Loading...
Search for: shirali--ali
0.101 seconds

    Parental control based on speaker class verification

    , Article IEEE Transactions on Consumer Electronics ; Volume 54, Issue 3 , 2008 , Pages 1244-1251 ; 00983063 (ISSN) Shirali-Shahreza, S ; Sameti, H ; Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    Restricting children access to materials unsuitable for them such as violence scenes is very important for parents. So there is a feature named Parental Control in devices such as televisions and computers to define the contents children can access. The parental control setting must be protected from children and is usually done by a password. In this paper, we propose a new method for distinguishing between adult users and child users based on human speech. In our proposed method, the user must say a word and the adult users are identified by processing the speech. Our current implementation has 92.5% accuracy for distinguishing adult users from children. © 2008 IEEE  

    Fast and scalable system for automatic artist identification

    , Article IEEE Transactions on Consumer Electronics ; Volume 55, Issue 3 , 2009 , Pages 1731-1737 ; 00983063 (ISSN) Shirali Shahreza, S ; Abolhassani, H ; Shirali Shahreza, M. H ; Sharif University of Technology
    2009
    Abstract
    Digital music technologies enable users to create and use large collections of music. One of the desirable features for users is the ability to automatically organize the collection and search in it. One of the operations that they need is automatic identification of tracks' artists. This operation can be used to automatically classify new added tracks to a collection. Additionally, the user can use this operation to identify the artist of an unknown track. The artist name of a track can help the user find similar music. In this paper, we introduce a fast and scalable system that can automatically identify the artist of music tracks. This system is creating a signature for each track that is... 

    Compact representation of multimedia files for indexing, classification and retrieval

    , Article Proceedings of the International Conference on Management of Emergent Digital EcoSystems, MEDES '09, 27 October 2009 through 30 October 2009, Lyon ; 2009 , Pages 489-492 ; 9781605588292 (ISBN) Shirali Shahreza, S ; Sharif University of Technology
    2009
    Abstract
    Multimedia files including audio, music and movies are important part of resources available on the Internet. With the expansion of personal computers and other digital devices such as digital cameras, ordinary people are also creating different multimedia files. Hence, there are huge amount of multimedia files in the Internet. Considering the volume of files available, we need automatic methods for indexing, classification and retrieval of multimedia files. But, there are a number of problems in processing multimedia files. Two important issues are the large size of multimedia files and different lengths of different files. In this PhD project, we want to develop a solution for these two... 

    Use speech for user's group identification

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 24 June 2009 through 26 June 2009, Saarbrucken ; Volume 5723 LNCS , 2009 , Pages 313-316 ; 03029743 (ISSN) ; 3642125492 (ISBN) Shirali Shahreza, S ; Sharif University of Technology
    2009
    Abstract
    Speech is one of the main communication methods used by humans. So designing speech based interfaces for computer applications can ease the use of them for different users, especially disabled and elderly people. In this project, we want to design and implement a system that can identify user's group from his/her speech. We are working on two main applications: Parental Control and Completely Automated Public Turing test to tell Computers and Human Apart (CAPTCHA). In the Parental Control application, we want to distinguish between child users and adults based on human speech. This can be used to restrict child user access to adult materials such as adult websites. In the CAPTCHA... 

    Improving mobile banking security using steganography

    , Article 4th International Conference on Information Technology-New Generations, ITNG 2007, Las Vegas, NV, 2 April 2007 through 4 April 2007 ; 2007 , Pages 885-887 ; 0769527760 (ISBN); 9780769527765 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2007
    Abstract
    Upon development of m-commerce as one of the new branches of e-commerce, m-banking has emerged as one of the main divisions of m-commerce. As the m-banking was received very well, it has embarked upon supply of various services based on different systems and with the aid of various services such as the Short Messaging Service (SMS). However, in spite of its advantages, m-banking is facing some challenges as well. One of these challenges is the issue of security of this system. This paper presents a method for increasing security of the information requested by users with the use of steganography method. In this method, instead of direct sending of the information, it is hidden in a picture... 

