Seyed Alireza Seyedin

Learn More
We have presented a new active steganalysis method in order to break the block-discrete cosine transform (DCT) coefficients steganography. Our method is based on a combination of the Blind Source Separation (BSS) technique and Maximum A posteriori (MAP) estimator. We have additionally introduced a new geometrical BSS method based on the minimum range of(More)
In this paper, we present an optimal Discrete Wavelet Transform-Singular Value Decomposition (DWT-SVD) based image watermarking scheme using Pareto-based Multi-Objective Evolutionary Algorithm (MOEA). After decomposing the cover image into four bands, we apply the SVD to each band, and the singular values of each sub-band of the host image are modified by(More)
—Reliable transmission of a pair of arbitrarily correlated sources over a discrete memoryless cognitive radio channel is studied. We derive a sufficient condition for lossless transmission of such communication scenario using superposition coding, correlation preserving technique, random source partition, a binning scheme and joint typicality decoding. This(More)
—The additive exponential noise channel with additive exponential interference (AENC-AEI) known non-causally at the transmitter is studied. This channel can be considered as an exponential version of the discrete memoryless channel with state known non-causally at the encoder considered by Gelfand and Pinsker. We make use of Gelf'and-Pinsker's classic(More)
—We study and analyze coverage region in MIMO communication systems for a multiple-relay network with decode-and-forward (DF) strategy at the relays. Assuming that there is a line-of-sight (LOS) propagation environment for source-relay channels and channel state information is available at receivers (CSIR), we consider the objective of maximizing coverage(More)
Automatic digital-signal-type identification plays an important role for various applications. This paper presents a highly efficient identifier (technique) that identifies a variety of digital signal types. In this technique, a selected number of the higher-order moments and the higher-order cumulants up to eighth are utilized as the effective features. A(More)
In this study, the authors study a two-user Gaussian doubly dirty compound multiple-access channel with partial side information (GDD-CMAC-PSI) where two independent additive interference signals are considered, each one known non-causally and partially to one of the encoders but unknown to either of the receivers. This channel, first, can model two users(More)
—In this paper we study and analyze coverage region for half-duplex multiple-input multiple-output (MIMO) relay channel with amplify-and-forward (AF) strategy at the relay station. By assuming mixed Rayleigh and Rician fading channels with two different relay station situations, we consider the objective of maximizing coverage region for a given(More)
—In this paper, we characterize the capacity region for the two-user linear Gaussian compound Multiple Access Channel with common message (MACC) and with intersymbol interference (ISI) under an input power constraint. The region is obtained by converting the channel to its equivalent memoryless one by defining an n-block memoryless circular Gaussian(More)
One problem in background estimation is the inherent change in the background such as waving tree branches, water surfaces, camera shakes, and the existence of moving objects in every image. In this paper, a new method for background estimation is proposed based on function approximation in kernel domain. For this purpose, Weighted Kernel-based Learning(More)