Loading...
Search for: discrete-cosine-transforms
0.006 seconds
Total 31 records

    Universal image steganalysis using singular values of DCT coefficients

    , Article 2013 10th International ISC Conference on Information Security and Cryptology ; 2013 Heidari, M ; Gaemmaghami, S ; Sharif University of Technology
    IEEE Computer Society  2013
    Abstract
    We propose a blind image steganalysis method based on the Singular Value Decomposition (SVD) of the Discrete Cosine Transform (DCT) coefficients that are revisited in this work. We compute geometric mean, mean of log values, and statistical moments (mean, variance and skewness) of the SVDs of the DCT sub-blocks that are averaged over the whole image to construct a 480-element feature vector for steganalysis. These features are fed to a Support Vector Machine (SVM) classifier to discriminate between stego and cover images. Experimental results show that the proposed method outperforms most powerful steganalyzers when applied to some well-known steganography algorithms  

    A proper transform for satisfying benford's law and its application to double JPEG image forensics

    , Article 2012 IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2012, 12 December 2012 through 15 December 2012 ; 2012 , Pages 240-244 ; 9781467356060 (ISBN) Taimori, A ; Razzazi, F ; Behrad, A ; Ahmadi, A ; Babaie-Zadeh, M ; Sharif University of Technology
    2012
    Abstract
    This paper presents a new transform domain to evaluate the goodness of fit of natural image data to the common Benford's Law. The evaluation is made by three statistical fitness criteria including Pearson's chi-square test statistic, normalized cross correlation and a distance measure based on symmetrized Kullback-Leibler divergence. It is shown that the serial combination of variance filtering and block 2-D discrete cosine transform reveals the best goodness of fit for the first significant digit. We also show that the proposed transform domain brings reasonable fit for the second, third and fourth significant digits. As an application, the proposed transform domain is utilized to detect... 

    Minimisation of image watermarking side effects through subjective optimisation

    , Article IET Image Processing ; Volume 7, Issue 8 , 2013 , Pages 733-741 ; ISSN: 17519659 Golestani, H. B ; Ghanbari, M ; Sharif University of Technology
    2013
    Abstract
    This study investigates the use of structural similarity index (SSIM) on the minimised side effect to image watermarking. For the fast implementation and more compatibility with the standard discrete cosine transform (DCT)-based codecs, watermark insertion is carried out on the DCT coefficients and hence an SSIM model for DCT-based watermarking is developed. For faster implementation, the SSIM index is maximised over independent 4 × 4 non-overlapped blocks, but the disparity between the adjacent blocks reduces the overall image quality. This problem is resolved through optimisation of overlapped blocks, but, the higher image quality is achieved at a cost of high computational complexity. To... 

    A robust copyright protection scheme based on discrete cosine transform and image normalization

    , Article 2011 7th Iranian Conference on Machine Vision and Image Processing, MVIP 2011 - Proceedings ; 2011 ; 9781457715358 (ISBN) Shakeri, M ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    Watermarking is a way that is used to protect the copyright of images. As the existing watermarking methods are not robust enough a new novel scheme is needed. In this paper, we propose a zero-watermark discrete cosine transformation-based copyright protection scheme, in which a normalization procedure is applied in both watermark embedding and extraction to make our scheme more robust to geometric distortions. This method is resistant to malicious signal processing and geometric attacks such as blurring, JPEG compression, noise adding, sharpening, scaling, rotation and cropping. Experimental results on images with different complexity show that our proposed scheme outperforms related... 

    A hybrid DCT-SVD based image watermarking algorithm

    , Article 24th Iranian Conference on Electrical Engineering, ICEE 2016, 10 May 2016 through 12 May 2016 ; 2016 , Pages 838-843 ; 9781467387897 (ISBN) Heidari, M ; Karimi, N ; Samavi, S ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2016
    Abstract
    Everyday, people share their digital media on the virtual networks; therefore, protecting them against piracy is worthy of consideration. Digital watermarking is a method to achieve this goal. In this paper, we propose a watermarking method in Discrete Cosine Transform (DCT) domain. For this purpose, DCT coefficients of the whole image are calculated. It helps to present a system without blockiness effects. Then, singular values of the watermark image are added to the low frequency DCT coefficients of cover image that are located on the main diagonal. We use scaling factors for watermark embedding to improve imperceptibility of the watermark. A vector of fixed elements, which is calculated... 

