FORGOT YOUR DETAILS?

Hassan Dana-Mazraeh

Instructor of Computer Science

  • TEL: +98-9396253740
  • Teaching

    • Programming language: Design and Implemention
    • Advanced Programming
    • Programming Basics
    • Data structure and Algorithms

    Selected Publications

    Taleby Ahvanooey, M., Li, Q., Hou, J., Dana Mazraeh, H., Zhang, J. AITSteg: An innovative text steganography technique for hidden transmission of text message via social media (2018) IEEE Access, 6, art. no. 8440030, pp. 65981-65995.

    DOI: 10.1109/ACCESS.2018.2866063

    With the popularity of smartphones and widespread use of high-speed Internet, social media has become a vital part of people's daily life. Currently, text messages are used in many applications, such as mobile chatting, mobile banking, and mobile commerce. However, when we send a text message via short message service (SMS) or social media, the information contained in the text message transmits as a plain text, which exposes it to attacks. In some cases, this information may be confidential, such as banking credentials, secret missions, and confidential appointments; moreover, it is a major drawback to send such information via SMS or social media, as neither provides security before transmission. In this paper, we propose a novel text steganography technique called AITSteg, which provides end-to-end security during the transmission of text messages via SMS or social media between end users. The AITSteg technique is evaluated by considering a trusted scenario. We then evaluate the efficiency of the proposed technique in terms of embedding capacity, invisibility, robustness, and security. The experiments confirm that the AITSteg is able to prevent various attacks, including man-in-the-middle attacks, message disclosure, and manipulation by readers. Moreover, we compare the experimental results with the existing techniques to show the superiority of the proposed technique. To the best of our knowledge, this is the first text steganography technique that provides end-to-end secure transmission of the text message using symmetric keys via social media. © 2013 IEEE. 

    AUTHOR KEYWORDS: chat hiding; covert communication; social media; text hiding; Text steganography
    INDEX KEYWORDS: Mobile commerce; Mobile telecommunication systems; Network security; Social networking (online); Steganography; Text messaging, Chat hiding; Covert communications; Social media; Text hidings; Text steganography, Mobile security
    PUBLISHER: Institute of Electrical and Electronics Engineers Inc.

    Dana Mazraeh, H., Abbasi Molai, A. Resolution of nonlinear optimization problems subject to bipolar max-min fuzzy relation equation constraints using genetic algorithm (2018) Iranian Journal of Fuzzy Systems, 15 (2), pp. 109-131.

    DOI: 10.22111/ijfs.2018.3762

    This paper studies the nonlinear optimization problems subject to bipolar max-min fuzzy relation equation constraints. The feasible solution set of the problems is non-convex, in a general case. Therefore, conventional nonlinear optimization methods cannot be ideal for resolution of such problems. Hence, a Genetic Algorithm (GA) is proposed to find their optimal solution. This algorithm uses the structure of the feasible domain of the problems and lower and upper bound of the feasible solution set to choose the initial population. The GA employs two different crossover operations: 1-N-points crossover and 2-Arithmetic crossover. We run the GA with two crossover operations for some test problems and compare their results and performance to each other. Also, their results are compared with the results of other authors’ works. © 2018, University of Sistan and Baluchestan. All rights reserved. 

    AUTHOR KEYWORDS: Bipolar fuzzy relation equations; Genetic algorithm; Max-min composition; Nonlinear optimization
    PUBLISHER: University of Sistan and Baluchestan

    Taleby Ahvanooey, M., Dana Mazraeh, H., Tabasi, S.H. An innovative technique for web text watermarking (AITW) (2016) Information Security Journal, 25 (4-6), pp. 191-196.

    DOI: 10.1080/19393555.2016.1202356

    Embedding a hidden stream of bits in a cover file to prevent illegal use is called digital watermarking. The cover file could be a text, image, video, or audio. In this study, we propose invisible watermarking based on the text included in a webpage. Watermarks are based on predefined structural and syntactic rules, which are encrypted and then converted into zero-width control characters using binary model classification before embedding into a webpage. This concept means that HTML (Hyper Text Markup Language) is used as a cover file to embed the hashed and transparent zero-width watermarks. We have implemented the proposed invisible watermarking against various attacks to reach optimum robustness. © 2016 Taylor & Francis. 

    AUTHOR KEYWORDS: Copy control; copyright protection; hash; invisible embedding; proof of ownership
    INDEX KEYWORDS: Digital watermarking; Hypertext systems; Syntactics; Websites, Copy control; Copyright protections; hash; invisible embedding; Proof of ownership, Copyrights
    PUBLISHER: Taylor and Francis Inc.

    Pourgholi, R., Dana, H., Tabasi, S.H. Solving an inverse heat conduction problem using genetic algorithm: Sequential and multi-core parallelization approach (2014) Applied Mathematical Modelling, 38 (7-8), pp. 1948-1958.

    DOI: 10.1016/j.apm.2013.10.019

    In this paper a numerical approach combining the least squares method and the genetic algorithm (sequential and multi-core parallelization approach) is proposed for the determination of temperature in an inverse heat conduction problem (IHCP). Some numerical experiments confirm the utility of this algorithm as the results are in good agreement with the exact data. Results show that an excellent estimation can be obtained by implementation sequential genetic algorithm within a CPU with clock speed 2.7. GHz, and parallel genetic algorithm within a 16-core CPU with clock speed 2.7. GHz for each core. © 2013 Elsevier Inc. 

    AUTHOR KEYWORDS: Genetic algorithm; IHCP; Multi-core parallelization algorithm; Sequential algorithm; The least squares method
    INDEX KEYWORDS: Clocks; Genetic algorithms; Numerical methods, IHCP; Inverse heat conduction problem; Least squares methods; Numerical experiments; Parallel genetic algorithms; Parallelization algorithms; Sequential algorithm; Sequential genetic algorithms, Least squares approximations
    PUBLISHER: Elsevier Inc.

    Pourgholi, R., Esfahani, A., Dana, H. Real valued genetic algorithm for solving an inverse hyperbolic problem: Multi-core parallelisation approach (2013) International Journal of Mathematical Modelling and Numerical Optimisation, 4 (4), pp. 410-424.

    DOI: 10.1504/IJMMNO.2013.059206

    In this paper, a numerical approach combining the use of the least squares method and the genetic algorithm (sequential and multi-core parallelisation approach) is proposed for the determination of temperature in an inverse hyperbolic heat conduction problem (IHHCP). Some numerical experiments confirm the utility of this algorithm as the results are in good agreement with the exact data. Results show that an excellent estimation can be obtained by implementation sequential genetic algorithm within a CPU with clock speed 2.4 GHz, and parallel genetic algorithm within a 16-core CPU with clock speed 2.4 GHz for each core. © 2013 Inderscience Enterprises Ltd. 

    AUTHOR KEYWORDS: Genetic algorithm; IHHCP; Inverse hyperbolic heat; Inverse hyperbolic heat conduction problem; Multi-core parallelisation; The least squares method
    PUBLISHER: Inderscience Enterprises Ltd.

    TOP