[1] De Rosal Ignatius Moses Setiadi, “Digital image steganography survey and investigation (goal, assessment, method, development, and dataset)”
Signal Processing,
vol. 206, May 2023.
[2] Pratap Chandra Mandal, Imon Mukherjee, Goutam Paul, B. N. Chatter “Digital image steganography: A literature survey”
Information Sciences vol. 609, pp. 1451-1488, September 2022.
[3] B. F. Alatiyyat and N. C, ”Survey on Image Steganography Techniques” 2nd International Conference on Computing and Information Technology (ICCIT), Tabuk, Saudi Arabia, 2022, pp. 57-64, doi: 10.1109/ICCIT52419.2022.9711651.
[4] Saeid Fazli, Maryam Zolfaghari-Nejad, “A New Steganalysis Method for Steganographic Images on DWT Domain” International Journal of Science and Engineering Investigations, March 2012, Vol. 1.
[5]Trivikram Muralidharan, “The infinite race between steganography and steganalysis in images”,
Signal Processing,
vol. 201, December 2022.
[6] S. Talati and P. Etezadifar, “Providing an Optimal Way to Increase the Security of Data Transfer using Watermarking in Digital Audio Signals” Majlesi Journal of Telecommunication Devices, 9(1), pp. 35-46, 2020.
[7] S. Talati, P. EtezadiFar, M. R. Hassani Ahangar, and M. Molazade, “Investigation of Steganography Methods in Audio Standard Coders: LPC, CELP, MELP” Majlesi Journal of Telecommunication Devices, 12(1), pp. 7-15, 2023, doi: 10.30486/mjtd.2022.695928.
[8] I. R. Farah, I. B. Ismail, and M. B. Ahmed, "A Watermarking System Using the Wavelet Technique for Satellite Images", Word Academy of Science, Engineering and Technology, vol. 17, Dec. 2006. ISSN 1307-6884.
[9] C. Rafael Gonzalez, “Digital Image Processing using Matlab”, Pearson Prentice Hall, 2004.
[10] Bo Yang and Beixing Deng, “Steganography in Gray Images Using Wavelet”, Department of Electronic Engineering, Tsinghua University, Beijing, China, 2005.
[11] S. Ghanbari, “New Steganalysis Method using GlCM and Neural Network” International Journal of Computer Applications, March 2012.
[12] S. Talati and M. R. Hassani Ahangar, “Analysis, Simulation and Optimization of LVQ Neural Network Algorithm and Comparison with SOM”, Majlesi Journal of Telecommunication Devices, 9(1), pp. 17-22, 2020.
[13] Talati, S., and M. R. Hasani Ahangar. “Radar data processing using a combination of principal component analysis methods and self-organizing and digitized neural networks of the learning vector.” Electronic and Cyber Defense 9.2 (2021): 1-7.
[14] M. Dalal and M. Juneja, “Steganalysis of DWT Based Steganography Technique for SD and HD Videos”. Wireless Pers Commun 128, pp. 2441–2452, 2023.
[17] H. Sajedi, “Steganalysis based on steganography pattern discovery,” Journal of Information Security and Applications, vol. 30, pp. 3–14, 2016.
[18] S. Ghanbari, “New steganalysis method using glcm and neural network,” International Journal of Computer Applications; vol. 42(7), pp. 46–50, 2012.
[20] Rostami V, Khiavi AS. “Particle Swarm Optimization based feature selection with novel fitness function for image steganalysis”. In: Artificial intelligence and robotics, 2016. p. 109–14.
[21] (HUGO), “Steganalysis: breaking highly unde-tectable steganography,” Lecture notes in computer science (including subseries on lecture notes in artificial intelligence lecture notes in bioinfor- matics (LNCS)), vol. 6958, pp. 71–84, 2011.
[22] O. Juarez-Sandoval, “Compact image steganalysis for LSB-matching steganography”. In: Proceedings-2017 5th international work- shop on biometrics and forensics, (IWBF 2017), pp. 1–6, 2017.
[23] S. Talati, A. Rahmati, and H. Heidari, “Investigating the Effect of Voltage Controlled Oscillator Delay on the Stability of Phase Lock Loops”, MJTD, vol. 8, no. 2, pp. 57-61, 2019.
[24] S. Talati and M. R. Hassani Ahangar, “Combining Principal Component Analysis Methods and Self-Organized and Vector Learning Neural Networks for Radar Data”, Majlesi Journal of Telecommunication Devices, vol. 9(2), pp. 65-69, 2020.
[25] M. R. Hassani Ahangar, S. Talati, A. Rahmati, and H. Heidari, “The Use of Electronic Warfare and Information Signaling in Network-based Warfare”. Majlesi Journal of Telecommunication Devices, vol. 9(2), pp. 93-97, 2020.