    A new spread spectrum watermarking method using two levels DCT

    , Article International Journal of Electronic Security and Digital Forensics ; Volume 3, Issue 1 , 2010 , Pages 1-26 ; 1751911X (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2010
    Abstract
    In this paper, a discrete cosine transform (DCT) based blind watermarking scheme based on spread spectrum communications is proposed. We perform block-based DCT (BDCT) on the host image; then using the DC coefficients of each block, we construct a low-resolution approximation image. We apply BDCT on this approximation image, then watermark is embedded by adding a pseudo random noise sequence into its high frequencies. In detection stage, we extract the approximation image from the watermarked image, then the same pseudo random noise sequence is generated, and its correlation is computed with high frequencies of the watermarked approximation image. In our method, higher robustness is obtained... 

    Tamper Detection in Digital Images Using Transform Domains

    , M.Sc. Thesis Sharif University of Technology Barzegar, Zeynab (Author) ; Jamzad, Mansour (Supervisor)
    Abstract
    Nowadays, digital images are easy to manipulate and edit due to availability of powerful image processing and editing software. It is possible to add or remove important features to the image without leaving any obvious traces of tampering. Therefore, proving the authenticity and integrity of digital media becomes increasingly important. In this study, we focus on detection of a special type of digital forgery, the copy-move attack, in which a part of the image is copied and pasted somewhere else in the image with the intent to cover an important image features or to add some fake feature. In this way we propose some novel methods that work in spatial domain, Discrete Cosine domain and... 

    Analysis of Sensitivity of Features to Data Embedding in Blind Image Steganalysis

    , M.Sc. Thesis Sharif University of Technology Heidari, Mortaza (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    Steganalysis is the science of detecting covert communication. It is called blind (universal) if designed to detect stego images steganographied by a wide range of embedding methods. In this method, statistical properties of the image are explored, regardless the embedding procedure employed. The main problem for image steganalysis is to find sensitive features and characteristics of the image which make a statistically significant difference between the clean and stego images. In this thesis we propose a blind image steganalysis method based on the singular value decomposition (SVD) of the discrete cosine transform (DCT) coefficients that are revisited in this work in order to enhance the... 

    Improving the Robustness of Image Watermarking for Publicly Copyright-Proving

    , M.Sc. Thesis Sharif University of Technology Shakeri, Mahsa (Author) ; Jamzad, Mansour (Supervisor)
    Abstract
    The advent of Internet and advancement of computer technologies have enabled convenient and fast exchange of multimedia so the illegal reproduction and modification of digital media has become increasingly serious. Hence, how to protect the intellectual property rights of digital multimedia is an imperative issue. Digital watermarking is one of the solutions to prevent unauthorized use of images. Traditional digital watermarking techniques embed a watermark such as logo, trademark, or copyright information into a host image so that it is not perceptible. These techniques, depending on the amount of embedded data, will distort the content of host image which results in quality degradation of... 

    A sensitivity study of FILTERSIM algorithm when applied to DFN modeling

    , Article Journal of Petroleum Exploration and Production Technology ; Vol. 4, issue. 2 , June , 2014 , p. 153-174 ; ISSN: 21900558 Ahmadi, R ; Masihi, M ; Rasaei, M. R ; Eskandaridalvand, K ; Shahalipour, R ; Sharif University of Technology
    Abstract
    Realistic description of fractured reservoirs demands primarily for a comprehensive understanding of fracture networks and their geometry including various individual fracture parameters as well as network connectivities. Newly developed multiple-point geostatistical simulation methods like SIMPAT and FILTERSIM are able to model connectivity and complexity of fracture networks more effectively than traditional variogrambased methods. This approach is therefore adopted to be used in this paper. Among the multiple-point statistics algorithms, FILTERSIM has the priority of less computational effort than does SIMPAT by applying filters and modern dimensionality reduction techniques to the... 

