Volume 6, Issue 2
مرور بر اساس
ارسال های اخیر
-
An extended feature set for blind image steganalysis in contourlet domain
(Iranian Society of Cryptology, 2014-07-01)The aim of image steganalysis is to detect the presence of hidden messages in stego images. We propose a blind image steganalysis method in Contourlet domain and then show that the embedding process changes statistics of ...
-
A hybrid approach for database intrusion detection at transaction and inter-transaction levels
(Iranian Society of Cryptology, 2014-07-01)Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level ...
-
A risk model for cloud processes
(Iranian Society of Cryptology, 2014-07-01)Traditionally, risk assessment consists of evaluating the probability of "feared events", corresponding to known threats and attacks, as well as these events' severity, corresponding to their impact on one or more ...
-
Artemia: a family of provably secure authenticated encryption schemes
(Iranian Society of Cryptology, 2014-07-01)Authenticated encryption schemes establish both privacy and authenticity. This paper specifies a family of the dedicated authenticated encryption schemes, Artemia. It is an online nonce-based authenticated encryption scheme ...



