Home » Publications

Publications

Journal Papers:

2016:

Zarmehi, Nematollah, and Mohammad Ali Akhaee. “Digital video steganalysis toward spread spectrum data hiding.” Image Processing, IET 10, no. 1 (2016): 1-8.

2015:

Hamghalam, Mohammad, Sattar Mirzakuchaki, and Mohammad Ali Akhaee. “Vertex angle image watermarking with optimal detector.” Multimedia Tools and Applications 74, no. 9 (2015): 3077-3098.

Karimi, Hassan, Mahrokh G. Shayesteh, and Mohammad Ali Akhaee. “Steganalysis of JPEG images using enhanced neighbouring joint density features.” Image Processing, IET 9, no. 7 (2015): 545-552.

Nematollahi, Mohammad Ali, Mohammad Ali Akhaee, S. A. R. Al-Haddad, and Hamurabi Gamboa-Rosales. “Semi-fragile digital speech watermarking for online speaker recognition.” EURASIP Journal on Audio, Speech, and Music Processing 2015, no. 1 (2015): 1-15.

Akhaee, Mohammad Ali, and Sayed Mohammad Ebrahim Sahraeian. “Scaling-based watermarking with universally optimum decoder.” Multimedia Tools and Applications 74, no. 15 (2015): 5995-6018.

Nematollahi, Mohammad Ali, Hamurabi Gamboa-Rosales, Mohammad Ali Akhaee, and S. A. R. Al-Haddad. “Robust digital speech watermarking for online speaker recognition.” Mathematical Problems in Engineering 2015 (2015).

Moshtaghpour, Amirafshar, Mohammad Ali Akhaee, and Masoud Attarifar. “Obstacle mapping in wireless sensor networks via minimum number of measurements.” IET Signal Processing (2015).

Akhavan, Saeed, Mohammad Ali Akhaee, and Saeed Sarreshtedari. “Images steganalysis using GARCH model for feature selection.” Signal Processing: Image Communication 39 (2015): 75-83.

Kazemi, Reza, Roohollah Rezaei, Mohammad A. Akhaee, and Fereidoon Behnia. “Covert communications through mobile voice channels.” IET Information Security (2015).

2014:

S. M. E. Saheaeian, M. A. Akhaee, B. Sankur, and, F. Marvasti, “Robust Watermarking with Optimal Detector for Highly Correlated Signals,” Digital Signal Processing, Doi: 10.1016/j.dsp.2014.09.003, Oct., 2014.

M. Hamghalam, S. Mirzakoochaki, and M. A. Akhaee, “Geometric Modeling of the Wavelet Coefficients for Image Watermarking Using Optimum Detector,” IET Image Processing, vol. 8, no.3, pp. 162-172, 2014.

S. Sarreshtedari and M. A. Akhaee, “One Third Probability Embedding: A New ±1 Histogram Compensating Image Least Significant Bit Steganography Scheme,” IET Image Processing, vol. 8, no.2, pp. 78-89, 2014

S. Akhavan, M. A. Akhaee, and S. Sarreshtedari, “Universal Image Steganalysis Based on GARCH Model,” in Proc. 22th European Signal Processing conference (EUSIPCO), Lisbon, 2014.

M. Boloursaz, R. Kazemi, F. Behnia, and M. A. Akhaee, “Performance Improvement of Spread Spectrum Additive Data Hiding over Codec-Distorted Voice Channels,” in Proc. 22th European Signal Processing conference (EUSIPCO), Lisbon, 2014.

N. Zarmehi and M. A. Akhaee, “Video Steganalysis of Multiplicative Spread Spectrum Steganography,” in Proc. 22th European Signal Processing conference (EUSIPCO), Lisbon, 2014.
S. Sarreshtedari and M. A. Akhaee, “Joint Source-Channel Coding Approach to Generate Tamper Proof Images,” in Proc. Int. Conf. on Acoustics, Speech and Signal Processing (ICASSP), Florance, May 2014.

