Ronak Karimi

  • Citations Per Year
Learn More
In this paper, we are going to have a survey on one of data hiding techniques called "Reversible Data Hiding (RDH)". Due to this, basic principles and notions of RHD are introduced. Also, primary techniques as the principles of RHD are talked. They are: Pair-Wise Logical Computation (PWLC) data hiding technique and Data Hiding by Template ranking with(More)
In this paper, we intend to introduce a steganography algorithm for embedding a message into a RGB 24bit color image. It will be done by using the concepts of linked list data structure. It will help us to achieve some important advantages. First, we can create a “stego-key” by the address of message blocks. Second, it makes the detection of message harder.(More)
This study offers a heuristic genetic algorithm based method for message hiding in a carrier image. This approach focuses on the "before embedding hiding techniques" by trying to find appropriate places in carrier image to embed the message with the least changes of bits. Due to it, segmentation is done in order to convert the LSBs and message strings to(More)
In this study, a branch of search algorithms that are called * (star) algorithms is taken to look. Star algorithms have different types and derivatives. They are A*, B*, D* (including original D*, Focused D* and D* Lite), IDA* and SMA*. Features, basic concepts, algorithm and the approaches of each type is investigated separately in this paper.
This paper will take a brief look at the usage of genetic algorithms in steganography. Steganography media which is subjected is image files. So, some of recent studies that introduce the steganography methods are listed and described in brief. As it is seen, robustness and capacity are two important factors that are considered in almost all steganography(More)
Recent studies in different fields of science caused emergence of needs for high performance computing systems like Cloud. A critical issue in design and implementation of such systems is resource allocation which is directly affected by internal and external factors like the number of nodes, geographical distance and communication latencies. Many(More)
The rapid development of data transfer through internet made it easier to send the data accurate and faster to the destination. Besides this, anyone can modify and misuse the valuable information through hacking at the same time. This paper presents video steganography with digital watermarking techniques as an efficient and robust tool for protection. This(More)
Network Intrusion Detection System (NIDS) is a security mechanism to monitor the behavior of the network; in case of any abnormal behavior inside of the network it should alert the Administrator about incoming intrusion. In the world of computer Prevention, Detection, Reaction is 3 layers of actions to an attack. By applying these layers we can increase(More)
Shapes detection from noisy backgrounds is one of the hot topics in the field of image processing and patter recognition. This paper investigates a new method which uses different filters like median and laplacian filter for reducing the effect of noise in the image and applies the canny edge detection algorithm. As the final step, a special form of Hough(More)