• List of Articles


      • Open Access Article

        1 - SIP Vulnerability Scan Framework
        Mitra Alidoosti Hassan Asgharian ahmad akbari
        The purpose of this paper is to provide a framework for detecting vulnerabilities in SIP (Session Initiation Protocol) networks. We try to find weaknesses in SIP enabled entities that an attacker by exploiting them is able to attack the system and affect it. This framew Full Text
        The purpose of this paper is to provide a framework for detecting vulnerabilities in SIP (Session Initiation Protocol) networks. We try to find weaknesses in SIP enabled entities that an attacker by exploiting them is able to attack the system and affect it. This framework is provided by the concept of penetration testing and is designed to be flexible and extensible, and has the capability to customize for other similar session based protocols. To satisfy the above objectives, the framework is designed with five main modules for discovery, information modeling, operation, evaluation and report. After setting up a test-bed as a typical VoIP system to show the validity of the proposed framework, this system has been implemented as a SIP vulnerability scanner. We also defined appropriate metrics for gathering the performance statistics of SIP components. Our test bed is deployed by open-source applications and used for validation and also evaluation of the proposed framework. Manuscript Document
      • Open Access Article

        2 - A Study on Clustering for Clustering Based Image De-noising
        Hossein Bakhshi Golestani Mohsen Joneidi Mostafa Sadeghi
        In this paper, the problem of de-noising of an image contaminated with Additive White Gaussian Noise (AWGN) is studied. This subject is an open problem in signal processing for more than 50 years. In the present paper, we suggest a method based on global clustering of i Full Text
        In this paper, the problem of de-noising of an image contaminated with Additive White Gaussian Noise (AWGN) is studied. This subject is an open problem in signal processing for more than 50 years. In the present paper, we suggest a method based on global clustering of image constructing blocks. As the type of clustering plays an important role in clustering-based de-noising methods, we address two questions about the clustering. The first, which parts of the data should be considered for clustering? The second, what data clustering method is suitable for de-noising? Then clustering is exploited to learn an over complete dictionary. By obtaining sparse decomposition of the noisy image blocks in terms of the dictionary atoms, the de-noised version is achieved. Experimental results show that our dictionary learning framework outperforms its competitors in terms of de-noising performance and execution time. Manuscript Document
      • Open Access Article

        3 - Joint Source and Channel Analysis for Scalable Video Coding Using Vector Quantization over OFDM System
        Farid Jafarian Hassan Farsi
        Conventional wireless video encoders employ variable-length entropy encoding and predictive coding to achieve high compression ratio but these techniques render the extremely sensitive encoded bit-stream to channel errors. To prevent error propagation, it is necessary t Full Text
        Conventional wireless video encoders employ variable-length entropy encoding and predictive coding to achieve high compression ratio but these techniques render the extremely sensitive encoded bit-stream to channel errors. To prevent error propagation, it is necessary to employ various additional error correction techniques. In contrast, alternative technique, vector quantization (VQ), which doesn’t use variable-length entropy encoding, have the ability to impede such an error through the use of fix-length code-words. In this paper, we address the problem of analysis of joint source and channel for VQ based scalable video coding (VQ-SVC). We introduce intra-mode VQ-SVC and VQ-3D-DCT SVC, which offer similar compression performance to intra-mode H.264 and 3D-DCT respectively, while offering inherent error resilience. In intra-mode VQ-SVC, 2D-DCT and in VQ-3D-DCT SVC, 3D-DCT is applied on video frames to exploit DCT coefficients then VQ is employed to prepare the codebook of DCT coefficients. In this low bitrate video codecs, high level robustness is needed against the wireless channel fluctuations. To achieve such robustness, we propose and calculate optimal codebook of VQ-SVC and optimal channel code rate using joint source and channel coding (JSCC) technique. Next, the analysis is developed for transmission of video using an OFDM system over multipath Rayleigh fading and AWGN channel. Finally, we report the performance of these schemes to minimize end-to-end distortion over the wireless channel. Manuscript Document
      • Open Access Article

        4 - Facial Expression Recognition Using Texture Description of Displacement Image
        Hamid Sadeghi Abolghasem Asadollah Raie Mohammad Reza Mohammadi
        In recent years, facial expression recognition, as an interesting problem in computer vision has been performed by means of static and dynamic methods. Dynamic information plays an important role in recognizing facial expression. However, using the entire dynamic inform Full Text
        In recent years, facial expression recognition, as an interesting problem in computer vision has been performed by means of static and dynamic methods. Dynamic information plays an important role in recognizing facial expression. However, using the entire dynamic information in the expression image sequences is of higher computational cost compared to the static methods. To reduce the computational cost, instead of entire image sequence, only neutral and emotional faces can be employed. In the previous research, this idea was used by means of DLBPHS method in which facial important small displacements were vanished by subtracting LBP features of neutral and emotional face images. In this paper, a novel approach is proposed to utilize two face images. In the proposed method, the face component displacements are highlighted by subtracting neutral image from emotional image; then, LBP features are extracted from the difference image. The proposed method is evaluated on standard databases and the results show a significant accuracy improvement compared to DLBPHS. Manuscript Document
      • Open Access Article