    A new method for real-time steganography

    , Article 8th International Conference on Signal Processing, ICSP 2006, Guilin, 16 November 2006 through 20 November 2006 ; Volume 4 , 2006 ; 0780397371 (ISBN); 9780780397378 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2006
    Abstract
    The hidden, real-time sending and display of information, esp. in public places, has since long received attention and faced many challenges. Therefore, different methods have been proposed so far for hiding information in different cover media. In this paper I propose a new method for the real-time hiding of information without need to any storage cover media. This method is based on the real-time hiding of information in output screens of the instrument (such as screens shown by the monitor). This method of steganography is very similar to the two discussions of image steganography and video steganography. The idea suggested in this paper was simulated on a PC computer by using the Pascal... 

    Text steganography by changing words spelling

    , Article 2008 10th International Conference on Advanced Communication Technology, Phoenix Park, 17 February 2008 through 20 February 2008 ; Volume 3 , 2008 , Pages 1912-1913 ; 17389445 (ISSN); 9788955191356 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    One of the important issues in security fields is hidden exchange of information. There are different methods for this purpose such as cryptography and steganography. Steganography is a method of hiding data within a cover media so that other individuals fail to realize their existence. In this paper a new method for steganography in English texts is proposed. In this method the US and UK spellings of words substituted in order to hide data in an English text. For example "color" has different spelling in UK (colour) and US (color). Therefore the data can be hidden in the text by substituting these words  

    Steganography in MMS

    , Article 11th IEEE International Multitopic Conference, INMIC 2007, Lahore, 28 December 2007 through 30 December 2007 ; 2007 ; 1424415535 (ISBN); 9781424415533 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2007
    Abstract
    After rapid growth of the Internet, establishing hidden communication is an important subject of security that has gained increasing importance. One of the methods for establishing hidden communication is steganography. On the other hand with the expanding the use of mobile phones mobile telecommunication companies starting to add additional features to their mobile phones such as MMS (Multimedia Messaging Service) in order to attract more customers. Considering above statements, steganography in MMS messages is a good solution for establishing hidden communication. In this paper a new method for steganography in MMS messages using both text and image steganography methods is presented. This... 

    Pseudo-space Persian/Arabic text steganography

    , Article 13th IEEE Symposium on Computers and Communications, ISCC 2008, Marrakech, 6 July 2008 through 9 July 2008 ; 2008 , Pages 864-868 ; 15301346 (ISSN) ; 9781424427031 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    In recent years by growing computer applications, new technologies are also invented. Meanwhile new issues are faced such as security. One of the security areas is hidden exchange of information which contains methods such as cryptography and steganography. Steganography is the art of hiding data in a cover media such as image or sound. In this paper a new method for Steganography in Persian and Arabic texts is presented. In this method pseudo-space character is used for hiding the data. This character prevents the Persian and Arabic letters from joining but without adding a space between the two and keeps the words closer together. Its code is 200C in Unicode hex notation. This character... 

    Design and implementation of three different methods for announcing exam grades on the web

    , Article 8th IEEE International Conference on Advanced Learning Technologies, ICALT 2008, Santander, 1 July 2008 through 5 July 2008 ; 2008 , Pages 335-337 ; 9780769531670 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    After the emergence of modern technologies in the field of information technologies (IT), virtual learning has attained a new form. The way of announcing exams' grades is an important topic in e-learning. For announcing exams' grades on the web, various methods have been proposed. In this paper, first some common methods for announcing students' grades are reviewed, then three new methods which are named "Virtual Grade", "Steganography Grades", and "Grade HIP" are introduced and the result of implementing these methods for announcing the grades of some courses at the some Iranian universities are provided. Also these methods and their results are analyzed. Finally these three new methods are... 