    Parallel 3-dimensional DCT computation on k-Ary n-cubes

    , Article 8th International Conference on High-Performance Computing in Asia-Pacific Region, HPC Asia 2005, Beijing, 30 November 2005 through 3 December 2005 ; Volume 2005 , 2005 , Pages 91-97 ; 0769524869 (ISBN); 9780769524863 (ISBN) Modarressi, M ; Sarbazi Azad, H ; Sharif University of Technology
    2005
    Abstract
    The three dimensional discrete cosine transform (3D DCT) has been widely used in many applications such as video compression. On the other hand, the kary n-cube is one of the most popular interconnection networks used in many recent multicomputers. As direct calculation of 3D DCT is very time consuming, many researchers have been working on developing algorithms and special-purpose architectures for fast computation of 3D DCT. This paper proposes a parallel algorithm for efficient calculation of 3D DCT on the k-ary n-cube multicomputers. The time complexity of the proposed algorithm is of O(N) for an N × N × N input data cube while direct calculation of 3D DCT has a complexity of O(N6). ©... 

    A low bit rate hybrid wavelet-DCT video codec

    , Article IEEE Transactions on Circuits and Systems for Video Technology ; Volume 15, Issue 7 , 2005 , Pages 935-937 ; 10518215 (ISSN) Dianat, R ; Ghanbari, M ; Marvasti, F ; Sharif University of Technology
    2005
    Abstract
    A hybrid video codec, where the intraframe pictures are wavelet-based coded and the interframe pictures are coded with a standard H.263 codec is proposed. We show that intraframe-wavelet coded pictures not only improve the quality of I-pictures but also result in lower distorted prediction pictures that outperforms a pure H.263 video codec. © 2005 IEEE  

    A mixed layer multiple description video coding scheme

    , Article IEEE Transactions on Circuits and Systems for Video Technology ; Volume 22, Issue 2 , February , 2012 , Pages 202-215 ; 10518215 (ISSN) Kazemi, M ; Sadeghi, K. H ; Shirmohammadi, S ; Sharif University of Technology
    Abstract
    Multiple description coding (MDC) is a technique where multiple streams from a source video are generated, each individually decodable and mutually refinable. MDC is a promising solution to overcome packet loss in video transmission over noisy channels, particularly for real-time applications in which retransmission of lost information is not practical. A problem with conventional MDC is that the achieved side distortion quality is considerably lower than single description coding (SDC) quality except at high redundancies which in turn leads to central quality degradation. In this paper, a new mixed layer MDC scheme is presented with no degradation in central quality, and providing better... 

    Image coding and compression with sparse 3d discrete cosine transform

    , Article 8th International Conference on Independent Component Analysis and Signal Separation, ICA 2009, Paraty, 15 March 2009 through 18 March 2009 ; Volume 5441 , 2009 , Pages 532-539 ; 03029743 (ISSN) Palangi, H ; Ghafari, A ; Babaie Zadeh, M ; Jutten, C ; Sharif University of Technology
    2009
    Abstract
    In this paper, an algorithm for image coding based on a sparse 3-dimensional Discrete Cosine Transform (3D DCT) is studied. The algorithm is essentially a method for achieving a sufficiently sparse representation using 3D DCT. The experimental results obtained by the algorithm are compared to the 2D DCT (used in JPEG standard) and wavelet db9/7 (used in JPEG2000 standard). It is experimentally shown that the algorithm, that only uses DCT but in 3 dimensions, outperforms the DCT used in JPEG standard and achieves comparable results (but still less than) the wavelet transform. © Springer-Verlag Berlin Heidelberg 2009  

    Improve Performance of Higher Order Statistics in Spatial and Frequency Domains in Blind Image Steganalysis

    , M.Sc. Thesis Sharif University of Technology Shakeri, Ehsan (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    Blind image steganalysis is a technique used to, which require no prior information about the steganographic method applied to the stego im- age, determine whether the image contains an embedded message or not. The basic idea of blind steganalysis is to extract some features sensitive to information hiding, and then exploit classifiers for judging whether a given test image contains a secret message.The main focus of this research is to design an choose features sen-sitive to the embedding changes. In fact, we use high order moments in different domains, such as spatial, DCT and multi-resolution do-main, in order to improve the performance of existing steganalyzers.Accordingly, First, we... 

