Seyed Alireza Seyedin

Learn More
We have presented a new active steganalysis method in order to break the block-discrete cosine transform (DCT) coefficients steganography. Our method is based on a combination of the Blind Source Separation (BSS) technique and Maximum A posteriori (MAP) estimator. We have additionally introduced a new geometrical BSS method based on the minimum range of(More)
In this paper, we present an optimal Discrete Wavelet Transform-Singular Value Decomposition (DWT-SVD) based image watermarking scheme using Pareto-based Multi-Objective Evolutionary Algorithm (MOEA). After decomposing the cover image into four bands, we apply the SVD to each band, and the singular values of each sub-band of the host image are modified by(More)
—Reliable transmission of a pair of arbitrarily correlated sources over a discrete memoryless cognitive radio channel is studied. We derive a sufficient condition for lossless transmission of such communication scenario using superposition coding, correlation preserving technique, random source partition, a binning scheme and joint typicality decoding. This(More)
—The additive exponential noise channel with additive exponential interference (AENC-AEI) known non-causally at the transmitter is studied. This channel can be considered as an exponential version of the discrete memoryless channel with state known non-causally at the encoder considered by Gelfand and Pinsker. We make use of Gelf'and-Pinsker's classic(More)
—We study and analyze coverage region in MIMO communication systems for a multiple-relay network with decode-and-forward (DF) strategy at the relays. Assuming that there is a line-of-sight (LOS) propagation environment for source-relay channels and channel state information is available at receivers (CSIR), we consider the objective of maximizing coverage(More)
Automatic digital-signal-type identification plays an important role for various applications. This paper presents a highly efficient identifier (technique) that identifies a variety of digital signal types. In this technique, a selected number of the higher-order moments and the higher-order cumulants up to eighth are utilized as the effective features. A(More)
This paper presents a new active steganalysis method to break the transform domain steganography. Most of steganalysis techniques focus on detecting the presence or absence of a secret message in a cover (passive steganalysis), but in some cases we need to extract or estimate a hidden message (active steganalysis). Despite the importance of estimating the(More)
—The capacity region of a two-user linear Gaussian compound Multiple Access Channel with common message (CMACC) and intersymbol interference (ISI) under an input power constraint is derived. To obtain the capacity region we first convert the channel to its equivalent memoryless one by defining an n-block memoryless circular Gaussian CMACC model. We then(More)
In this study, the authors study a two-user Gaussian doubly dirty compound multiple-access channel with partial side information (GDD-CMAC-PSI) where two independent additive interference signals are considered, each one known non-causally and partially to one of the encoders but unknown to either of the receivers. This channel, first, can model two users(More)
—In this paper we study and analyze coverage region for half-duplex multiple-input multiple-output (MIMO) relay channel with amplify-and-forward (AF) strategy at the relay station. By assuming mixed Rayleigh and Rician fading channels with two different relay station situations, we consider the objective of maximizing coverage region for a given(More)