Comparison of Forbidden Zone Data Hiding and Quantization Index Modulation

Developing practical data hiding schemes that approach theoretical steganographic capacity limits is still a challenging research area. In this aspect, this problem is approached from a different perspective by proposing a novel method that relies on the newly introduced forbidden zone concept, which is defined as the host signal range, where no alterations are allowed. The proposed method, Forbidden Zone Data Hiding (FZDH), combines the forbidden zone with binning schemes and it is formulated both in general and simple parametric forms. This novel scheme is compared against the canonical binning-based data hiding schemes, such as QIM and DC-QIM, empirically, as well as in a theoretical framework. The results indicate that FZDH outperforms QIM, whereas performing competitive with DC-QIM.


National level landslide susceptibility assessment of Turkey utilizing public domain dataset
Okalp, Kivanc; Akgün, Haluk (2016-05-01)
Landslide studies have been integrated into geographic information systems with the help of technological developments using several methods like inventory, heuristic, statistic and deterministic methods in the recent years. However, since a nationwide landslide susceptibility zoning map has not been produced for the entire territory of Turkey, this study aims to produce a landslide susceptibility map of Turkey at a national scale by utilizing publicly available datasets. In order to develop a landslide sus...
Comparison of predictive models for forecasting timeseries data
Özen, Serkan; Atalay, Mehmet Volkan; Yazıcı, Adnan (2019-11-20)
© 2019 Association for Computing Machinery.Dramatic increase in data size enabled researchers to study analysis and prediction of big data. Big data can be formed in many ways and one alternative is through the use of sensors. An important aspect of data coming from sensors is that they are time-series data. Although forecasting based on time-series data has been studied widely, it is still possible to advance the state-ofthe- art by constructing new hybrid deep learning models. In this study, Random Forest...
End User Evaluation of the FAIR4Health Data Curation Tool
Gencturk, Mert; Teoman, Alper; Alvarez-Romero, Celia; Martinez-Garcia, Alicia; Parra-Calderon, Carlos Luis; Poblador-Plou, Beatriz; Löbe, Matthias; Sinaci, A Anil (2021-05-27)
The aim of this study is to build an evaluation framework for the user-centric testing of the Data Curation Tool. The tool was developed in the scope of the FAIR4Health project to make health data FAIR by transforming them from legacy formats into a Common Data Model based on HL7 FHIR. The end user evaluation framework was built by following a methodology inspired from the Delphi method. We applied a series of questionnaires to a group of experts not only in different roles and skills, but also from various...
Secure logical schema and decomposition algorithm for proactive context dependent attribute based inference control
Turan, Ugur; Toroslu, İsmail Hakkı; Kantarcioglu, Murat (2017-09-01)
Inference problem has always been an important and challenging topic of data privacy in databases. In relational databases, the traditional solution to this problem was to define views on relational schemas to restrict the subset of attributes and operations available to the users in order to prevent unwanted inferences. This method is a form of decomposition strategy, which mainly concentrates on the granularity of the accessible fields to the users, to prevent sensitive information inference. Nowadays, du...
Optimum design and operation of 'a pump-piping-storage system'
Kaplan, H; Seireg, A; Dölen, Melik (Inderscience Publishers, 2001-01-01)
The study reported in this paper is undertaken to develop a computer simulation and an optimum design and operation strategy for a general storage system. The influence of various design parameters on the total operation cost of the system for a general delivery regime is also studied.
Citation Formats
E. Esen and A. A. Alatan, “Comparison of Forbidden Zone Data Hiding and Quantization Index Modulation,” DIGITAL SIGNAL PROCESSING, pp. 181–189, 2012, Accessed: 00, 2020. [Online]. Available: