• Home
  • Mohammad Mehrnia

    List of Articles Mohammad Mehrnia


  • Article

    1 - Data Steganography on VoIP through Combination of Residue Number System and DNA Sequences
    Journal of Advances in Computer Research , Issue 2 , Year , Spring 2014
    Today, optimal performance and cost advantages of using Internet telephony are obvious. Despite current standardized techniques, voice transferring through protocol (VoIP) has lower security than traditional telephony. One of the most important security issues which sho More
    Today, optimal performance and cost advantages of using Internet telephony are obvious. Despite current standardized techniques, voice transferring through protocol (VoIP) has lower security than traditional telephony. One of the most important security issues which should be noticed in using VoIP is end -to-end user2 identity, i.e. when there is a connection between user A and B, user A should be assured of the identity of user B, and vice versa. The authentication of identity is one of so important information that could guarantee the security and integrity of information [1]. In this study, the security of VoIP and data steganography through the protocol has been investigated. Finally, a technique for data steganography4 over this protocol will be proposed using the method of Residue Number System3. Also, using the combination of RNS, DNA sequences, and Huffman compressing algorithm, an algorithm is proposed for data steganography through VoIP. The algorithm improves security of the process of transmission of hidden text and can use the bandwidth effectively. Manuscript profile

  • Article

    2 - Audio Signal Encryption Based on Permutation Relations and Residue Number System
    Journal of Advances in Computer Research , Issue 4 , Year , Summer 2016
    This paper presents a new audio encryption algorithm based on permutation and residue number system. In the current approach, signal samples are combined with residue number system through permutation; therefore, a specific noise is generated. Then, the audio signal is More
    This paper presents a new audio encryption algorithm based on permutation and residue number system. In the current approach, signal samples are combined with residue number system through permutation; therefore, a specific noise is generated. Then, the audio signal is combined with the noise, generated by the algorithm, to produce a silence signal. For this purpose, the algorithm uses a predefined permutation format and a modular set in the form of {2n-1, 2n, 2n+1} to encrypt the main signal. Consequently, the proposed algorithm converts the input signal into a silence signal and increases its security. The signal-to-noise ratio (SNR) was used to evaluate the algorithm. The results indicated very low values of SNR pertaining to audio signals in the proposed method. Manuscript profile