Show/Hide Menu
Hide/Show Apps
Logout
Türkçe
Türkçe
Search
Search
Login
Login
OpenMETU
OpenMETU
About
About
Open Science Policy
Open Science Policy
Open Access Guideline
Open Access Guideline
Postgraduate Thesis Guideline
Postgraduate Thesis Guideline
Communities & Collections
Communities & Collections
Help
Help
Frequently Asked Questions
Frequently Asked Questions
Guides
Guides
Thesis submission
Thesis submission
MS without thesis term project submission
MS without thesis term project submission
Publication submission with DOI
Publication submission with DOI
Publication submission
Publication submission
Supporting Information
Supporting Information
General Information
General Information
Copyright, Embargo and License
Copyright, Embargo and License
Contact us
Contact us
Comparison of Forbidden Zone Data Hiding and Quantization Index Modulation
Date
2012-01-01
Author
Esen, Ersin
Alatan, Abdullah Aydın
Metadata
Show full item record
This work is licensed under a
Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License
.
Item Usage Stats
145
views
0
downloads
Cite This
Developing practical data hiding schemes that approach theoretical steganographic capacity limits is still a challenging research area. In this aspect, this problem is approached from a different perspective by proposing a novel method that relies on the newly introduced forbidden zone concept, which is defined as the host signal range, where no alterations are allowed. The proposed method, Forbidden Zone Data Hiding (FZDH), combines the forbidden zone with binning schemes and it is formulated both in general and simple parametric forms. This novel scheme is compared against the canonical binning-based data hiding schemes, such as QIM and DC-QIM, empirically, as well as in a theoretical framework. The results indicate that FZDH outperforms QIM, whereas performing competitive with DC-QIM.
Subject Keywords
Data hiding
,
Digital watermarking
,
Quantization Index Modulation
,
Distortion Compensated Quantization Index
,
Modulation
,
Scalar Costa Scheme
,
Forbidden zone
URI
https://hdl.handle.net/11511/48891
Journal
DIGITAL SIGNAL PROCESSING
DOI
https://doi.org/10.1016/j.dsp.2011.10.005
Collections
Department of Electrical and Electronics Engineering, Article
Suggestions
OpenMETU
Core
National level landslide susceptibility assessment of Turkey utilizing public domain dataset
Okalp, Kivanc; Akgün, Haluk (2016-05-01)
Landslide studies have been integrated into geographic information systems with the help of technological developments using several methods like inventory, heuristic, statistic and deterministic methods in the recent years. However, since a nationwide landslide susceptibility zoning map has not been produced for the entire territory of Turkey, this study aims to produce a landslide susceptibility map of Turkey at a national scale by utilizing publicly available datasets. In order to develop a landslide sus...
Comparison of predictive models for forecasting timeseries data
Özen, Serkan; Atalay, Mehmet Volkan; Yazıcı, Adnan (2019-11-20)
© 2019 Association for Computing Machinery.Dramatic increase in data size enabled researchers to study analysis and prediction of big data. Big data can be formed in many ways and one alternative is through the use of sensors. An important aspect of data coming from sensors is that they are time-series data. Although forecasting based on time-series data has been studied widely, it is still possible to advance the state-ofthe- art by constructing new hybrid deep learning models. In this study, Random Forest...
Systems engineering process modeling and simulation
Arıkan, Merve; Özdemirel, Nur Evin; Department of Industrial Engineering (2012)
In this study, an approach is proposed to model and simulate the systems engineering process of design projects. One of the main aims is to model the systems engineering process, treating the process itself as a complex system. A conceptual model is developed as a result of a two-phase survey conducted with systems engineers. The conceptual model includes two levels of activity networks. Each first level systems engineering activity has its own network of second level activities. The model is then implement...
Efficient adaptive regression spline algorithms based on mapping approach with a case study on finance
Koc, Elcin Kartal; İyigün, Cem; Batmaz, İnci; Weber, Gerhard-Wilhelm (2014-09-01)
Multivariate adaptive regression splines (MARS) has become a popular data mining (DM) tool due to its flexible model building strategy for high dimensional data. Compared to well-known others, it performs better in many areas such as finance, informatics, technology and science. Many studies have been conducted on improving its performance. For this purpose, an alternative backward stepwise algorithm is proposed through Conic-MARS (CMARS) method which uses a penalized residual sum of squares for MARS as a T...
Optimum design and operation of 'a pump-piping-storage system'
Kaplan, H; Seireg, A; Dölen, Melik (Inderscience Publishers, 2001-01-01)
The study reported in this paper is undertaken to develop a computer simulation and an optimum design and operation strategy for a general storage system. The influence of various design parameters on the total operation cost of the system for a general delivery regime is also studied.
Citation Formats
IEEE
ACM
APA
CHICAGO
MLA
BibTeX
E. Esen and A. A. Alatan, “Comparison of Forbidden Zone Data Hiding and Quantization Index Modulation,”
DIGITAL SIGNAL PROCESSING
, pp. 181–189, 2012, Accessed: 00, 2020. [Online]. Available: https://hdl.handle.net/11511/48891.