diffusion networks under TVAR modeling problem circumstances, we investigate and(More)
In this paper, we propose three different algorithms capable of facing spatio-temporal variations for parametric modeling and power spectral density (PSD) estimation using Wireless Sensor Networks (WSNs). To do this, we first validate the proposed algorithms using theoretical and mathematical formulations. Afterwards, employing simulation tasks supports the(More)
In this paper, we thoroughly investigate the tracking behavior of a wide range of adaptive networks under non-stationary conditions. Under these conditions, we study and analyze the mean-square-error performance of all centralized, incremental, and diffusion algorithms for adaptive networks. The closed forms of the steady-state mean-square deviation (MSD)(More)
In this paper, we are going to introduce different types of steganography considering the cover data. As the first step, we will talk about text steganography and investigate its details. Then, image steganography and its techniques will be investigated. Some techniques including Least Significant Bits, Masking and filtering and Transformations will be(More)
An ¿-stable one-step integration formula, called the modified Butcher (MB), is presented and is shown to have an order of accuracy p = 3, when the differential system is linear, and p = 2 otherwise. A method for evaluating the local truncation error of the formula is also suggested. Finally, the main features of this formula, vis-a-vis the trapezoidal, are(More)
The increase in the number of degrees of freedoms (DoF) that is afforded by multiple-input-multiple-output (MIMO) phased arrays is accompanied by an increase in hardware and computational costs. We mitigate this problem in a collocated MIMO phased array system by employing a selection strategy where a subset of K transmitter-receiver (Tx-Rx) pairs is chosen(More)
One of the challenging topics in image processing is extracting the shapes from noisy backgrounds. There are some methods for doing it from different kinds of noisy backgrounds. In this paper, we are going to introduce another method by using 4 steps to extract circular shapes from impulse noisy backgrounds. First step is applying median filter to disappear(More)
In this paper, we propose employing distributed incremental adaptive networks for the aim of acoustic signature identification, as a time-varying autoregressive (TVAR) stochastic model. A distributed adaptive sensor network considers spatiotemporal challenges simultaneously. By formulating the problem under non-stationary conditions, we proceed showing the(More)
  • 1