Forbidden zone data hiding

A new blind data hiding method is proposed based on a novel concept of forbidden zone, where no alteration is allowed in a host signal during message embedding step. Depending on the desired probability of error, the range of the forbidden zone varies, as a compromise between robustness and embedding distortion. Hence, the proposed method makes use of this zone through a single control parameter in conjunction with modulating quantizers for message embedding. The superiority of the proposed scheme over QIM is presented theoretically, as well empirically via simulations. The method is further compared with DC-QIM and its weaknesses and strengths are stated.


Real-time traffic sign detection and recognition on FPGA
Yalçın, Hüseyin; Bulut, Mehmet Mete; Akar, Gözde; Department of Electrical and Electronics Engineering (2013)
In this thesis, an embedded system for traffic sign detection and recognition is proposed. Proposed system is first designed in MATLAB and optimized. After optimization process, system design is transferred to FPGA and Virtex-V FX70 FPGA is selected for implementation platform. 640x480 sized image in RGB format is sent to FPGA system via computer interface. This image is segmented for red, blue, and yellow colors. Red and blue color maps are divided into 8x8 sub-blocks. Yellow color map is divided into 32x3...
Partial encryption of video for communication and storage
Yüksel, Turan; Yarman Vural, Fatoş Tunay; Akar, Gözde Bozdağı; Department of Computer Engineering (2003)
In this study, a new method is proposed to protect video data through partial encryption. Unlike previous methods, the bit rate of the encrypted portion can be controlled. In order to accomplish this task, a simple model for the time to break the partial encryption by a chipertext-only attack is defined. Then, the encrypted bit budget distribution strategy maximizing the time subject to the bitrate constraint is found. An algorithm to estimate the model parameters is constructed and it isthen implemented ov...
Design of a radio frequency identification (rfid) antenna
Kalaycı, Sefa; Birand, Mehmet Tuncay; Department of Electrical and Electronics Engineering (2009)
Fundamental features of Radio Frequency Identification (RFID) systems used in different application areas will be reviewed. Techniques used in realizing RFID antenna systems will be studied and the procedure to realize a specific RFID antenna type possessing desired characteristics will be described. Electrical properties such as radiation pattern, impedance will be predicted using analytical and/or computer simulation techniques. Experimental investigations will be carried out to complement the theoretical...
ARMA model based clutter estimation and its effect on clutter supression algorithms
Tanrıverdi, Güneş; Koç, Seyit Sencer; Department of Electrical and Electronics Engineering (2012)
Radar signal processing techniques aim to suppress clutter to enable target detection. Many clutter suppression techniques have been developed to improve the detection performance in literature. Among these methods, the most widely known is MTI plus coherent integrator, which gives sufficient radar performance in various scenarios. However, when the correlation coefficient of clutter is small or the spectral separation between the target and clutter is small, classical approaches to clutter suppression fall...
Covert channel detection using machine learning methods
Çavuşoğlu, İmge Gamze; Alemdar, Hande; Department of Computer Engineering (2019)
A covert channel is a communication method that misuses legitimate resources to bypass intrusion detection systems. They can be used to do illegal work like leaking classified (or sensitive) data or sending commands to malware bots. Network timing channels are a type of these channels that use inter-arrival times between network packets to encode the data to be sent. Although these types of channels are hard to detect, they are not used frequently due to their low capacity and sensitivity to the network con...
Citation Formats
E. Esen and A. A. Alatan, “Forbidden zone data hiding,” 2006, Accessed: 00, 2020. [Online]. Available: