مرور Volume 2, Issue 1 بر اساس عنوان

  • A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set 

    Taheri, MohammadReza؛ Shafiee, Nasim؛ Esmaeildoust, Mohammad؛ Amirjamshidi, Zhale؛ Sabbaghi-nadooshan, Reza؛ Navi, Keivan (University of Isfahan & Iranian Society of Cryptology, 2015-01-01)
    The moduli set 2 n−1 − 1, 2 n+1 − 1, 2 n , 2 n − 1 has been recently proposed inliterature for class of 4n-bit dynamic range in residue number system. Due toonly utilizing modulus in the form of 2 k − 1 besides modulo 2 n ...

  • Improving Face Recognition Systems Security Using Local Binary Patterns 

    Fathi, Abdolhossein؛ Abdali-Mohammadi, Fardin (University of Isfahan & Iranian Society of Cryptology, 2015-01-01)
    Face recognition systems suffer from different spoofing attacks like photograph-based and video-based spoofing attacks. This paper presents a new method to empower the face recognition systems against video-based spoofing ...

  • JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH 

    Alizadeh, Javad؛ Aref, Mohammad Reza؛ Bagheri, Nasour؛ Rahimi, Alireza (University of Isfahan & Iranian Society of Cryptology, 2015-01-01)
    Authenticated encryption (AE) schemes provide both privacy and integrity ofdata. CAESAR is a competition to design and analysis of the AE schemes. AnAE scheme has two components: a mode of operation and a primitive. In ...

  • A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion 

    Farokh, Azam؛ Babamir, Seyed Morteza (University of Isfahan & Iranian Society of Cryptology, 2015-01-01)
    In this article, our aim is to quantify the impact of three reference architectural styles, i.e. Aspect-peer-to-peer, Aggregator-escalator-peer, and Chain-of-configurators on the maintainability attribute in self-healing ...

  • Steganography of Halftone Images by Group Alteration of Grayscale Pixels 

    Mahdavi, Mojtaba؛ Samavi, Shadrokh (University of Isfahan & Iranian Society of Cryptology, 2015-01-01)
    Data hiding in halftone images is a challenging task since these images are very susceptible to alterations. Current steganographic methods for these types of images either embed the data after the image is completely ...

  • A Study on Intelligent Authorship Methods in Persian Language 

    Farahmandpour, Zeinab؛ Nikmehr, Hooman (University of Isfahan & Iranian Society of Cryptology, 2015-01-01)
    Author identification is an attempt to demonstrate the characteristics of the author of a piece of language information so that in the end, it would be possible to significantly distinguish the difference between various ...