Loading...
Search for: discrete-cosine-transforms
0.01 seconds
Total 31 records

    Tampering Detection of Video and its Selective Reconstruction in Compressed Domain

    , M.Sc. Thesis Sharif University of Technology Azizian, Bardia (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    Availability of video recording instruments and ease of working with video editing tools have made contents of this digital signal unreliable in general. The goal of this thesis is to present a method to detect tampering of compressed videos in H.264/AVC format and restoring an approximate version of its original contents using watermarking. In the proposed scheme, a low resolution image from a number of video frames in certain time slots are embedded into the DCT coefficients of the other parts of the video which are adequately far from the reference frames. For detecting temporal and spatial tampering, the index of each frame and macroblock is embedded into itself as an authentication... 

    Improving the Robustness of Image Watermarking for Publicly Copyright-Proving

    , M.Sc. Thesis Sharif University of Technology Shakeri, Mahsa (Author) ; Jamzad, Mansour (Supervisor)
    Abstract
    The advent of Internet and advancement of computer technologies have enabled convenient and fast exchange of multimedia so the illegal reproduction and modification of digital media has become increasingly serious. Hence, how to protect the intellectual property rights of digital multimedia is an imperative issue. Digital watermarking is one of the solutions to prevent unauthorized use of images. Traditional digital watermarking techniques embed a watermark such as logo, trademark, or copyright information into a host image so that it is not perceptible. These techniques, depending on the amount of embedded data, will distort the content of host image which results in quality degradation of... 

    Improve Performance of Higher Order Statistics in Spatial and Frequency Domains in Blind Image Steganalysis

    , M.Sc. Thesis Sharif University of Technology Shakeri, Ehsan (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    Blind image steganalysis is a technique used to, which require no prior information about the steganographic method applied to the stego im- age, determine whether the image contains an embedded message or not. The basic idea of blind steganalysis is to extract some features sensitive to information hiding, and then exploit classifiers for judging whether a given test image contains a secret message.The main focus of this research is to design an choose features sen-sitive to the embedding changes. In fact, we use high order moments in different domains, such as spatial, DCT and multi-resolution do-main, in order to improve the performance of existing steganalyzers.Accordingly, First, we... 

    Analysis of Sensitivity of Features to Data Embedding in Blind Image Steganalysis

    , M.Sc. Thesis Sharif University of Technology Heidari, Mortaza (Author) ; Ghaemmaghami, Shahrokh (Supervisor)
    Abstract
    Steganalysis is the science of detecting covert communication. It is called blind (universal) if designed to detect stego images steganographied by a wide range of embedding methods. In this method, statistical properties of the image are explored, regardless the embedding procedure employed. The main problem for image steganalysis is to find sensitive features and characteristics of the image which make a statistically significant difference between the clean and stego images. In this thesis we propose a blind image steganalysis method based on the singular value decomposition (SVD) of the discrete cosine transform (DCT) coefficients that are revisited in this work in order to enhance the... 

    Tamper Detection in Digital Images Using Transform Domains

    , M.Sc. Thesis Sharif University of Technology Barzegar, Zeynab (Author) ; Jamzad, Mansour (Supervisor)
    Abstract
    Nowadays, digital images are easy to manipulate and edit due to availability of powerful image processing and editing software. It is possible to add or remove important features to the image without leaving any obvious traces of tampering. Therefore, proving the authenticity and integrity of digital media becomes increasingly important. In this study, we focus on detection of a special type of digital forgery, the copy-move attack, in which a part of the image is copied and pasted somewhere else in the image with the intent to cover an important image features or to add some fake feature. In this way we propose some novel methods that work in spatial domain, Discrete Cosine domain and... 

    Modified Computed Tomographic Imaging Systems with Improved Reconstructed Image Quality

    , M.Sc. Thesis Sharif University of Technology Atashbar, Hamed (Author) ; Kavehvash, Zahra (Supervisor)
    Abstract
    Computerized tomography (CT) imaging is a powerful tool among the existing bio-imaging techniques for capturing bio-images. In a CT scan procedure, linear sensors receive x-ray radiations, passed through the patient’s body and the reconstruction algorithms provide the required image for physicians from the captured data. In spite of its great advantages, due to the use of x-ray radiations and its ionization effect, it will raise the risk of cancer in long times. Therefore, to take benefit from several advantages of CT such as low-cost and high speed, solving this problem is aimed by many physicians and scientists. A new compressed sensing-based algorithm in order to reduce the number of... 

