Mehdi Kharrazi
Cited by
Cited by
Blind source camera identification
K Mehdi, HT Sencar, N Memon
Image Processing, 2004. ICIP'04. 2004 International Conference on 1, 709-712, 2004
Image steganography and steganalysis: Concepts and practice
R Chandramouli, M Kharrazi, N Memon
Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea …, 2004
Image steganalysis with binary similarity measures
M Kharrazi, N Memon
EURASIP Journal on Advances in Signal Processing, 2749-2757, 2005
ODISSEA: A Peer-to-Peer Architecture for Scalable Web Search and Information Retrieval.
T Suel, C Mathur, JW Wu, J Zhang, A Delis, M Kharrazi, X Long, ...
WebDB 3, 67-72, 2003
Image steganography: Concepts and practice
M Kharrazi, HT Sencar, N Memon
Lecture Note Series, Institute for Mathematical Sciences, National …, 2004
Performance study of common image steganography and steganalysis techniques
M Kharrazi, HT Sencar, N Memon
Journal of Electronic Imaging 15 (4), 041104-041104-16, 2006
Benchmarking steganographic and steganalysis techniques
M Kharrazi, HT Sencar, N Memon
Security, Steganography, and Watermarking of Multimedia Contents VII 5681 …, 2005
Cover selection for steganographic embedding
M Kharrazi, HT Sencar, N Memon
2006 International Conference on Image Processing, 117-120, 2006
Data masking: A new approach for steganography?
R Radhakrishnan, M Kharrazi, N Memon
The Journal of VLSI Signal Processing 41 (3), 293-303, 2005
Improving steganalysis by fusion techniques: A case study with image steganography
M Kharrazi, HT Sencar, N Memon
Transactions on Data Hiding and Multimedia Security I, 123-137, 2006
An anomaly-based botnet detection approach for identifying stealthy botnets
S Arshad, M Abbaspour, M Kharrazi, H Sanatkar
2011 IEEE International Conference on Computer Applications and Industrial …, 2011
Back to static analysis for kernel-level rootkit detection
SA Musavi, M Kharrazi
IEEE Transactions on Information Forensics and Security 9 (9), 1465-1476, 2014
Sencar, and Nasir Memon."
M Kharrazi, T Husrev
Benchmarking steganographic, 2004
Improving a computer networks course using the Partov simulation engine
B Momeni, M Kharrazi
IEEE Transactions on Education 55 (3), 436-443, 2012
Detection of fast-flux botnets through DNS traffic analysis
E Soltanaghaei, M Kharrazi
Scientia Iranica 22 (6), 2389-2400, 2015
Nabs: A system for detecting resource abuses via characterization of flow content type
K Shanmugasundaram, M Kharrazi, N Memon
Computer Security Applications Conference, 2004. 20th Annual, 316-325, 2004
Payload Attribution via Character Dependent Multi-Bloom Filters
MH Haghighat, M Tavakoli, M Kharrazi
PSTEG: steganographic embedding through patching [image steganography]
K Petrowski, M Kharrazi, HT Sencar, N Memon
Proceedings.(ICASSP'05). IEEE International Conference on Acoustics, Speech …, 2005
2ploc: preserving privacy in location-based services
AS Amoli, M Kharrazi, R Jalili
2010 IEEE Second International Conference on Social Computing, 707-712, 2010
Improving real-world vulnerability characterization with vulnerable slices
S Salimi, M Ebrahimzadeh, M Kharrazi
Proceedings of the 16th ACM International Conference on Predictive Models …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20