    Modified Computed Tomographic Imaging Systems with Improved Reconstructed Image Quality

    , M.Sc. Thesis Sharif University of Technology Atashbar, Hamed (Author) ; Kavehvash, Zahra (Supervisor)
    Abstract
    Computerized tomography (CT) imaging is a powerful tool among the existing bio-imaging techniques for capturing bio-images. In a CT scan procedure, linear sensors receive x-ray radiations, passed through the patient’s body and the reconstruction algorithms provide the required image for physicians from the captured data. In spite of its great advantages, due to the use of x-ray radiations and its ionization effect, it will raise the risk of cancer in long times. Therefore, to take benefit from several advantages of CT such as low-cost and high speed, solving this problem is aimed by many physicians and scientists. A new compressed sensing-based algorithm in order to reduce the number of... 

    Sparse-induced similarity measure: Mono-modal image registration via sparse-induced similarity measure

    , Article IET Image Processing ; Volume 8, Issue 12 , 1 December , 2014 , Pages 728-741 ; ISSN: 17519659 Ghaffari, A ; Fatemizadeh, E ; Sharif University of Technology
    Abstract
    Similarity measure is an important key in image registration. Most traditional intensity-based similarity measures (e.g. sum-of-squared-differences, correlation coefficient, mutual information and correlation ratio) assume a stationary image and pixel-by-pixel independence. These similarity measures ignore the correlation among pixel intensities; hence, a perfect image registration cannot be achieved especially in the presence of spatially varying intensity distortions and outlier objects that appear in one image but not in the other. It is supposed here that non-stationary intensity distortion (such as bias field) has a sparse representation in the transformation domain. Based on this... 

    A new blind energy based DWT-SVD domain watermarking using error control coding

    , Article International Journal of Knowledge-Based and Intelligent Engineering Systems ; Volume 19, Issue 2 , 2015 , Pages 135-141 ; 13272314 (ISSN) Tahzibi, M ; Sahebjamiyan, M ; Shahbahrami, A ; Sharif University of Technology
    IOS Press  2015
    Abstract
    The growth of data communication networks has made digital watermarking an important issue for copyright and content protection. Achieving high level of robustness and good transparency are the main objectives of developing every digital watermarking algorithm. From among transform domains as the basis of watermark hiding place, Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) are the most commonly used transforms in literature. In this paper we propose a new hybrid DWT-SVD domain watermarking scheme taking into account the energy content of every chosen block of the selected DWT sub-band coefficients. Before embedding, we append a... 

    Secure steganography based on embedding capacity

    , Article International Journal of Information Security ; Volume 8, Issue 6 , 2009 , Pages 433-445 ; 16155262 (ISSN) Sajedi, H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    Mostly the embedding capacity of steganography methods is assessed in non-zero DCT coefficients. Due to unequal distribution of non-zero DCT coefficients in images with different contents, images with the same number of non-zero DCT coefficients may have different actual embedding capacities. This paper introduces embedding capacity as a property of images in the presence of multiple steganalyzers, and discusses a method for computing embedding capacity of cover images. Using the capacity constraint, embedding can be done more secure than the state when the embedder does not know how much data can be hidden securely in an image. In our proposed approach, an ensemble system that uses... 

    Temporal resolution enhancement of video sequences using transform domain

    , Article Proceedings of the 2008 International Conference on Image Processing, Computer Vision, and Pattern Recognition, IPCV 2008, 14 July 2008 through 17 July 2008, Las Vegas, NV ; 2008 , Pages 185-190 ; 1601320787 (ISBN); 9781601320780 (ISBN) Atrianfar, H ; Atrianfar, M ; Atrianfar, H ; Sharif University of Technology
    2008
    Abstract
    Temporal interpolation has been recently proposed as a solution for increasing temporal resolution or even for predicting missing or corrupted frames within a video sequence . In this paper new technique on temporal interpolation are presented, by mainly exploiting properties of the very popular and highly efficient transforms such as Discrete Cosine Transform and Discrete Wavelet Transform . Novelty of the approach is that resolution enhancement is done by adding the new coefficients in transform domain . In addition we further give a method for computing PSNR of the frames . Finally simulation on a number of video sequences is presented in order to compare the performance of this two...