    Improving English lab classes using Sony PSP (PlayStation Portable)

    , Article 8th IEEE International Conference on Advanced Learning Technologies, ICALT 2008, Santander, 1 July 2008 through 5 July 2008 ; 2008 , Pages 489-490 ; 9780769531670 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    After the emergence of modern technologies in recent years, learning methods have attained a new form. Using game consoles as educational tools is a new idea which is gained attracted by some researchers. This paper proposes a new method for improving English lab classes using Sony PSP (PlayStation Portable) handheld game consoles especially for Iranian schools. © 2008 IEEE  

    Highlighting CAPTCHA

    , Article 2008 Conference on Human System Interaction, HSI 2008, Krakow, 25 May 2008 through 27 May 2008 ; 2008 , Pages 247-250 ; 1424415438 (ISBN); 9781424415434 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    There are many sites specially designed for mobile phones. In cases such as the registering in websites, some hackers write programs to make automatic false enrolments which waste the resources of the website. Therefore, it is necessary to distinguish between human users and computer programs. These systems are known as CAPTCHA (Completely Automated Public Turing test to tell Computers and Human Apart). CAPTCHA methods are mainly based on the weak points of OCR (Optical Character Recognition) systems while using them difficult in tools such as PDAs (Personal Digital Assistant) or mobile phones that lack a big keyboard. So the Non-OCR-Based CAPTCHA methods are proposed which are do not need... 

    Taking multiple-choise quiz by SMS on mobile phones including analyzing property

    , Article Journal of Computers (Finland) ; Volume 2, Issue 2 , 2007 , Pages 53-60 ; 1796203X (ISSN) Shirali Shahreza, M ; Sharif University of Technology
    Academy Publisher  2007
    Abstract
    Recently Mobile Learning (M-Learning) has attracted much attention. Due to advantages of SMS (Short Messaging Service) on mobile phones we present a safe and protected method for taking multiple-choice quizzes by using the SMS on mobile phones in this paper. In this method questions of quiz are sent to students along with their answers through some SMS messages. The students will receive their grades immediately after answering the questions and this grade is also sent to the instructor or professor along with the student's answers through an SMS Picture Message. Answers of questions and the student's grade are hidden in SMS picture message through stenography and then they are sent. The... 

    Aiding speech-impaired people using Nintendo DS game console

    , Article 1st International Conference on Pervasive Technologies Related to Assistive Environments, PETRA 2008, Athens, 16 July 2008 through 18 July 2008 ; 2008 ; 9781605580678 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    By rapid growth of technology in recent years, many services are provided for disabled people. Using wireless devices such as mobile phones in healthcare is a new idea which is gained attracted by some developers in recent years. On the other hand, nowadays game consoles are not only for playing games, but also have more functions such as using for education. Considering the above mentioned facts, this paper proposes a method to aid speech-impaired children using Nintendo DS Game console. This method helps the speech-impaired children which are not capable of using sign language well to communicate with others until they learn sign language well. Because the Nintendo DS is the most popular... 

    A simple method for detecting the possible changes of hidden information of watermarked image in an MMS message

    , Article IEEE- International Symposium on Biometrics and Security Technologies, ISBAST'08, Islamabad, 23 April 2008 through 24 April 2008 ; 2008 Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    After expanding the use of computer and its affect on different aspect of life, the copyright issue has gained many attractions. For this purpose watermarking methods are proposed. In these methods a code is embedded into digital material that can be used to approve ownership, it can be visible or invisible to the user. On the other hand with the rapid growth of mobile phones, mobile telecommunication companies starting to add additional features to their mobile phones such as MMS (Multimedia Messaging Service) in order to attract more customers. MMS is a technology that allows mobile phones sending messages that includes multimedia objects esp. images. For copyright protection of images... 

