Skip to main content

Showing 1–3 of 3 results for author: Rafiee, H

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.16382  [pdf, other

    cs.CL

    TookaBERT: A Step Forward for Persian NLU

    Authors: MohammadAli SadraeiJavaheri, Ali Moghaddaszadeh, Milad Molazadeh, Fariba Naeiji, Farnaz Aghababaloo, Hamideh Rafiee, Zahra Amirmahani, Tohid Abedini, Fatemeh Zahra Sheikhi, Amirmohammad Salehoof

    Abstract: The field of natural language processing (NLP) has seen remarkable advancements, thanks to the power of deep learning and foundation models. Language models, and specifically BERT, have been key players in this progress. In this study, we trained and introduced two new BERT models using Persian data. We put our models to the test, comparing them to seven existing models across 14 diverse Persian n… ▽ More

    Submitted 23 July, 2024; originally announced July 2024.

  2. arXiv:2308.07970  [pdf

    cs.CR cs.MM

    Introducing a New Evaluation Criteria for EMD-Base Steganography Method

    Authors: Hanieh Rafiee, Mojtaba Mahdavi, AhmadReza NaghshNilchi

    Abstract: Steganography is a technique to hide the presence of secret communication. When one of the communication elements is under the influence of the enemy, it can be used. The main measure to evaluate steganography methods in a certain capacity is security. Therefore, in a certain capacity, reducing the amount of changes in the cover media, creates a higher embedding efficiency and thus more security o… ▽ More

    Submitted 15 August, 2023; originally announced August 2023.

  3. Presenting a Method for Improving Echo Hiding

    Authors: Haniyeh Rafiee, Mohammad Fakhredanesh

    Abstract: In this article, one of the most important methods of steganography on VoIP called echo hiding is improved. This method has advantages in maintaining the statistical and perceptual characteristics of audio signals as well as security against the sensitivity of the human audio system (HAS). However, it has lots of errors in detecting coded and hidden messages, which is detectable using existing ste… ▽ More

    Submitted 12 February, 2021; originally announced February 2021.

    Comments: 14 page, This paper is printed in Journal of Computer and Knowledge Engineering, Vol. 2, No. 1