[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Site Facilities::
Indexing::
Contact us::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
Print ISSN
Print ISSN: 2476-3047
..
:: Search published articles ::
Showing 3 results for Convolutional Neural Network

Mahmoud Saeidi, Nasrin Taaj, Azadeh Bamdad Moghaddam,
Volume 11, Issue 2 (3-2023)
Abstract

The proposed method for implementing cryptographic traffic detector systems and evasive tools in this article is a method based on deep learning, which due to the importance of optimal and automatic extraction of features from the input data set, an automatic encoder network has been used in the feature extraction phase. Then, the output of the middle hidden layer of this network is applied to a deep convolutional neural network. Deep convolutional neural networks can play an effective role in improving the performance of the system by taking into account the spatial connections between features. Finally, the output of deep convolutional neural network is also applied to two fully connected layers in order to perform the classification process. So that the number of neurons in the second fully connected layer will be equal to the expected number of layers of the system. In the first part of this article, the specifications of the proposed systems for the implementation of cryptographic traffic detectors and evasion tools will be mentioned in terms of operational architecture and features. Then, the characteristics of the networks used in the implementation of the system, and the method of their integration to form the final identifier system are briefly stated. After that, the training stage of the system and its implementation method will be introduced and at the end, how to adjust the parameters of the model and the mechanisms used to improve the overall performance of the system and the results of its performance evaluation will be presented.

Mrs. Narges Mokhtari, Mr. Amirhossein Safari, Dr Sadegh Sadeghi,
Volume 12, Issue 1 (9-2023)
Abstract

Biometric systems are an important technique for user identification in today's world, which have been welcomed due to their non-invasive nature and high resistance to forgery and fraud. Physiological and behavioral biomarkers are two main types of biometric identifiers. Behavioral identifiers, such as voice recognition, are based on human or even animal actions. Physiological biometrics, such as fingerprints and facial recognition, which have been used in our daily lives in the past years, are based on the physical characteristics of the human body. One of the various biometrics that have been investigated in studies in this field is the heart signal, which has been well used in authentication and identification systems due to its simple acquisition process compared to biomarkers such as the brain signal. In addition, there are valid databases on heart signal data, which the researchers of this issue refer to evaluate their systems. In this study, the analysis, analysis, and comparison of different authentication methods using heart signal biometrics have been studied. Also, in the following, the advantages and disadvantages of deep learning methods and models proposed in this field have been examined. In the final part, firstly, the implementation of the method presented in Fuster and Lopez's research is discussed, and then, to evaluate, we present the tests designed using the network created in this study, and after that, concluding based on the results.
Vajiheh Sabeti, Mahdiyeh Samiei,
Volume 12, Issue 2 (2-2024)
Abstract

Steganalysis is the art of detecting the existence of hidden data. Recent research has revealed that convolutional neural networks (CNNs) can detect data through automatic feature extraction. Several studies investigated the performance of existing models using a limited number of spatial steganography methods. This study aims to propose a CNN and comprehensively investigate its efficiency in detecting different spatial methods. The proposed model comprises three modules: preprocessing, convolutional (five blocks), and classifier (three fully connected layers). The test results for the least-significant-bit (LSB) and pixel-value differencing (PVD) based methods indicate that the proposed method can detect data of even concise length with high
accuracy and a low error. The proposed method also detects complexity-based LSB-M (CBL) as an adaptive approach. Lower embedding rates make this success even more impressive. Manual feature extraction has much lower success rates due to low variations of statistical features at low embedding rates than the proposed model.

Page 1 from 1     

دوفصل نامه علمی  منادی امنیت فضای تولید و تبادل اطلاعات( افتا) Biannual Journal Monadi for Cyberspace Security (AFTA)
Persian site map - English site map - Created in 0.05 seconds with 29 queries by YEKTAWEB 4700