    A proper transform for satisfying benford's law and its application to double JPEG image forensics

    , Article 2012 IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2012, 12 December 2012 through 15 December 2012 ; 2012 , Pages 240-244 ; 9781467356060 (ISBN) Taimori, A ; Razzazi, F ; Behrad, A ; Ahmadi, A ; Babaie-Zadeh, M ; Sharif University of Technology
    2012
    Abstract
    This paper presents a new transform domain to evaluate the goodness of fit of natural image data to the common Benford's Law. The evaluation is made by three statistical fitness criteria including Pearson's chi-square test statistic, normalized cross correlation and a distance measure based on symmetrized Kullback-Leibler divergence. It is shown that the serial combination of variance filtering and block 2-D discrete cosine transform reveals the best goodness of fit for the first significant digit. We also show that the proposed transform domain brings reasonable fit for the second, third and fourth significant digits. As an application, the proposed transform domain is utilized to detect... 

    A new blind energy based DWT-SVD domain watermarking using error control coding

    , Article International Journal of Knowledge-Based and Intelligent Engineering Systems ; Volume 19, Issue 2 , 2015 , Pages 135-141 ; 13272314 (ISSN) Tahzibi, M ; Sahebjamiyan, M ; Shahbahrami, A ; Sharif University of Technology
    IOS Press  2015
    Abstract
    The growth of data communication networks has made digital watermarking an important issue for copyright and content protection. Achieving high level of robustness and good transparency are the main objectives of developing every digital watermarking algorithm. From among transform domains as the basis of watermark hiding place, Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) are the most commonly used transforms in literature. In this paper we propose a new hybrid DWT-SVD domain watermarking scheme taking into account the energy content of every chosen block of the selected DWT sub-band coefficients. Before embedding, we append a... 

    A new spread spectrum watermarking method using two levels DCT

    , Article International Journal of Electronic Security and Digital Forensics ; Volume 3, Issue 1 , 2010 , Pages 1-26 ; 1751911X (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2010
    Abstract
    In this paper, a discrete cosine transform (DCT) based blind watermarking scheme based on spread spectrum communications is proposed. We perform block-based DCT (BDCT) on the host image; then using the DC coefficients of each block, we construct a low-resolution approximation image. We apply BDCT on this approximation image, then watermark is embedded by adding a pseudo random noise sequence into its high frequencies. In detection stage, we extract the approximation image from the watermarked image, then the same pseudo random noise sequence is generated, and its correlation is computed with high frequencies of the watermarked approximation image. In our method, higher robustness is obtained... 

    A robust image watermarking using two level DCT and wavelet packets denoising

    , Article International Conference on Availability, Reliability and Security, ARES 2009, Fukuoka, Fukuoka Prefecture, 16 March 2009 through 19 March 2009 ; 2009 , Pages 150-157 ; 9780769535647 (ISBN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    In this paper we present a blind low frequency watermarking scheme on gray level images, which is based on DCT transform and spread spectrum communications technique. We compute the DCT of non overlapping 8x8 blocks of the host image, then using the DC coefficients of each block we construct a low-resolution approximation image. We apply block based DCT on this approximation image, then a pseudo random noise sequence is added into its high frequencies. For detection, we extract the approximation image from the watermarked image, then the same pseudo random noise sequence is generated, and its correlation is computed with high frequencies of the watermarked approximation image. In our method,... 

    A robust spread spectrum watermarking method using two levels DCT

    , Article International Journal of Electronic Security and Digital Forensics ; Volume 2, Issue 3 , 2009 , Pages 280-305 ; 1751911X (ISSN) Taherinia, A. H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    In this paper, a DCT-based blind watermarking scheme based on spread spectrum communications is proposed. We perform block-based DCT on the host image; then using the DC coefficients of each block, we construct a low-resolution approximation image. We apply block-based DCT on this approximation image, then watermark is embedded by adding a pseudo random noise sequence into its high frequencies. In detection stage, we extract the approximation image from the watermarked image, then the same pseudo random noise sequence is generated, and its correlation is computed with high frequencies of the watermarked approximation image. In our method, higher robustness is obtained because of embedding... 