    Login to internet websites by next generation game console

    , Article 2006 2nd IEEE/IFIP International Conference in Central Asia on Internet, ICI 2006, Tashkent, 19 September 2006 through 21 September 2006 ; 2006 ; 1424405432 (ISBN); 9781424405435 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    By a great leap, the computer game industry has today reached fame as big as filmmaking industry. Upon introduction of the new generation of game consoles, this industry will witness spectacular progress. One of these next generation consoles is Nintendo console named "Wii". This console has a new game pad which utilizes motion sensors. On the other hand, facilities such as internet connection are added in new consoles and they are not merely for playing. It is observed that placing password for creating usernames by game consoles is difficult. By the use of the specifications of Wii console game pads, a method for user authentication and entering password is proposed in this paper. By using... 

    Java applets copy protection by steganography

    , Article 2006 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2006, Pasadena, CA, 18 December 2006 through 20 December 2006 ; 2006 , Pages 388-391 ; 0769527450 (ISBN); 9780769527451 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    Following the expansion of Internet, many software were produced that could launch through Internet without prior installation on computers. This included game software and software that deal with financial affairs. These softwares are mainly in Java language and can be found on web pages as Java Applets. Some software owners want that their products only able to execute through their own web pages so that no one could put them on other web pages. In this paper, a new method has been presented to protect Java Applets from copying by using "Steganography in HTML web pages" method. In this method, a special 8-character string is hidden in the HTML page by a secret key. The string and the... 

    Emergency SMS

    , Article 2006 SICE-ICASE International Joint Conference, Busan, 18 October 2006 through 21 October 2006 ; 2006 , Pages 1139-1142 ; 8995003855 (ISBN); 9788995003855 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2006
    Abstract
    Delivering first aid before transferring patients to hospital is among keys to survival. Moreover, calling the emergency center as soon as possible and providing brief information about the patient are helpful for the emergency center to dispatch specialized medical team and equipments proportionate to the conditions of the patient. Mobile phone is a device which many people use and always carry with them. One more thing is that SMS (Short Message Service) stands as a favorite service in mobile network, used to exchange short messages and featuring low cost, non-stop lines of dispatch, possibilities for offline work and so forth. This paper puts forward procedures of calling an emergency... 

    Steganography in wireless application protocol

    , Article IASTED International Conference on Internet and Multimedia Systems and Applications, Innsbruck, 13 February 2006 through 15 February 2006 ; Volume 2006 , 2006 , Pages 91-95 ; 0889865663 (ISBN); 9780889865662 (ISBN) Shirali Shahreza, M ; Sharif University of Technology
    2006
    Abstract
    Mobile phone and Internet technologies have progressed along each other. The importance of both these technologies has resulted in the creation of a new technology for establishing wireless Internet connection through mobile phone, known as Wireless Application Protocol (WAP). However, considering the importance of the issue of data security and especially establishing hidden communications, many methods have been presented. In the meanwhile, steganography is a relatively new method. In this paper, a method for hidden exchange of data has been presented by using steganography on WML pages (WML stands for Wireless Markup Language, which is a language for creating web pages for the WAP). The... 

    Guiding tourists using nintendo DS game console

    , Article SICE Annual Conference 2008 - International Conference on Instrumentation, Control and Information Technology, Tokyo, 20 August 2008 through 22 August 2008 ; October , 2008 , Pages 3229-3232 ; 9784907764296 (ISBN) Shirali Shahreza, M ; IEEE ; Sharif University of Technology
    2008
    Abstract
    Tourism industry is an important and money-making profession in many countries. The appropriate and quick submission of primary information such as historical sites to the tourists is very effective in attracting them. Of course the tourism tools have undergone some changes and variations in accordance with technology advances and development of people's behavior in recent years. So tourism services should be developed and improved in parallel these changes in order to be successful in attraction of tourists. Considering the above mentioned facts, this paper proposes a system for providing city maps for tourists on their Nintendo DS Game console. Because the Nintendo DS is the most popular...