| 1 | -- | 3 | Rasool Jalili. Editorial |
| 5 | -- | 36 | Mohammad Ali Akhaee, Farokh Marvasti. A survey on digital data hiding schemes: principals, algorithms, and applications |
| 37 | -- | 53 | Mahdi Soodkhah Mohammadi, Abbas Ghaemi Bafghi. Design and formal verification of DZMBE+ |
| 55 | -- | 70 | Mohammad Sabzinejad Farash, Mahmoud Ahmadian-Attari. Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC |
| 71 | -- | 82 | Mahboobe Ghiasi, Ashkan Sami, Zahra Salehi. DyVSoR: dynamic malware detection based on extracting patterns from value sets of registers |
| 83 | -- | 95 | Abolfazl Diyanat, Mohammad Ali Akhaee, Shahrokh Ghaemmaghami. Robust multiplicative video watermarking using statistical modeling |
| 97 | -- | 110 | Elham Hassani, Mohammad Eshghi. Image encryption based on chaotic tent map in time and frequency domains |