Majid MollaeefarFondazione Bruno Kessler | FBK · Security & Trust (ST)
Majid Mollaeefar
Phd
About
10
Publications
2,877
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
216
Citations
Introduction
Skills and Expertise
Publications
Publications (10)
The rapid evolution of Large Language Models (LLMs) has unlocked new possibilities for applying artificial intelligence across a wide range of fields, including privacy engineering. As modern applications increasingly handle sensitive user data, safeguarding privacy has become more critical than ever. To protect privacy effectively, potential threa...
In the rapidly evolving landscape of Artificial Intelligence (AI), ensuring the trustworthiness of AI tools deployed in sensitive use cases, such as judicial or healthcare processes, is paramount. The management of AI risks in judicial systems necessitates a holistic approach that includes various elements, such as technical, ethical considerations...
Cybersecurity risk management consists of several steps including the selection of appropriate controls to minimize risks. This is a difficult task that requires to search through all possible subsets of a set of available controls and identify those that minimize the risks of all stakeholders. Since stakeholders may have different perceptions of t...
Cybersecurity risk management consists of several steps including the selection of appropriate controls to minimize risks. This is a difficult task that requires to search through all possible subsets of a set of available controls and identify those that minimize the risks of all stakeholders. Since stakeholders may have different perceptions of t...
To ensure the effectiveness of the adopted security measures and minimize the impact of security issues on the rights and freedom of individuals, the General Data Protection Regulation (GDPR) requires to carry out a Data Processing Impact Assessment (DPIA). Such an assessment differs from traditional risk analyses in which the actor carrying out th...
In this paper, the digital image fragile watermarking method based on chaotic maps is proposed. Our method has some significant advantageous in comparison with other available methods. Firstly, we reduce watermark payloads, while they have high quality of recovery and security. In watermark embedding phase, we process the image in order to produce...
This paper, presents a novel chaos-based image steganography algorithm. Because of efficient property of chaos based security systems besides steganography applicability in providing secure communication, chaos based steganography algorithms served as a hot topic in recent researches. The proposed scheme possess novelties and advantageous such as:...
In the following paper, the novel method for color image encryption has proposed based on high level chaotic maps . We introduced two novel chaotic maps “Cosinus-Arcsinus (CA)” and “Sinus-Power Logistic (SPL)”, which have better chaotic behaviour against other available chaotic maps. Our scheme like other image encryption schemes has two main phase...
with rapid intention of using computer networks as a media for communication, providing security for this media
has gained attention of many researchers. Therefore, Image encryption methods are studied widely in order to provide
secure platform for sharing images between end parties. In this paper, a novel approach for image encryption based on
mix...
Image encryption field has motivated many researchers, recently and too many studies held by them. We propose a high dependency method the original image and parameter G. Moreover, we use a new simple chaotic map with bigger Lyapunov exponents and so stronger chaotic behaviour, against which one used by Xing-yuan Wang et al, in diffusion phase. In...