Showing
1 - 9
results of
9
for search '
Zamani, Mazdak
'
Skip to content
VuFind
All Fields
Title
Author
Subject
Call Number
ISBN/ISSN
Find
Advanced
Author
Zamani, Mazdak
Showing
1 - 9
results of
9
for search '
Zamani, Mazdak
'
, query time: 0.02s
Refine Results
Sort
Relevance
Date Descending
Date Ascending
Call Number
Author
Title
1
An approach to improve the robustness of substitution techniques of audio steganography
by
Zamani
,
Mazdak
,
Abdul Manaf, Azizah
,
Ahmad, Rabiah
,
Zeki, Akram M.
Published 2009
Get full text
Get full text
Get full text
2
A robust watermark embedding in smooth areas
by
Zeki, Akram M.
,
Abdul Manaf, Azizah
,
Adamu, Abubakar Ibrahim
,
Zamani
,
Mazdak
Published 2011
Get full text
Get full text
Get full text
Get full text
3
PSW statistical LSB image steganalysis
by
Shojae Chaeikar, Saman
,
Zamani
,
Mazdak
,
Abdul Manaf, Azizah
,
Zeki, Akram M.
Published 2017
Get full text
Get full text
Get full text
Get full text
Get full text
4
A Novel Approach for Audio Watermarking
by
Zamani
,
Mazdak
,
Abdul Manaf, Azizah
,
Ahmad, Rabiah
,
Zeki, Akram M.
,
Magalingam, Pritheega
Published 2009
Get full text
Get full text
5
Robust Audio Steganography via Genetic Algorithm
by
Zamani
,
Mazdak
,
Abdul Manaf, Azizah
,
Ahmad, Rabiah
,
Zeki, Akram M.
,
Taherdoost, Hamed
Published 2009
Get full text
Get full text
6
A genetic-algorithm-based approach for audio steganography
by
Zamani
,
Mazdak
,
Abdul Manaf, Azizah
,
Ahmad, Rabiah
,
Zeki, Akram M.
,
Abdullah, Shahidan
Published 2009
Get full text
Get full text
Get full text
7
An artificial-intelligence-based approach for audio steganography
by
Zamani
,
Mazdak
,
Taherdoost, Hamed
,
Abdul Manaf, Azizah
,
Ahmad, Rabiah
,
Zeki, Akram M.
Published 2009
Get full text
Get full text
8
A secure audio steganography approach
by
Zamani
,
Mazdak
,
Abdul Manaf, Azizah
,
Ahmad, Rabiah
,
Jaryani, Farhang
,
Taherdoost, Hamed
,
Zeki, Akram M.
Published 2009
Get full text
Get full text
Get full text
Get full text
9
Comments and improvements of “HOTA: Handover optimized ticketbased authentication in networkbased mobility management”
by
Alizadeh, Mojtaba
,
Tadayon, Mohammad Hesam
,
Sakurai, Kouichi
,
Baharun, Sabariah
,
Anada, Hiroaki
,
Zamani
,
Mazdak
,
Akram, M. Zeki
,
Chaudhry, Shehzad Ashraf
,
Khan, Muhammad Khurram
Published 2017
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Search Tools:
RSS Feed
–
Email Search