Samaneh Ghandali

Learn More
— Signature verification and Identification has great importance for authentication purpose. Persian signatures are different from other signature types because people usually do not use text in it and they draw a shape as their signature, therefore, a different approach should be considered to process such signatures. In this paper, a method for off-line(More)
This paper presents a novel diagnosis and logic debugging method for gate-level arithmetic circuits. It detects logic bugs in a synthesized circuit caused by using a wrong gate ("gate replacement" error), which change the functionality of the circuit. The method is based on modeling the circuit in an algebraic domain and computing its algebraic "signature".(More)
In this paper a novel steganography technique based on the combination of a secret sharing method and wavelet transform is presented. In this method, a secret image is shared into some shares. Then, the shares and Fletcher- 16 checksum of shares are hidden into cover images using an integer wavelet based steganography technique. In the decoding part, the(More)
The signature verification system is always the most sought after biometric verification system. Being a behavioral biometric trait which can be imitated, the researcher faces a challenge in designing such a system to counter intrapersonal and interpersonal variations. This papers presents DWT based Off-line Signature Verification using Angular Features(More)
Over the last decade, hardware Trojans have gained increasing attention in academia, industry and by government agencies. In order to design reliable countermeasures, it is crucial to understand how hardware Trojans can be built in practice. This is an area that has received relatively scant treatment in the literature. In this contribution, we examine how(More)
(2012) 'A new system for offline signature identification and verification', Int. in Iran. His research interests are in image processing and pattern recognition specially using artificial intelligence techniques such as image security, watermarking, blurring. He is also interest in operating system fields such as scheduling and security. He has several(More)