2013:

M. Shabanifard, M. G. Shayesteh, M. A. Akhaee, “Forensics Detection of Image Manipulation Using Zernike Moments and Pixel Pair Histogram,” IET Image Processing, vol. 7, no.9, pp. 817-828, 2013.

M. Hamghalam, S. Mirzakoochaki, and M. A. Akhaee, “Robust Image Watermarking Using Dihedral Angle Based on Maximum Likelihood Detector,” IET Image Processing, vol. 7, no.5, pp. 451-463, July 2013.

M. Hamghalam, S. Mirzakoochaki, and M. A. Akhaee, “Vertex Angle Image Watermarking with Optimal Decoder,” Multimedia Tools and Application, pp. 1145-1159, Nov 2013.

M. A. Akhaee and F. Marvasti, “A Survey on Digital Data Hiding: Schemes, Principals, Algorithms, and Applications” ISC Journal of Information Security, vol. 5, no.1, pp. 5-37, Dec 2013.

A. Dianat, M. A. Akhaee, and S. Ghaemmaghami, “Robust Multiplicative Video Watermarking Using Statistical Modeling,” ISC Journal of Information Security, vol. 5, no.1, pp. 88-94, Dec 2013.

2009-2012:

ParandehGheibi, M. A. Akhaee, A. Ayremlou, M. A. Rahimian, F. Marvasti, “ Improved Iterative Techniques to Compensate for Interpolation Distortions,” Signal Processing, vol 92, no. 4, pp. 963-976, Apr. 2012.

M. A. Akhaee, S. M. E. Saheaeian, and C. Jin, “Blind Image Watermarking Using a Sample Projection Approach” IEEE Trans on Inf. Security and Forensics, vol. 6, no. 3, pp. 883-893, Sept. 2011.

M. A. Akhaee, S. M. E. Saheaeian, and F. Marvasti, “Contourlet Based Image Watermarking Using Optimum Detector in a Noisy Environment,” IEEE Trans. on Image Processing, vol. 19, no. 4, pp. 667-680, Aug. 2010.

M. A. Akhaee, N. Khademi-Kalantari, and F. Marvasti, “Robust Audio and Speech Watermarking Using Gaussian and Laplacian Modeling,” Signal Processing, vol 90, no. 8, pp. 2487-24-97, Aug. 2010.

M. A. Akhaee, S. M. E. Saheaeian F. Marvasti, and B. Sankur, “Robust Scaling-Based Image Watermarking Technique Using Maximum Likelihood Decoder With Optimum Strength Factor,” IEEE Trans. on Multimedia, vol 11, no 5, pp. 822-833, Aug. 2009.

M. A. Akhaee, M. J. Saberian, S. Feizi, and F. Marvasti, ” Robust Audio Data Hiding Using Correlated Quantization With Histogram Based Detector,” IEEE Trans. on Multimedia, vol 11, no. 5, pp. 834-842, Aug. 2009.

N. Khademi-kalantari, M. A. Akhaee, and S. M. Ahadi, and S. M. R. Amindavar, “Robust Multiplicative Patchwork Method for Audio Watermarking,” IEEE Trans. on Audio, Speech, and Language Processing, vol 17, no. 6, pp. 1133-1141, Aug 2009.

Conference papers:

2015:

Araghi, Hesam, Mohammad Ali Akhaee, and Arash Amini. “Timing mismatch compensation in TI-ADCS using Bayesian approach.” In Signal Processing Conference (EUSIPCO), 2015 23rd European, pp. 1391-1395. IEEE, 2015.

Shahmoradi, Mohammad Hossein, Mohammad Ali Akhaee, and Maryam S. Mirian. “Combined classification and regression for simultaneous and proportional EMG control of wrist forces.” In Signal Processing Conference (EUSIPCO), 2015 23rd European, pp. 2426-2430. IEEE, 2015.

Sarreshtedari, Saeed, Mohammad Ali Akhaee, and Aliazam Abbasfar. “Digital image self-recovery using unequal error protection.” In Signal Processing Conference (EUSIPCO), 2015 23rd European, pp. 71-75. IEEE, 2015.

2014:

Zarmehi, Nematollah, and Mohammad Ali Akhaee. “Video steganalysis of multiplicative spread spectrum steganography.” In Signal Processing Conference (EUSIPCO), 2014 Proceedings of the 22nd European, pp. 2440-2444. IEEE, 2014.

Akhavan, Shahab, Mohammad Ali Akhaee, and Saeed Sarreshtedari. “Universal image steganalysis based on GARCH model.” In Signal Processing Conference (EUSIPCO), 2014 Proceedings of the 22nd European, pp. 2430-2434. IEEE, 2014.

Sarreshtedari, Saeed, and Mohammad Ali Akhaee. “Source-channel coding approach to generate tamper-proof images.” In Acoustics, Speech and Signal Processing (ICASSP), 2014 IEEE International Conference on, pp. 7435-7439. IEEE, 2014.

Tajiki, Mohammad Mahdi, and Mohammad Ali Akhaee. “Secure and privacy preserving keyword searching cryptography.” In Information Security and Cryptology (ISCISC), 2014 11th International ISC Conference on, pp. 226-230. IEEE, 2014.

Boloursaz, Mahdi, Riza Kazemi, Ferydon Behnia, and Mohammad Ali Akhaee. “Performance improvement of spread spectrum additive data hiding over codec-distorted voice channels.” In Signal Processing Conference (EUSIPCO), 2014 Proceedings of the 22nd European, pp. 2510-2514. IEEE, 2014.

Sangdeh, Pedram Kheirkhah, Mahtab Mirmohseni, and Mohammad Ali Akhaee. “Interference alignment for two-user two-hop interference X-channel with delayed and No CSIT.” In Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2014 6th International Congress on, pp. 473-479. IEEE, 2014.

Sangdeh, Pedram Kheirkhah, Mahtab Mirmohseni, and Mohammad Ali Akhaee. “Blind interference alignment for three-user multi-hop SISO interference channel.” In Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), 2014 6th International Congress on, pp. 462-467. IEEE, 2014.

Moshtaghpour, Amirafshar, Aboozar Rajabi, and Mohammad Ali Akhaee. “A compressive sensing approach for obstacle mapping in wireless sensor networks.” In Electrical Engineering (ICEE), 2014 22nd Iranian Conference on, pp. 1648-1652. IEEE, 2014.

2013:

Hamghalam, Mohammad, Sattar Mirzakouchaki, and Mohammad Ali Akhaee. “Robust image watermarking in 3-D space using wavelet coefficients.” InElectrical Engineering (ICEE), 2013 21st Iranian Conference on, pp. 1-6. IEEE, 2013.

Zarmehi, Nematollah, Morteza Banagar, and Mohammad Ali Akhaee. “Optimum decoder for an additive video watermarking with Laplacian noise in H. 264.” In Information Security and Cryptology (ISCISC), 2013 10th International ISC Conference on, pp. 1-5. IEEE, 2013.

Hamghalam, Mohammad, Sattar Mirzakuchaki, and Mohammad Ali Akhaee. “Geometric modeling of the wavelet coefficients for image watermarking.” InMachine Vision and Image Processing (MVIP), 2013 8th Iranian Conference on, pp. 27-32. IEEE, 2013.

M. A. Akhaee, S. M. E. Saheaeian, “Watermarking Robust to Cover Distribution Using Maximum Likelihood Decoder”, Multimedia Tools and Application, pp. 1145-1159, June 2013.

2009-2012:

Diyanat, Abolfazl, Mohammad Ali Akhaee, and Shahrokh Ghaemmaghami. “Robust video watermarking using maximum likelihood decoder.” In Signal Processing Conference, 2011 19th European, pp. 2044-2048. IEEE, 2011.

Shabanifard, Mahmood, Mohammad Ali Akhaee, and Mahrokh G. Shayesteh. “A new method for forensics detection based on 2D-histogram and Zernike moments.” In Information Security and Cryptology (ISCISC), 2012 9th International ISC Conference on, pp. 151-155. IEEE, 2012.