JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH
1. JHAE: A Novel Permutation-Based Authenticated Encryption Mode Based on the Hash Mode JH

Javad Alizadeh; Mohammad Reza Aref; Nasour Bagheri; Alireza Rahimi

Volume 2, Issue 1 , Winter and Spring 2015, Pages 3-20

Abstract
  Authenticated encryption (AE) schemes provide both privacy and integrity ofdata. CAESAR is a competition to design and analysis of the AE schemes. AnAE scheme has two components: a ...  Read More
Steganography of Halftone Images by Group Alteration of Grayscale Pixels
2. Steganography of Halftone Images by Group Alteration of Grayscale Pixels

Mojtaba Mahdavi; Shadrokh Samavi

Volume 2, Issue 1 , Winter and Spring 2015, Pages 21-30

Abstract
  Data hiding in halftone images is a challenging task since these images are very susceptible to alterations. Current steganographic methods for these types of images either embed the ...  Read More
A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion
3. A Method for Assessing Maintainability of Software Architectural Styles in Self-healing Systems by Measuring Coupling and Cohesion

Azam Farokh; Seyed Morteza Babamir

Volume 2, Issue 1 , Winter and Spring 2015, Pages 31-42

Abstract
  In this article, our aim is to quantify the impact of three reference architectural styles, i.e. Aspect-peer-to-peer, Aggregator-escalator-peer, and Chain-of-configurators on the maintainability ...  Read More
A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set
4. A High Speed Residue-to-Binary Converter for Balanced 4-Moduli Set

MohammadReza Taheri; Nasim Shafiee; Mohammad Esmaeildoust; Zhale Amirjamshidi; Reza Sabbaghi-nadooshan; Keivan Navi

Volume 2, Issue 1 , Winter and Spring 2015, Pages 43-54

Abstract
  The moduli set 2 n−1 − 1, 2 n+1 − 1, 2 n , 2 n − 1 has been recently proposed inliterature for class of 4n-bit dynamic range in residue number system. Due toonly ...  Read More
Improving Face Recognition Systems Security Using Local Binary Patterns
5. Improving Face Recognition Systems Security Using Local Binary Patterns

Abdolhossein Fathi; Fardin Abdali-Mohammadi

Volume 2, Issue 1 , Winter and Spring 2015, Pages 55-62

Abstract
  Face recognition systems suffer from different spoofing attacks like photograph-based and video-based spoofing attacks. This paper presents a new method to empower the face recognition ...  Read More
A Study on Intelligent Authorship Methods in Persian Language
6. A Study on Intelligent Authorship Methods in Persian Language

Zeinab Farahmandpour; Hooman Nikmehr

Volume 2, Issue 1 , Winter and Spring 2015, Pages 63-76

Abstract
  Author identification is an attempt to demonstrate the characteristics of the author of a piece of language information so that in the end, it would be possible to significantly distinguish ...  Read More