Follow
Mehdi Kharrazi
Title
Cited by
Cited by
Year
Blind source camera identification
K Mehdi, HT Sencar, N Memon
Image Processing, 2004. ICIP'04. 2004 International Conference on 1, 709-712, 2004
452*2004
Image steganography and steganalysis: Concepts and practice
R Chandramouli, M Kharrazi, N Memon
International Workshop on Digital Watermarking, 35-49, 2003
3702003
Image steganalysis with binary similarity measures
M Kharrazi, N Memon
EURASIP Journal on Advances in Signal Processing, 2749-2757, 2005
335*2005
ODISSEA: A Peer-to-Peer Architecture for Scalable Web Search and Information Retrieval.
T Suel, C Mathur, JW Wu, J Zhang, A Delis, M Kharrazi, X Long, ...
WebDB 3, 67-72, 2003
2392003
Image steganography: Concepts and practice
M Kharrazi, HT Sencar, N Memon
Lecture Note Series, Institute for Mathematical Sciences, National …, 2004
2052004
Performance study of common image steganography and steganalysis techniques
M Kharrazi, HT Sencar, ND Memon
Journal of Electronic Imaging 15 (4), 041104, 2006
1402006
Benchmarking steganographic and steganalysis techniques
M Kharrazi, HT Sencar, N Memon
Security, Steganography, and Watermarking of Multimedia Contents VII 5681 …, 2005
952005
Cover selection for steganographic embedding
M Kharrazi, HT Sencar, N Memon
2006 International Conference on Image Processing, 117-120, 2006
842006
Data masking: A new approach for steganography?
R Radhakrishnan, M Kharrazi, N Memon
The Journal of VLSI Signal Processing 41 (3), 293-303, 2005
692005
Improving steganalysis by fusion techniques: A case study with image steganography
M Kharrazi, HT Sencar, N Memon
Transactions on Data Hiding and Multimedia Security I, 123-137, 2006
652006
An anomaly-based botnet detection approach for identifying stealthy botnets
S Arshad, M Abbaspour, M Kharrazi, H Sanatkar
2011 IEEE International Conference on Computer Applications and Industrial …, 2011
472011
Back to static analysis for kernel-level rootkit detection
SA Musavi, M Kharrazi
IEEE Transactions on Information Forensics and Security 9 (9), 1465-1476, 2014
332014
Sencar, and Nasir Memon."
M Kharrazi, T Husrev
Benchmarking steganographic, 2004
282004
Improving a computer networks course using the Partov simulation engine
B Momeni, M Kharrazi
IEEE Transactions on Education 55 (3), 436-443, 2012
242012
Detection of fast-flux botnets through DNS traffic analysis
E Soltanaghaei, M Kharrazi
Scientia Iranica 22 (6), 2389-2400, 2015
192015
Nabs: A system for detecting resource abuses via characterization of flow content type
K Shanmugasundaram, M Kharrazi, N Memon
Computer Security Applications Conference, 2004. 20th Annual, 316-325, 2004
19*2004
Payload Attribution via Character Dependent Multi-Bloom Filters
MH Haghighat, M Tavakoli, M Kharrazi
162013
PSTEG: steganographic embedding through patching [image steganography]
K Petrowski, M Kharrazi, HT Sencar, N Memon
Proceedings.(ICASSP'05). IEEE International Conference on Acoustics, Speech …, 2005
152005
2ploc: Preserving privacy in location-based services
AS Amoli, M Kharrazi, R Jalili
2010 IEEE Second International Conference on Social Computing, 707-712, 2010
142010
Passive worm and malware detection in peer-to-peer networks
S Fahimian, A Movahed, M Kharrazi
2010 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing …, 2010
82010
The system can't perform the operation now. Try again later.
Articles 1–20