Background
دکتر مجتبی مهدوی

دکتر مجتبی مهدوی

استادیار

گروه مهندسی فناوری‌اطلاعات
دانشکده مهندسی کامپیوتر

پست الکترونیکی

m.mahdavi@eng.ui.ac.ir

آدرس

دانشگاه اصفهان میدان آزادی اصفهان، ایران
کد پستی : 8174673441

برونداد‌های پژوهشی

33

همه موارد

33

مقالات

مرتب سازی بر اساس:

مقالات لاتین
2025

Heydari, G., Mahdavi, M., Mala, H.
SN Computer Science (2662995X)6(6)
Mahvash, M., Moghim, N., Mahdavi, M., Amiri, M., Shetty, S.
Pervasive and Mobile Computing (15741192)106

Preventing collusion in secure computation with preprocessing via function secret sharing

( Article . )

Heydari, G., Mahdavi, M., Mala, H.
Expert Systems with Applications (09574174)289
2024

Enhancing privacy in commit-chains based on blind signature

( Article . )

Akraminasab, M., Mahdavi, M., Mala, H.
Expert Systems with Applications (09574174)244

Modification in spatial, extraction from transform: Keyless side-information steganography for JPEG

( Article . )

Darvish morshedi hosseini, M., Mahdavi, M., Etemadi borujeni, S.
Journal of Visual Communication and Image Representation (10473203)103
2023

Hierarchical Deterministic Wallets for Secure Steganography in Blockchain

( Article . )

Torki, O., Ashouri, M., Mahdavi, M.
ISeCure (20083076)15(1)pp. 17-26
2021

Blockchain for steganography: advantages, new algorithms and open challenges

( Article . Green )

Torki, O., Ashouri, M., Mahdavi, M.
pp. 1-5
2020

A reliable and efficient micro-protocol for data transmission over an RTP-based covert channel

( Article . )

Azadmanesh, M., Mahdavi, M., Shahgholi, B.
Multimedia Systems (14321882)26(2)pp. 173-190

A Semi-blind Watermarking Method for Authentication of Face Images Using Autoencoders

( Article . )

Mahdavi, M., Khalilidan S., Balouchestani, A., Moti Z., Hallaj, Y., Khalilidan S., Mahdavi, M., Balouchestani, A., Moti Z., Hallaj, Y.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 229-233

Middleman covert channel establishment based on MORE routing protocol using network coding in ad hoc networks

( Article . )

Akhtari, S., Moghim, N., Mahdavi, M.
International Journal of Communication Systems (10991131)33(7)
2019

SANUB: A new method for sharing and analyzing news using blockchain

( Article . )

Mahdavi, M., Balouchestani, A., Hallaj, Y., Javdani D., Balouchestani, A., Mahdavi, M., Hallaj, Y., Javdani D.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 139-143
2018

A dynamic timing-storage covert channel in vehicular ad hoc networks

( Article . )

Taheri, S., Mahdavi, M., Moghim, N.
Telecommunication Systems (10184864)69(4)pp. 415-429

Security analysis of a key based color image watermarking vs. a non-key based technique in telemedicine applications

( Article . )

Bideh, P.N., Mahdavi, M., Etemadi borujeni, S., Arasteh, S.
Multimedia Tools and Applications (13807501)77(24)pp. 31713-31735

Security Analysis of two Key Based Watermarking Schemes Based on QR Decomposition

( Article . )

Mahdavi, M., Arasteh S., Bideh, P.N., Hosseini S., Chapnevis A., Arasteh, S., Mahdavi, M., Bideh, P.N., Hosseini S., Chapnevis A.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 1499-1504
2017

A Lightweight and Secure Data Sharing Protocol for D2D Communications

( Article . )

Mohseni-ejiyeh, A., Ashouri, M., Mahdavi, M.
pp. 42-47

Binary middleman covert channel in ExOR protocol

( Article . )

Mahdavi, M., Akhtari, S., Moghim, N., Akhtari, S., Moghim, N., Mahdavi, M.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 1469-1474
2016

Adaptive ternary timing covert channel in IEEE 802.11

( Article . Hybrid Gold )

Tahmasbi, F., Moghim, N., Mahdavi, M.
Security and Communication Networks (discontinued) (19390122)9(16)pp. 3388-3400

Counterfeiting attack on adjusted expanded-bit multiscale quantization-based semi-fragile watermarking technique

( Article . )

Mahdavi, M., Hosseini S., Hosseini S., Mahdavi, M.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 13-19

Feature extraction for detection of watermarking algorithm

( Article . )

Mahdavi, M., Hatefi Z., Nikbakht P., Hatefi Z., Mahdavi, M., Nikbakht P.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 32-37

INCP: Practical Wireless Network Coding for Multiple Unicast Sessions

( Article . )

Shafieinejad, A., Motamedi, N., Hendessi, F., Mahdavi, M.
Wireless Personal Communications (1572834X)91(2)pp. 623-651

Modification in spatial, extraction from transform: A new approach for JPEG steganography

( Article . )

Mahdavi, M., Darvish morshedi hosseini, M., Darvish morshedi hosseini, M., Mahdavi, M.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 134-140

Ternary timing covert channel in wireless 802.11

( Article . )

Mahdavi, M., Tahmasbi, F., Moghim, N., Tahmasbi, F., Moghim, N., Mahdavi, M.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 73-78
2015

Code-based timing Covert channel in IEEE 802.11

( Article . )

Mahdavi, M., Tahmasbi, F., Moghim, N., Tahmasbi, F., Moghim, N., Mahdavi, M.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 12-17

F plus KS: A new feature selection strategy for steganalysis

( Article . )

Mahdavi, M., Darvish morshedi hosseini, M., Darvish morshedi hosseini, M., Mahdavi, M.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025

Targeted dewatermarking of two non-blind SVD-based image watermarking schemes

( Article . )

Mahdavi, M., Nikbakht P., Nikbakht P., Mahdavi, M.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 80-86

Targeted watermark removal of a SVD-based image watermarking scheme

( Article . )

Mahdavi, M., Nikbakht P., Nikbakht P., Mahdavi, M.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025

Threshold feature selection (TFS), an improvement over forward selection in steganalysis feature selection

( Article . )

Mahdavi, M., Darvish morshedi hosseini, M., Darvish morshedi hosseini, M., Mahdavi, M.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 187-194
2014

Improving reversible image watermarking using additive interpolation technique

( Article . )

Mahdavi, M., Khorramdin M., Amini M., Torabi, N., Khorramdin M., Amini M., Torabi, N., Mahdavi, M.
2025 29th International Computer Conference, Computer Society of Iran, CSICC 2025pp. 961-965
2012

Robust audio watermarking based on HWD and SVD

( Article . )

Karimimehr, S., Samavi s., S., Rezaee kaviani, H., Mahdavi, M.
pp. 1363-1367
2010

Real-time steganalysis of LSB-replacement in digital audio streams

( Article . )

Mahdavi, M., Samavi s., S., Dumitrescu, S., Aalamifar, F., Abedikhoozani, P.
Journal of Circuits, Systems and Computers (17936454)19(7)pp. 1399-1421

Steganalysis and payload estimation of embedding in pixel differences using neural networks

( Article . )

Sabeti, V., Samavi s., S., Mahdavi, M., Shirani s., S.
Pattern Recognition (00313203)43(1)pp. 405-415
2007

Steganalysis of pixel-value differencing steganographic method

( Article . )

Sabeti, V., Samavi s., S., Mahdavi, M., Shirani s., S.
pp. 292-295