Loading...
Search for: high-robustness
0.008 seconds

    Blind image watermarking based onsample rotation with optimal detector

    , Article European Signal Processing Conference, 24 August 2009 through 28 August 2009, Glasgow ; 2009 , Pages 278-282 ; 22195491 (ISSN) Sahraeian, S. M. E ; Akhaee, M. A ; Marvasti, F ; Sharif University of Technology
    Abstract
    This paper present a simple watermarking approach based on the rotation of low frequency components of image blocks. The rotation process is performed with less distortion by projection of the samples on specific lines according to message bit. To have optimal detection Maximum Likelihood criteria has been used. Thus, by computing the distribution of rotated noisy samples the optimum decoder is presented and its performance is analytically investigated. The privilege of this proposed algorithm is its inherent robustness against gain attack as well as its simplicity. Experimental results confirm the validity of the analytical derivations and also high robustness against common attacks. ©... 

    A robust method for recognition of complicated pulse repetition interval modulations

    , Article IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences ; Volume E96-A, Issue 11 , 2013 , Pages 2306-2310 ; 09168508 (ISSN) Keshavarzi, M ; Pezeshk, A. M ; Farzaneh, F ; Amiri, D ; Sharif University of Technology
    2013
    Abstract
    After receiving emitted signals from various radars by electronic support measures (ESM) system, several processes are applied to signals such as: deinterleaving, recognition of pulse repetition interval (PRI) modulation, PRI estimation and etc. Indeed, recognition of PRI modulation is an essential task of ESM system. In this paper a novel and robust method for recognition of complicated PRI Modulations is presented. This method uses specifications such as distribution related to members of sequences obtained from first and second order derivation of TOAs around a constant value and continuity of these sequences to recognize the PRI modulation. Some numerical simulations are performed to... 

    Analytical solution of temperature field in micro-Poiseiulle flow with constant wall temperature

    , Article 6th International Conference on Nanochannels, Microchannels, and Minichannels, ICNMM2008, Darmstadt, 23 June 2008 through 25 June 2008 ; Issue PART B , 2008 , Pages 1371-1379 ; 0791848345 (ISBN); 9780791848340 (ISBN) Darbandi, M ; Safari Mohsenabad, S ; Vakilipour, S ; ASME ; Sharif University of Technology
    2008
    Abstract
    The analytical study of microchannels has been considered as a preliminary approach to alleviate the difficulties which are normally encountered in numerical and experimental studies. Among the analytical solutions, those with high robustness and low complexities are certainly more attractive. In this work, we present a theoretical approach to predict the temperature field in micro-Poiseuille channel flow with constant wall temperature. The use of power series method simplifies the solution in the current analytical approach. The current analytical derivations are examined for channels with both hot-wall and cold-wall conditions. The current solutions agree well with the numerical solutions... 

    Robust multiplicative watermarking technique with Maximum Likelihood detector

    , Article 16th European Signal Processing Conference, EUSIPCO 2008, Lausanne, 25 August 2008 through 29 August 2008 ; 2008 ; 22195491 (ISSN) Sahraeian, S. M. E ; Akhaee, M. A ; Sankur, B ; Marvasti, F ; Canton de Vaud; Interactive Multimodal Information Management (IM); SIMILAR - Network of Excellence; Swiss National Science Foundation (SNSF ; Sharif University of Technology
    European Signal Processing Conference, EUSIPCO  2008
    Abstract
    In this paper, a new multiplicative semi-blind image-adaptive watermarking system has been presented, which exploits human visual model for adapting the watermark data to local properties of the host image. To have a better robustness, the proposed algorithm is implemented on the low-frequency coefficients of the wavelet transform. Moreover, regarding invisibility of the algorithm, the strength factor which controls the watermark power is optimally selected. To extract the watermark data, the Maximum Likelihood (ML) estimator is used. Experimental results confirm the imperceptibility of the proposed method and its high robustness against various attacks such as JPEG compression, noise... 

    Contourlet based image watermarking using optimum detector in the noisy environment

    , Article 2008 IEEE International Conference on Image Processing, ICIP 2008, San Diego, CA, 12 October 2008 through 15 October 2008 ; December , 2008 , Pages 429-432 ; 15224880 (ISSN); 1424417643 (ISBN); 9781424417643 (ISBN) Sahraeian, S. M. E ; Akhaee, M. A ; Hejazi, S. A ; Marvasti, F ; Institute of Electrical and Electronics Engineers; Signal Processing Society ; Sharif University of Technology
    2008
    Abstract
    In this paper, a new multiplicative image watermarking system is presented. As human visual system is less sensitive to the image edges, watermarking is applied in the contourlet domain, which represents image edges sparsely. In the presented scheme, watermark data is embedded in the most energetic directional subband. By modeling General Gaussian Distribution (GGD) for the contourlet coefficients, the distribution of watermarked noisy coefficients is analytically calculated. At the receiver, based on the Maximum Likelihood (ML) decision rule, the optimal detector is proposed. Experimental results show the imperceptibility and high robustness of the proposed method against Additive White...