Ronak Karimi

Learn More
In this paper, we intend to introduce a steganography algorithm for embedding a message into a RGB 24-bit color image. It will be done by using the concepts of linked list data structure. It will help us to achieve some important advantages. First, we can create a " stego-key " by the address of message blocks. Second, it makes the detection of message(More)
This paper will take a brief look at the usage of genetic algorithms in steganography. Steganography media which is subjected is image files. So, some of recent studies that introduce the steganography methods are listed and described in brief. As it is seen, robustness and capacity are two important factors that are considered in almost all steganography(More)
In this paper, we are going to introduce different types of steganography considering the cover data. As the first step, we will talk about text steganography and investigate its details. Then, image steganography and its techniques will be investigated. Some techniques including Least Significant Bits, Masking and filtering and Transformations will be(More)
Recent studies in different fields of science caused emergence of needs for high performance computing systems like Cloud. A critical issue in design and implementation of such systems is resource allocation which is directly affected by internal and external factors like the number of nodes, geographical distance and communication latencies. Many(More)
In this paper, we are going to introduce different types of steganography considering the cover data. As the first step, we will talk about text steganography and investigate its details. Then, image steganography and its techniques will be investigated. Some techniques including Least Significant Bits, Masking and filtering and Transformations will be(More)
In this research, we present a heuristic method for character recognition. For this purpose, a sketch is constructed from the image that contains the character to be recognized. This sketch contains the most important pixels of image that are representatives of original image. These points are the most probable points in pixel-by-pixel matching of image(More)
In this paper, we intend to introduce a new heuristic algorithm to apply maximum minimization to Boolean functions with normal SOP form. To implement the proposed algorithm, we use the graph data structure and define the adjacencies. Also, we demonstrate some conditions to achieve the maximum minimization. Through this paper, the problem of shared vertices(More)
One of the challenging topics in image processing is extracting the shapes from noisy backgrounds. There are some methods for doing it from different kinds of noisy backgrounds. In this paper, we are going to introduce another method by using 4 steps to extract circular shapes from impulse noisy backgrounds. First step is applying median filter to disappear(More)