Follow
Mehdi Kharrazi
Title
Cited by
Cited by
Year
Image steganography and steganalysis: Concepts and practice
R Chandramouli, M Kharrazi, N Memon
Digital Watermarking: Second International Workshop, IWDW 2003, Seoul, Korea …, 2004
623*2004
Blind source camera identification
K Mehdi, HT Sencar, N Memon
Image Processing, 2004. ICIP'04. 2004 International Conference on 1, 709-712, 2004
478*2004
Image steganalysis with binary similarity measures
M Kharrazi, N Memon
EURASIP Journal on Advances in Signal Processing, 2749-2757, 2005
346*2005
ODISSEA: A Peer-to-Peer Architecture for Scalable Web Search and Information Retrieval.
T Suel, C Mathur, JW Wu, J Zhang, A Delis, M Kharrazi, X Long, ...
WebDB 3, 67-72, 2003
2392003
Performance study of common image steganography and steganalysis techniques
M Kharrazi, HT Sencar, N Memon
Journal of Electronic Imaging 15 (4), 041104-041104-16, 2006
1572006
Benchmarking steganographic and steganalysis techniques
M Kharrazi, HT Sencar, N Memon
Security, Steganography, and Watermarking of Multimedia Contents VII 5681 …, 2005
1012005
Cover selection for steganographic embedding
M Kharrazi, HT Sencar, N Memon
2006 International Conference on Image Processing, 117-120, 2006
1002006
Data masking: A new approach for steganography?
R Radhakrishnan, M Kharrazi, N Memon
The Journal of VLSI Signal Processing 41 (3), 293-303, 2005
762005
Improving steganalysis by fusion techniques: A case study with image steganography
M Kharrazi, HT Sencar, N Memon
Transactions on Data Hiding and Multimedia Security I, 123-137, 2006
712006
An anomaly-based botnet detection approach for identifying stealthy botnets
S Arshad, M Abbaspour, M Kharrazi, H Sanatkar
2011 IEEE International Conference on Computer Applications and Industrial …, 2011
572011
Back to static analysis for kernel-level rootkit detection
SA Musavi, M Kharrazi
IEEE Transactions on Information Forensics and Security 9 (9), 1465-1476, 2014
402014
Sencar, and Nasir Memon
M Kharrazi, T Husrev
Image steganography: Concepts and practice, 2004
302004
Improving a computer networks course using the Partov simulation engine
B Momeni, M Kharrazi
IEEE Transactions on Education 55 (3), 436-443, 2012
242012
Nabs: A system for detecting resource abuses via characterization of flow content type
K Shanmugasundaram, M Kharrazi, N Memon
Computer Security Applications Conference, 2004. 20th Annual, 316-325, 2004
21*2004
Detection of fast-flux botnets through DNS traffic analysis
E Soltanaghaei, M Kharrazi
Scientia Iranica 22 (6), 2389-2400, 2015
192015
VulSlicer: Vulnerability detection through code slicing
S Salimi, M Kharrazi
Journal of Systems and Software 193, 111450, 2022
182022
PSTEG: steganographic embedding through patching [image steganography]
K Petrowski, M Kharrazi, HT Sencar, N Memon
Proceedings.(ICASSP'05). IEEE International Conference on Acoustics, Speech …, 2005
172005
Payload Attribution via Character Dependent Multi-Bloom Filters
MH Haghighat, M Tavakoli, M Kharrazi
162013
2ploc: Preserving privacy in location-based services
AS Amoli, M Kharrazi, R Jalili
2010 IEEE Second International Conference on Social Computing, 707-712, 2010
152010
Improving real-world vulnerability characterization with vulnerable slices
S Salimi, M Ebrahimzadeh, M Kharrazi
Proceedings of the 16th ACM International Conference on Predictive Models …, 2020
122020
The system can't perform the operation now. Try again later.
Articles 1–20