    A robust copyright protection scheme based on discrete cosine transform and image normalization

    , Article 2011 7th Iranian Conference on Machine Vision and Image Processing, MVIP 2011 - Proceedings ; 2011 ; 9781457715358 (ISBN) Shakeri, M ; Jamzad, M ; Sharif University of Technology
    2011
    Abstract
    Watermarking is a way that is used to protect the copyright of images. As the existing watermarking methods are not robust enough a new novel scheme is needed. In this paper, we propose a zero-watermark discrete cosine transformation-based copyright protection scheme, in which a normalization procedure is applied in both watermark embedding and extraction to make our scheme more robust to geometric distortions. This method is resistant to malicious signal processing and geometric attacks such as blurring, JPEG compression, noise adding, sharpening, scaling, rotation and cropping. Experimental results on images with different complexity show that our proposed scheme outperforms related... 

    Secure steganography based on embedding capacity

    , Article International Journal of Information Security ; Volume 8, Issue 6 , 2009 , Pages 433-445 ; 16155262 (ISSN) Sajedi, H ; Jamzad, M ; Sharif University of Technology
    2009
    Abstract
    Mostly the embedding capacity of steganography methods is assessed in non-zero DCT coefficients. Due to unequal distribution of non-zero DCT coefficients in images with different contents, images with the same number of non-zero DCT coefficients may have different actual embedding capacities. This paper introduces embedding capacity as a property of images in the presence of multiple steganalyzers, and discusses a method for computing embedding capacity of cover images. Using the capacity constraint, embedding can be done more secure than the state when the embedder does not know how much data can be hidden securely in an image. In our proposed approach, an ensemble system that uses... 

    Design of an RMPC with a time-varying terminal constraint set for tracking problem

    , Article International Journal of Robust and Nonlinear Control ; Volume 26, Issue 12 , 2016 , Pages 2623-2642 ; 10498923 (ISSN) Razi, M ; Haeri, M ; Sharif University of Technology
    John Wiley and Sons Ltd  2016
    Abstract
    This paper presents a robust model predictive control algorithm with a time-varying terminal constraint set for systems with model uncertainty and input constraints. In this algorithm, the nonlinear system is approximated by a linear model where the approximation error is considered as an unstructured uncertainty that can be represented by a Lipschitz nonlinear function. A continuum of terminal constraint sets is constructed off-line, and robust stability is achieved on-line by using a variable control horizon. This approach significantly reduces the computational complexity. The proposed robust model predictive controller with a terminal constraint set is used in tracking set-points for... 

    Image coding and compression with sparse 3d discrete cosine transform

    , Article 8th International Conference on Independent Component Analysis and Signal Separation, ICA 2009, Paraty, 15 March 2009 through 18 March 2009 ; Volume 5441 , 2009 , Pages 532-539 ; 03029743 (ISSN) Palangi, H ; Ghafari, A ; Babaie Zadeh, M ; Jutten, C ; Sharif University of Technology
    2009
    Abstract
    In this paper, an algorithm for image coding based on a sparse 3-dimensional Discrete Cosine Transform (3D DCT) is studied. The algorithm is essentially a method for achieving a sufficiently sparse representation using 3D DCT. The experimental results obtained by the algorithm are compared to the 2D DCT (used in JPEG standard) and wavelet db9/7 (used in JPEG2000 standard). It is experimentally shown that the algorithm, that only uses DCT but in 3 dimensions, outperforms the DCT used in JPEG standard and achieves comparable results (but still less than) the wavelet transform. © Springer-Verlag Berlin Heidelberg 2009  