[26] M. Aslinezhad, O. Mahmoudi, and S. Talati, “Blind Detection of Channel Parameters Using Combination of the Gaussian Elimination and Interleaving,” Majlesi Journal of Mechatronic Systems, vol. 9(4), pp. 59-67, 2020.
[27] S. Talati and A. Amjadi, “Design and Simulation of a Novel Photonic Crystal Fiber with a Low Dispersion Coefficient in the Terahertz Band”. Majlesi Journal of Mechatronic Systems, vol. 9(2), pp. 23-28, 2020.
[28] S. Talati, S. M. Alavi, and H. Akbarzade, “Investigating the Ambiguity of Ghosts in Radar and Examining the Diagnosis and Ways to Deal with it,” Majlesi Journal of Mechatronic Systems, vol. 10(2), 2021.
[29] P. Etezadifar and S. Talati, “Analysis and Investigation of Disturbance in Radar Systems Using New Techniques of Electronic Attack,” Majlesi Journal of Telecommunication Devices, 10(2), pp. 55-59, 2021.
[30] S. Talati, B. Ebadi, and H. Akbarzade “Determining of the fault location in distribution systems in presence of distributed generation resources using the original post phasors,” QUID 2017, pp. 1806-1812, Special Issue No.1- ISSN: 1692-343X, Medellin-Colombia. April 2017.
[31] S.Talati and S. M. Alavi “Radar Systems Deception using Cross-eye Technique,” Majlesi Journal of Mechatronic Systems, vol. 9(3), pp. 19-21, 2020.
[32] S.Talati, M. Akbari Thani, and M. R.Hassani Ahangar, “Detection of Radar Targets Using GMDH Deep Neural Network”, Radar Journal, vol. 8 (1), pp. 65-74, 2020.
[33] S.Talati, R. Abdollahi, V. Soltaninia, and M. Ayat, “A New Emitter Localization Technique Using Airborne Direction Finder Sensor,” Majlesi Journal of Mechatronic Systems, vol. 10(4), pp. 5-16, 2021.
[34] H. Akbarzade, S. M. Alavi, and S. Talati, “Investigating the Ambiguity of Ghosts in Radar and Examining the Diagnosis and Ways to Deal with it,” Majlesi Journal of Mechatronic Systems, vol. 10.2, pp. 17-20, 2021.
[35] S. M. Hashemi, S. Barati, S. Talati, and H. Noori, “A genetic algorithm approach to optimal placement of switching and protective equipment on a distribution network.” J. Eng. Appl. Sci. vol. 11, pp. 1395-1400, 2016.
[36] O. Sharifi-Tehrani and S. Talati, “PPU Adaptive LMS Algorithm, a Hardware-Efficient Approach; a Review on”, Majlesi Journal of Mechatronic Systems, vol. 6, no. 1, Jun. 2017.
[37] S. Hashemi, & M. Abyari, Sh. Barati, S.Tahmasebi, and S. Talati, “A proposed method to controller parameter soft tuning as accommodation FTC after unknown input observer FDI,” Journal of Engineering and Applied Sciences, vol. 11, pp. 2818-2829, 2016.
[38] S. Talati, et al., “Analysis and Evaluation of Increasing the Throughput of Processors by Eliminating the Lobe’s Disorder,” Majlesi Journal of Telecommunication Devices 10.3, pp. 119-123, 2021.
[39] S. Talati, S. M. Ghazali, M. R. Hassani Ahangar, and S. M. Alavi, “Analysis and Evaluation of Increasing the Throughput of Processors by Eliminating the Lobe’s Disorder',” Majlesi Journal of Telecommunication Devices, vol. 10(3), pp. 119-123, 2021. doi: 10.52547/mjtd.10.3.119
[40] S. Talati, A. Rahmati, and H. Heidari, “Investigating the Effect of Voltage Controlled Oscillator Delay on the Stability of Phase Lock Loops”, MJTD, vol. 8, no. 2, pp. 57-61, May 2019.
[41] S. Talati and P. EtezadiFar, “Electronic attack on radar systems using noise interference,” Majlesi Journal of Mechatronic Systems 10.3, pp. 7-11, 2021.
[42] S. M. Ghazali, J. Mazloum, and Y. Baleghid, “Modified binary salp swarm algorithm in EEG signal classification for epilepsy seizure detection,” Biomedical Signal Processing and Control, vol. 78, September 2022, 103858.
[43] S. Talati, S. M.Ghazali, V. R. SoltaniNia, “Design and construct full invisible band metamaterial-based coating with layer-by-layer structure in the microwave range from 8 to 10 GHz,” Journal of Physics D: Applied Physics,
vol. 56,
no. 17, 2023. DOI 10.1088/1361-6463/acb8c7.
[44] M. R. Hasani Ahangar and M. Mohammadi, “Evaluation of Efficient Factors on Quality of Service in Routing Protocols,” Passive Defense Quarterly, no. 3, vol. 3, 2012.