|
|
 |
Search published articles |
 |
|
Showing 2 results for alipour
Dr Mansoor Fateh, Samira Rajabloo, Elahe Alipour, Volume 5, Issue 2 (3-2017)
Abstract
In this paper, the image steganography based on LSB and pixel classification is reviewed. Then, the method for steganography information in image is presented. This method based on LSB. Our purpose of this paper is to minimize the changes in cover image. At the first, the pixels of the image are selected to hiding the message; second complemented message will be hidden in LSB of selected pixels. In this paper, to solve some problems LSB method and minimize the changes, pixels categorized based on values of bits of second, third, fourth. In each category, ratio of changed pixels to unchanged pixels is calculated. If the ratio is greater than one, the LSB of that category are reversed and those changes reach at least. Mean Square Error and Peak Signal to Noise Ratio are two criterions to evaluate stego-image quality. PSNR and MSE of proposed method in comparison with simple LSB method, are respectively growth rate 0.13 percent and reduction rate 0.19 percent.
Masoud Mohammadalipour, Saeed Shokrollahi, Volume 9, Issue 1 (8-2020)
Abstract
Most networks without fixed infrastructure are based on cloud computing face various challenges. In recent years, different methods have been used to distribute software defined network to address these challenges. This technology, while having many capabilities, faces some vulnerabilities in the face of some common threats and destructive factors such as distributed Denial of Service. A review of various studies shows that in order to eliminate vulnerabilities, we need to combine appropriate defense solutions with the distributed Software Defined Network structure. Therefore, in this study, a general classification of the types of defense solutions against the above attack is presented. Then, while classifying the intrusion detection solutions into two threshold and non-threshold categories, we examined some practical examples of the above solutions. We conclude that the threshold of intrusion detection method exacerbates the vulnerability, and we are required to use non-threshold defense solutions with flat distributed software defined network architecture.
|
|