Saman Shojae Chaeikar
Universiti Teknologi Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Saman Shojae Chaeikar.
International Journal of Internet Technology and Secured Transactions | 2011
Mazdak Zamani; Azizah Abdul Manaf; Hossein Rouhani Zeidanloo; Saman Shojae Chaeikar
A wide range of steganography techniques has been described in this paper. Beside the evaluation of embedding parameters for the existing techniques, two problems – weaknesses – of substitution techniques are investigated which if they could be solved, the large capacity – strength – of substitution techniques would be practical. Furthermore, a novel, principled approach to resolve the problems is presented. Using the proposed genetic concept, message bits are embedded into multiple, LSB layers, resulting in increased capacity.
International Conference on Business Administration and Information Processing | 2010
Mazdak Zamani; Azizah Abdul Manaf; Rabiah Ahmad; Farhang Jaryani; Saman Shojae Chaeikar; Hossein Rouhani Zeidanloo
This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio watermarking. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. Substitution techniques have naturally high capacity, but two major problems, having low robustness and transparency, negate the advantage. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.
international conference on computer research and development | 2010
Saman Shojae Chaeikar; Shukor Abd Razak; Shohreh Honarbakhsh; Hossein Rouhani Zeidanloo; Mazdak Zamani; Farhang Jaryani
Nowadays, we use cryptography keys to secure our communications. One of the common ways for securing data exchanging is via the use of symmetric keys to encipher transmitted data over network. Todays practices for managing keys face many issues in key generation, distribution, and revocation. In this paper we propose interpretative key management method which is simpler than the current practices. Eliminating the need for key storage, the need for key distribution, automatic key revocation, and unique key per session are the main features of the new proposed key management method. Deletion of some steps and replacing some others with new ones helped us to dominate many issues faced with common practices of key management.
Multimedia Tools and Applications | 2018
Saman Shojae Chaeikar; Mazdak Zamani; Azizah Abdul Manaf; Akram M. Zeki
Steganography is the art and science of producing covert communications by concealing secret messages in apparently innocent media, while steganalysis is the art and science of detecting the existence of these. This manuscript proposes a novel blind statistical steganalysis technique to detect Least Significant Bit (LSB) flipping image steganography. It shows that the technique has a number of major advantages. First, a novel method of pixel color correlativity analysis in Pixel Similarity Weight (PSW). Second, filtering out image pixels according to their statistically detected suspiciousness, thereby excluding neutral pixels from the steganalysis process. Third, ranking suspicious pixels according to their statistically detected suspiciousness and determining the influence of such pixels based on the level of detected anomalies. Fourth, the capability to classify and analyze pixels in three pixel classes of flat, smooth and edgy, thereby enhancing the sensitivity of the steganalysis. Fifth, achieving an extremely high efficiency level of 98.049% in detecting 0.25bpp stego images with only a single dimension analysis.
Archive | 2012
Saman Shojae Chaeikar; Azizah Abdul Manaf; Mazdak Zamani
The process of generating, distributing and revoking a cryptographic key is called key management (Piper & Murphy, 2002; Fumy & Landrock, 1993). Key management is a very challenging area between cryptographers and attackers, and since finding keys of approved cryptographic techniques computationally is impossible, attackers prefer to somehow breach the key management process instead of trying to crack keys (Techateerawat & Jennings, 2007).
Archive | 2010
Hossein Rouhani Zeidanloo; Azizah Abdul Manaf; Rabiah Ahmad; Mazdak Zamani; Saman Shojae Chaeikar
international conference on signal processing | 2012
Mazdak Zamani; Azizah Abdul Manaf; Shahidan M. Abdullah; Saman Shojae Chaeikar
Archive | 2010
Mazdak Zamani; Azizah Bt; Abdul Manaf; Rabiah Ahmad; Farhang Jaryani; Hamed Taherdoost; Saman Shojae Chaeikar; Hossein Rouhani Zeidanloo
International Journal of Advancements in Computing Technology | 2013
Mojtaba Alizadeh; Wan Haslina Hassan; Mazdak Zamani; Touraj Khodadadi; Saman Shojae Chaeikar
Archive | 2011
Saeed Yazdanpanah; Saman Shojae Chaeikar; Mazdak Zamani; Reza Kourdi