    Parallel 3-dimensional DCT computation on k-Ary n-cubes

    , Article 8th International Conference on High-Performance Computing in Asia-Pacific Region, HPC Asia 2005, Beijing, 30 November 2005 through 3 December 2005 ; Volume 2005 , 2005 , Pages 91-97 ; 0769524869 (ISBN); 9780769524863 (ISBN) Modarressi, M ; Sarbazi Azad, H ; Sharif University of Technology
    2005
    Abstract
    The three dimensional discrete cosine transform (3D DCT) has been widely used in many applications such as video compression. On the other hand, the kary n-cube is one of the most popular interconnection networks used in many recent multicomputers. As direct calculation of 3D DCT is very time consuming, many researchers have been working on developing algorithms and special-purpose architectures for fast computation of 3D DCT. This paper proposes a parallel algorithm for efficient calculation of 3D DCT on the k-ary n-cube multicomputers. The time complexity of the proposed algorithm is of O(N) for an N × N × N input data cube while direct calculation of 3D DCT has a complexity of O(N6). ©... 

    Effect of deep cryogenic treatment on microstructure, creep and wear behaviors of AZ91 magnesium alloy

    , Article Materials Science and Engineering A ; Volume 523, Issue 1-2 , 2009 , Pages 27-31 ; 09215093 (ISSN) Meshinchi Asl, K ; Tari, A ; Khomamizadeh, F ; Sharif University of Technology
    2009
    Abstract
    This paper focuses on the effect of deep cryogenic treatment (-196 °C) on microstructure and mechanical properties of AZ91 magnesium alloy. The execution of deep cryogenic treatment on samples changed the distribution of β precipitates. The tiny laminar β particles almost dissolved in the microstructure and the coarse divorced eutectic β phase penetrated into the matrix. This microstructural modification resulted in a significant improvement on mechanical properties of the alloy. The steady state creep rates were measured and it was found that the creep behavior of the alloy, which is dependent on the stability of the near grain boundary microstructure, was improved by the deep cryogenic... 

    A mixed layer multiple description video coding scheme

    , Article IEEE Transactions on Circuits and Systems for Video Technology ; Volume 22, Issue 2 , February , 2012 , Pages 202-215 ; 10518215 (ISSN) Kazemi, M ; Sadeghi, K. H ; Shirmohammadi, S ; Sharif University of Technology
    Abstract
    Multiple description coding (MDC) is a technique where multiple streams from a source video are generated, each individually decodable and mutually refinable. MDC is a promising solution to overcome packet loss in video transmission over noisy channels, particularly for real-time applications in which retransmission of lost information is not practical. A problem with conventional MDC is that the achieved side distortion quality is considerably lower than single description coding (SDC) quality except at high redundancies which in turn leads to central quality degradation. In this paper, a new mixed layer MDC scheme is presented with no degradation in central quality, and providing better... 

    Secure steganography using Gabor filter and neural networks

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) ; Volume 4920 LNCS , 2008 , Pages 33-49 ; 03029743 (ISSN); 3540690166 (ISBN); 9783540690160 (ISBN) Jamzad, M ; Zahedi Kermani, Z ; Sharif University of Technology
    2008
    Abstract
    The main concern of steganography (image hiding) methods is to embed a secret image into a host image in such a way that it causes minimum distortion to the host; to make it possible to extract a version of secret image from the host in such a way that the extracted version of secret image be as similar as possible to its original version (this should be possible even after usual attacks on the host image), and to provide ways of embedding secret images with larger size into a given host image. In this paper we propose a method that covers all above mentioned concerns by suggesting the idea of finding from an image data base, the most suitable host for a given secret image. In our method,... 

    Universal image steganalysis using singular values of DCT coefficients

    , Article 2013 10th International ISC Conference on Information Security and Cryptology ; 2013 Heidari, M ; Gaemmaghami, S ; Sharif University of Technology
    IEEE Computer Society  2013
    Abstract
    We propose a blind image steganalysis method based on the Singular Value Decomposition (SVD) of the Discrete Cosine Transform (DCT) coefficients that are revisited in this work. We compute geometric mean, mean of log values, and statistical moments (mean, variance and skewness) of the SVDs of the DCT sub-blocks that are averaged over the whole image to construct a 480-element feature vector for steganalysis. These features are fed to a Support Vector Machine (SVM) classifier to discriminate between stego and cover images. Experimental results show that the proposed method outperforms most powerful steganalyzers when applied to some well-known steganography algorithms