        5 - Tracking Performance of Semi-Supervised Large Margin Classifiers in Automatic Modulation Classification
        Hamidreza Hosseinzadeh Farbod Razzazi Afrooz Haghbin
        Automatic modulation classification (AMC) in detected signals is an intermediate step between signal detection and demodulation, and is also an essential task for an intelligent receiver in various civil and military applications. In this paper, we propose a semi-superv Full Text
        Automatic modulation classification (AMC) in detected signals is an intermediate step between signal detection and demodulation, and is also an essential task for an intelligent receiver in various civil and military applications. In this paper, we propose a semi-supervised Large margin AMC and evaluate it on tracking the received signal to noise ratio (SNR) changes to classify all forms of signals in a cognitive radio environment. To achieve this objective, two structures for self-training of large margin classifiers were developed in additive white Gaussian noise (AWGN) channels with priori unknown SNR. A suitable combination of the higher order statistics and instantaneous characteristics of digital modulation are selected as effective features. Simulation results show that adding unlabeled input samples to the training set, improve the tracking capacity of the presented system to robust against environmental SNR changes. Manuscript Document
      • Open Access Article

        6 - Security Analysis of Scalar Costa Scheme Against Known Message Attack in DCT-Domain Image Watermarking
        Reza Samadi Seyed Alireza  Seyedin
        This paper proposes an accurate information-theoretic security analysis of Scalar Costa Scheme (SCS) when the SCS is employed in the embedding layer of digital image watermarking. For this purpose, Discrete Cosine Transform (DCT) coefficients are extracted from the cove Full Text
        This paper proposes an accurate information-theoretic security analysis of Scalar Costa Scheme (SCS) when the SCS is employed in the embedding layer of digital image watermarking. For this purpose, Discrete Cosine Transform (DCT) coefficients are extracted from the cover images. Then, the SCS is used to embed watermarking messages into mid-frequency DCT coefficients. To prevent unauthorized embedding and/or decoding, the SCS codebook is randomized using the pseudorandom dither signal which plays the role of the secret key. A passive attacker applies Known Message Attack (KMA) on the watermarked messages to practically estimate the secret key. The security level is measured using residual entropy (equivocation) of the secret key provided that the attacker’s observations are available. It can be seen that the practical security level of the SCS depends on the host statistics which has contradiction with previous theoretical result. Furthermore, the practical security analysis of the SCS leads to the different values of the residual entropy in comparison with previous theoretical equation. It will be shown that these differences are mainly due to existence of uniform regions in images that cannot be captured by previous theoretical analysis. Another source of such differences is ignoring the dependencies between the observations of non-uniform regions in previous theoretical analysis. To provide an accurate reformulation, the theoretical equation for the uniform regions and the empirical equation for the non-uniform regions are proposed. Then, by combining these equations a new equation is presented for the whole image which considers both host statistics and observations dependencies. Finally, accuracy of the proposed formulations is examined through exhaustive simulations. Manuscript Document
      • Open Access Article

        7 - Trust evaluation in unsupervised network: A fuzzy logic approach
        Golnar Assadat  Afzali Monireh Hosseini
        Because of the possibility of anonymity and impersonation in social networks, trust plays an important role in these networks. Pear to pear networks, by eliminating the supervisor roles, besides its benefit in decreasing management costs, have problems in trust and secu Full Text
        Because of the possibility of anonymity and impersonation in social networks, trust plays an important role in these networks. Pear to pear networks, by eliminating the supervisor roles, besides its benefit in decreasing management costs, have problems in trust and security of users. In this research, by using social networks as supervised networks, trust level of users is evaluated and by identifying these users in unsupervised networks, appropriate trust level is assigned to them. Manuscript Document
      • Open Access Article

        8 - Blog feed search in Persian Blogosphere
        Mohammad Sadegh Zahedi Abolfazl Aleahmad rahgozar rahgozar Farhad Oroumchian
        Blogs are one of the main user generated content on the web. So, it is necessary to present retrieval algorithms to the meet information need of weblog users. The goal of blog feed search is to rank blogs regarding their recurrent relevance to the topic of the query. I Full Text
        Blogs are one of the main user generated content on the web. So, it is necessary to present retrieval algorithms to the meet information need of weblog users. The goal of blog feed search is to rank blogs regarding their recurrent relevance to the topic of the query. In this paper, the state-of-the-art blog retrieval methods are surveyed and then they are evaluated and compared in Persian blogosphere. Also, one of the best retrieval models is optimized by using data fusion methods. Evaluation of the proposed algorithm is carried out based on a standard Persian weblogs dataset with 45 diverse queries. Our comparisons show considerable improvement over existing blog retrieval algorithms. Manuscript Document