Forbidden zone data hiding

2006-10-11
A new blind data hiding method is proposed based on a novel concept of forbidden zone, where no alteration is allowed in a host signal during message embedding step. Depending on the desired probability of error, the range of the forbidden zone varies, as a compromise between robustness and embedding distortion. Hence, the proposed method makes use of this zone through a single control parameter in conjunction with modulating quantizers for message embedding. The superiority of the proposed scheme over QIM is presented theoretically, as well empirically via simulations. The method is further compared with DC-QIM and its weaknesses and strengths are stated.

Suggestions

An image encryption algorithm robust to post-encryption bitrate conversion
Akdağ, Sadık Bahaettin; Candan, Çağatay; Department of Electrical and Electronics Engineering (2006)
In this study, a new method is proposed to protect JPEG still images through encryption by employing integer-to-integer transforms and frequency domain scrambling in DCT channels. Different from existing methods in the literature, the encrypted image can be further compressed, i.e. transcoded, after the encryption. The method provides selective encryption/security level with the adjustment of its parameters. The encryption method is tested with various images and compared with the methods in the literature ...
Quantization index modulation based watermarking using holography
Okman, O. Erman; Akar, Gözde (2006-08-16)
In this paper, we propose a blind watermarking method where watermark is chosen as the hologram of the signal to be embedded. In the proposed approach the quantized phase of the hologram is embedded into an image using quantization index modulation (QIM). The robustness of the proposed technique is tested against several attacks such as filtering, compression, occlusion and cropping. Also the effects of quantization of the hologram on the reconstruction quality are demonstrated. © (2006) COPYRIGHT Society o...
Partial encryption of video for communication and storage
Yüksel, Turan; Yarman Vural, Fatoş Tunay; Akar, Gözde Bozdağı; Department of Computer Engineering (2003)
In this study, a new method is proposed to protect video data through partial encryption. Unlike previous methods, the bit rate of the encrypted portion can be controlled. In order to accomplish this task, a simple model for the time to break the partial encryption by a chipertext-only attack is defined. Then, the encrypted bit budget distribution strategy maximizing the time subject to the bitrate constraint is found. An algorithm to estimate the model parameters is constructed and it isthen implemented ov...
Design of a radio frequency identification (rfid) antenna
Kalaycı, Sefa; Birand, Mehmet Tuncay; Department of Electrical and Electronics Engineering (2009)
Fundamental features of Radio Frequency Identification (RFID) systems used in different application areas will be reviewed. Techniques used in realizing RFID antenna systems will be studied and the procedure to realize a specific RFID antenna type possessing desired characteristics will be described. Electrical properties such as radiation pattern, impedance will be predicted using analytical and/or computer simulation techniques. Experimental investigations will be carried out to complement the theoretical...
ARMA model based clutter estimation and its effect on clutter supression algorithms
Tanrıverdi, Güneş; Koç, Seyit Sencer; Department of Electrical and Electronics Engineering (2012)
Radar signal processing techniques aim to suppress clutter to enable target detection. Many clutter suppression techniques have been developed to improve the detection performance in literature. Among these methods, the most widely known is MTI plus coherent integrator, which gives sufficient radar performance in various scenarios. However, when the correlation coefficient of clutter is small or the spectral separation between the target and clutter is small, classical approaches to clutter suppression fall...
Citation Formats
E. Esen and A. A. Alatan, “Forbidden zone data hiding,” 2006, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/41553.