Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Saman Shojae Chaeikar is active.

Publication


Featured researches published by Saman Shojae Chaeikar.


International Journal of Internet Technology and Secured Transactions | 2011

Genetic substitution-based audio steganography for high capacity applications

Mazdak Zamani; Azizah Abdul Manaf; Hossein Rouhani Zeidanloo; Saman Shojae Chaeikar

A wide range of steganography techniques has been described in this paper. Beside the evaluation of embedding parameters for the existing techniques, two problems – weaknesses – of substitution techniques are investigated which if they could be solved, the large capacity – strength – of substitution techniques would be practical. Furthermore, a novel, principled approach to resolve the problems is presented. Using the proposed genetic concept, message bits are embedded into multiple, LSB layers, resulting in increased capacity.


International Conference on Business Administration and Information Processing | 2010

Genetic Audio Watermarking

Mazdak Zamani; Azizah Abdul Manaf; Rabiah Ahmad; Farhang Jaryani; Saman Shojae Chaeikar; Hossein Rouhani Zeidanloo

This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio watermarking. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. Substitution techniques have naturally high capacity, but two major problems, having low robustness and transparency, negate the advantage. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.


international conference on computer research and development | 2010

Interpretative Key Management (IKM), A Novel Framework

Saman Shojae Chaeikar; Shukor Abd Razak; Shohreh Honarbakhsh; Hossein Rouhani Zeidanloo; Mazdak Zamani; Farhang Jaryani

Nowadays, we use cryptography keys to secure our communications. One of the common ways for securing data exchanging is via the use of symmetric keys to encipher transmitted data over network. Todays practices for managing keys face many issues in key generation, distribution, and revocation. In this paper we propose interpretative key management method which is simpler than the current practices. Eliminating the need for key storage, the need for key distribution, automatic key revocation, and unique key per session are the main features of the new proposed key management method. Deletion of some steps and replacing some others with new ones helped us to dominate many issues faced with common practices of key management.


Multimedia Tools and Applications | 2018

PSW statistical LSB image steganalysis

Saman Shojae Chaeikar; Mazdak Zamani; Azizah Abdul Manaf; Akram M. Zeki

Steganography is the art and science of producing covert communications by concealing secret messages in apparently innocent media, while steganalysis is the art and science of detecting the existence of these. This manuscript proposes a novel blind statistical steganalysis technique to detect Least Significant Bit (LSB) flipping image steganography. It shows that the technique has a number of major advantages. First, a novel method of pixel color correlativity analysis in Pixel Similarity Weight (PSW). Second, filtering out image pixels according to their statistically detected suspiciousness, thereby excluding neutral pixels from the steganalysis process. Third, ranking suspicious pixels according to their statistically detected suspiciousness and determining the influence of such pixels based on the level of detected anomalies. Fourth, the capability to classify and analyze pixels in three pixel classes of flat, smooth and edgy, thereby enhancing the sensitivity of the steganalysis. Fifth, achieving an extremely high efficiency level of 98.049% in detecting 0.25bpp stego images with only a single dimension analysis.


Archive | 2012

Comparative Analysis of Master-Key and Interpretative Key Management (IKM) Frameworks

Saman Shojae Chaeikar; Azizah Abdul Manaf; Mazdak Zamani

The process of generating, distributing and revoking a cryptographic key is called key management (Piper & Murphy, 2002; Fumy & Landrock, 1993). Key management is a very challenging area between cryptographers and attackers, and since finding keys of approved cryptographic techniques computationally is impossible, attackers prefer to somehow breach the key management process instead of trying to crack keys (Techateerawat & Jennings, 2007).


Archive | 2010

A proposed framework for P2P botnet detection

Hossein Rouhani Zeidanloo; Azizah Abdul Manaf; Rabiah Ahmad; Mazdak Zamani; Saman Shojae Chaeikar


international conference on signal processing | 2012

Correlation between PSNR and bit per sample rate in audio steganography

Mazdak Zamani; Azizah Abdul Manaf; Shahidan M. Abdullah; Saman Shojae Chaeikar


Archive | 2010

A Novel Approach for Genetic Audio Watermarking

Mazdak Zamani; Azizah Bt; Abdul Manaf; Rabiah Ahmad; Farhang Jaryani; Hamed Taherdoost; Saman Shojae Chaeikar; Hossein Rouhani Zeidanloo


International Journal of Advancements in Computing Technology | 2013

A Prospective Study of Mobile Cloud Computing

Mojtaba Alizadeh; Wan Haslina Hassan; Mazdak Zamani; Touraj Khodadadi; Saman Shojae Chaeikar


Archive | 2011

Security Features Comparison of Master Key and IKM Cryptographic Key Management for Researchers and Developers

Saeed Yazdanpanah; Saman Shojae Chaeikar; Mazdak Zamani; Reza Kourdi

Collaboration


Dive into the Saman Shojae Chaeikar's collaboration.

Top Co-Authors

Avatar

Mazdak Zamani

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Azizah Abdul Manaf

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Farhang Jaryani

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Rabiah Ahmad

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar

Mojtaba Alizadeh

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Abdul Manaf

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Akram M. Zeki

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Azizah Bt

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Hamed Taherdoost

Universiti Teknologi Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge