Loading...
Search for:
ghaemmaghami--s
0.094 seconds
Total 11047 records
Spatio-temporal VLAD encoding of visual events using temporal ordering of the mid-level deep semantics
, Article IEEE Transactions on Multimedia ; Volume 22, Issue 7 , 2020 , Pages 1769-1784 ; Amini, S ; Ghaemmaghami, S ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2020
Abstract
Classification of video events based on frame-level descriptors is a common approach to video recognition. In the meanwhile, proper encoding of the frame-level descriptors is vital to the whole event classification procedure. While there are some pretty efficient video descriptor encoding methods, temporal ordering of the descriptors is often ignored in these encoding algorithms. In this paper, we show that by taking into account the temporal inter-frame dependencies and tracking the chronological order of video sub-events, accuracy of event recognition is further improved. First, the frame-level descriptors are extracted using convolutional neural networks (CNNs) pre-trained on ImageNet,...
Closure of sets: A statistically hypersensitive system for steganalysis of least significant bit embedding
, Article IET Signal Processing ; Volume 5, Issue 4 , July , 2011 , Pages 379-389 ; 17519675 (ISSN) ; Eghlidos, T ; Ghaemmaghami, S ; Sharif University of Technology
2011
Abstract
This study introduces a new scheme for steganalysis of the least significant bit (LSB) embedding, based on the idea of closure of sets (CoS), which is independent of the type of cover signal, applicable to both spatial and transform domains. The CoS is referred to as some special subsets that could be found in a common space whose elements relate to higher-order statistical properties of the signal. The proposed scheme is used for steganalysis of the LSB steganography of greyscale TIFF and JPEG images and audio signals, employing a set of accurate and monotone features that are extracted based on the CoS definition. It is shown that significant improvement to the detection accuracy in...
Higher-order statistical steganalysis of random LSB steganography
, Article 7th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA-2009, Rabat, 10 May 2009 through 13 May 2009 ; 2009 , Pages 629-632 ; 9781424438068 (ISBN) ; Eghlidos, T ; Ghaemmaghami, S ; Sharif University of Technology
2009
Abstract
This paper presents a new scheme for steganalysis of random LSB embedding, capable of applying to any kind of digital signal in both spatial and transform domains. The proposed scheme is based on defining a space whose elements relate to higher-order statistical properties of the signal and looking for special subsets, which we call Closure of Sets (CoS) in this space. We use this scheme for steganalysis of the LSB steganography in grayscale images, employing a vector of five accurate and monotone features. Experimental results show significantly higher accuracy of the proposed scheme, as compared to those reported in the literature, especially in low embedding rates applications. © 2009...
A robust wavelet-based approach to fingerprint indentification
, Article Proceedings of the 2012 IEEE International Conference on Multimedia and Expo Workshops, ICMEW 2012 ; 2012 , Pages 413-417 ; 9780769547299 (ISBN) ; Javadtalab, A ; Ghaemmaghami, S ; Shirmohammadi, S ; Sharif University of Technology
IEEE
2012
Abstract
A robust fingerprint recognition system based on marginal statistics of 2D wavelet transform is introduced which significantly improves the accuracy of previous wavelet based approaches due to 1) a better selection of features extracted from the wavelet transform, and 2) a more accurate distance measure to find the similarity between fingerprints. A combination of Jain and Poincare algorithms is employed to locate the fingerprint reference point. The main part of the fingerprint image is chosen as a rectangle with the reference point at its center. The image is then divided into nonoverlapping sub-images, the wavelet transform is applied to the bi-level sub-images, and Generalized Gaussian...
Contourlet based distance measurement to improve fingerprint identification accuracy
, Article 2012 IEEE International Instrumentation and Measurement Technology Conference, I2MTC 2012, Graz, 13 May 2012 through 16 May 2012 ; 2012 , Pages 371-375 ; 9781457717710 (ISBN) ; Javadtalab, A ; Ghaemmaghami, S ; Shirmohammadi, S ; Sharif University of Technology
IEEE
2012
Abstract
In this paper, Kullback-Leibler Distance (KLD) is employed to measure the dissimilarity between marginal statistical features of contourlet transform to fingerprint identification. Conourlet transform is a non separable two dimensional transform which can well capture the geometry of edges in the images which convey important information for the human visual system (HVS). Here, marginal statistics of each transform subband are modeled by a Generalized Gaussian Density (GGD) model and the GGD parameters-α and β- are granted as the extracted features from the corresponding subbands and the fingerprint recognition is done based on k-NN classifier employing Kullback-Leibler Distance (KLD)...
Robust digital video watermarking in an orthogonal parametric space
, Article IEEE Region 10 Annual International Conference, Proceedings/TENCON, 21 November 2010 through 24 November 2010, Fukuoka ; 2010 , Pages 2258-2263 ; 9781424468904 (ISBN) ; Khalilian, H ; Ghaemmaghami, S ; Shirmohammadi, S ; Sharif University of Technology
2010
Abstract
This paper presents an event based scheme for uncompressed video watermarking. The video signal is assumed to be a sequence of overlapping visual components - called events. We address this overlapping structure of video contents and present an event based approach through employing a block based Temporal Decomposition (TD) scheme. The TD describes a set of spectral parameters of the video as a linear combination of a set of temporally overlapping compact event functions. We have applied the decomposition results to digital video watermarking. To construct the matrix of parameters in the TD, Multiresolution Singular Value Decomposition (MR-SVD) is utilized and singular values of a set of...
Steganalysis of internet data, a feasibility study
, Article 2011 International Symposium on Computer Networks and Distributed Systems, CNDS 2011, Tehran, 23 February 2011 through 24 February 2011 ; 2011 , Pages 61-66 ; 9781424491544 (ISBN) ; Khalilian, H ; Ghaemmaghami, S ; Sharif University of Technology
2011
Abstract
This paper addresses the feasibility of applying realtime steganalysis to the Internet data. To reach a practical solution, we have employed offline procedures to minimize the volume of the data to be processed by an online real-time system. Possible offline services that can be provided to an online system then led us to appropriate network designs for the online system. To go into detail of the online systems, we have carefully analyzed some well-known, state-of-the-art steganalysis algorithms and estimated their processing power and memory requirements. Some formulas are derived to relate the network bit rate with the number of the processing units, their processing power, and memory...
Image steganalysis based on SVD and noise estimation: Improve sensitivity to spatial LSB embedding families
, Article IEEE Region 10 Annual International Conference, Proceedings/TENCON, 21 November 2011 through 24 November 2011, Bali ; 2011 , Pages 1266-1270 ; 9781457702556 (ISBN) ; Farhat, F ; Ghaemmaghami, S ; Sharif University of Technology
2011
Abstract
We propose a novel image steganalysis method, based on singular value decomposition and noise estimation, for the spatial domain LSB embedding families. We first define a content independence parameter, DS, that is calculated for each LSB embedding rate. Next, we estimate the DS curve and use noise estimation to improve the curve approximation accuracy. It is shown that the proposed approach gives an estimate of the LSB embedding rate, as well as information about the existence of the embedded message (if any). The proposed method can effectively be applied to a wide range of the image LSB steganography families in spatial domain. To evaluate the proposed scheme, we applied the method to a...
Histogram shift steganography: A technique to thwart histogram based steganalysis
, Article 2nd International Workshop on Computer Science and Engineering, WCSE 2009, 28 October 2009 through 30 October 2009, Qingdao ; Volume 2 , 2009 , Pages 166-170 ; 9780769538815 (ISBN) ; Mohajeri, J ; Ghaemmaghami, S ; Sharif University of Technology
2009
Abstract
We present an image steganographic technique to preserve the first-order and the second-order statistics of the host image. Experimental results show that the proposed method can preserve the image quality and also resists typical statistical analysis based attacks. The new steganography method solves the distortion problem with the HKC algorithm and hence thwarts the Kuo attack. The method is based on the idea of histogram shift, in which two empty bins are produced in the image histogram that are then filled up using their neighboring bins through the embedding process. © 2009 IEEE
On the effect of spatial to compressed domains transformation in LSB-based image steganography
, Article 7th IEEE/ACS International Conference on Computer Systems and Applications, AICCSA-2009, Rabat, 10 May 2009 through 13 May 2009 ; 2009 , Pages 260-264 ; 9781424438068 (ISBN) ; Ghotbi, M ; Ghaemmaghami, S ; Sharif University of Technology
2009
Abstract
This paper introduces an efficient scheme to image steganography by introducing the hidden message (payload) insertion in spatial domain and transforming the stego-image to compressed domain. We apply a recently-proposed LSB method in order to obtain better statistical behavior of the stego-message and subsequently, the obtained stego-image is transformed and quantized in order to enhance the security of hiding. Performance analysis comparisons confirm a higher efficiency for our proposed method. Compared to recently-proposed approaches, our method offers the advantage that it combines an efficient LSB method with transform domain security. © 2009 IEEE
A universal image steganalysis system based on double sparse representation classification (DSRC)
, Article Multimedia Tools and Applications ; 2017 , Pages 1-20 ; 13807501 (ISSN) ; Farsi, H ; Ghaemmaghami, S ; Sharif University of Technology
Springer New York LLC
2017
Abstract
Achieving high rates of detection in low rates of embedding is still a challenging problem in many steganalysis systems. The newly proposed steganalysis system based on sparse representation classifier has shown remarkable detection rates in low embedding rate. In this paper, we propose a new steganalysis system based on double sparse representation classifier. We compare our proposed method with other steganalysis systems which use different classifier (including nearest neighbor, support vector machine, ensemble support vector machine and sparse representation). In all of our experiments, input features to the classifier are fixed and the ability of classifier is examined. Also we provide...
A universal image steganalysis system based on double sparse representation classification (DSRC)
, Article Multimedia Tools and Applications ; Volume 77, Issue 13 , 2018 , Pages 16347-16366 ; 13807501 (ISSN) ; Farsi, H ; Ghaemmaghami, S ; Sharif University of Technology
Springer New York LLC
2018
Abstract
Achieving high rates of detection in low rates of embedding is still a challenging problem in many steganalysis systems. The newly proposed steganalysis system based on sparse representation classifier has shown remarkable detection rates in low embedding rate. In this paper, we propose a new steganalysis system based on double sparse representation classifier. We compare our proposed method with other steganalysis systems which use different classifier (including nearest neighbor, support vector machine, ensemble support vector machine and sparse representation). In all of our experiments, input features to the classifier are fixed and the ability of classifier is examined. Also we provide...
Robust content-based video watermarking exploiting motion entropy masking effect
, Article International Conference on Signal Processing and Multimedia Applications, SIGMAP 2006, Setubal, 7 August 2006 through 10 August 2006 ; 2006 , Pages 252-259 ; 9728865643 (ISBN); 9789728865641 (ISBN) ; Pirsiavash, H ; Ghaemmaghami, S ; Sharif University of Technology
2006
Abstract
A major class of image and video watermarking algorithms, i.e. content-based watermarking, is based on the concept of Human Visual System (HVS) in order to adapt more efficiently to the local characteristics of the host signal. In this paper, a content-based video watermarking scheme is developed and the concept of entropy masking effect is employed to significantly improve the use of the HVS model. Entropy masking effect states that the human eye's sensitivity decreases in high entropy regions, i.e. regions with spatial or temporal complexity. The spatial entropy masking effect has been exploited in a number of previous works in order to enhance the robustness of image-adaptive watermarks....
Interpolative coding of speech parameters using hierarchical temporal decomposition
, Article Digital Signal Processing: A Review Journal ; Volume 13, Issue 3 , 2003 , Pages 433-456 ; 10512004 (ISSN) ; Deriche, M ; Sridharan, S ; Sharif University of Technology
Elsevier Inc
2003
Abstract
A new method for temporal decomposition (TD) of speech parameters for very low rate coding applications is developed. Unlike typical TD, the phonetic relevance is not considered here, instead, we represent the spectral parameters of speech using pre-defined interpolation functions. These functions are located at instants, which give maximum correlation with the true event structure. In this method, no event refinement is required, which significantly reduces the computational complexity of the coder to make real-time implementation possible. The method is also highly flexible and can comply with diverse coding system attributes such as bit-rate, accuracy, delay, and complexity. A spectral...
Multi-head relu implicit neural representation networks
, Article 47th IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2022, 23 May 2022 through 27 May 2022 ; Volume 2022-May , 2022 , Pages 2510-2514 ; 15206149 (ISSN); 9781665405409 (ISBN) ; Morsali, A ; Ghaemmaghami, S ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2022
Abstract
In this paper, a novel multi-head multi-layer perceptron (MLP) structure is presented for implicit neural representation (INR). Since conventional rectified linear unit (ReLU) networks are shown to exhibit spectral bias towards learning low-frequency features of the signal, we aim at mitigating this defect by taking advantage of local structure of the signals. To be more specific, an MLP is used to capture the global features of the underlying generator function of the desired signal. Then, several heads are utilized to reconstruct disjoint local features of the signal, and to reduce the computational complexity, sparse layers are deployed for attaching heads to the body. Through various...
A low complexity NSAF algorithm
, Article IEEE Signal Processing Letters ; Volume 19, Issue 11 , August , 2012 , Pages 716-719 ; 10709908 (ISSN) ; Attari, M. A ; Ghaemmaghami, S ; Sharif University of Technology
IEEE
2012
Abstract
This letter proposes a novel normalized subband adaptive filter (NSAF) algorithm, which applies variable step sizes to subband filters to improve the convergence performance of the conventional NSAF and update only a subset of the subbands per iteration to reduce its computational complexity. The selection process for each subband is based on the amount of improvement it makes to the mean square deviation at every iteration. Simulation results show significant reduction in computational complexity, faster convergence rate, and lower misadjustment error achieved using the proposed scheme
Robust video watermarking using maximum likelihood decoder
, Article European Signal Processing Conference, 29 August 2011 through 2 September 2011, Barcelona ; 2011 , Pages 2044-2048 ; 22195491 (ISSN) ; Akhaee, M. A ; Ghaemmaghami, S ; Sharif University of Technology
2011
Abstract
In this paper, a robust multiplicative video watermarking scheme is presented. We segment the video signal into 3-D blocks like cubes, and then apply 3-D wavelet transform to each block. The watermark is inserted through multiplying the low frequency wavelet coefficients by a constant parameter that controls the power of the watermark. The proposed watermark extraction procedure is based on the maximum likelihood rule applied to the watermarked wavelet coefficients
Towards higher detection accuracy in blind steganalysis of JPEG images
, Article 24th Iranian Conference on Electrical Engineering, ICEE 2016, 10 May 2016 through 12 May 2016 ; 2016 , Pages 1860-1864 ; 9781467387897 (ISBN) ; Heidari, M ; Ghaemmaghami, S ; Gholampour, I ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2016
Abstract
A new steganalysis system for JPG-based image data hiding is proposed in this paper. We use features extracted from both wavelet and DCT domains that are refined later in the sense of utmost discrimination between the clear and stego images in the classification system. Statistical properties of the SVD of wavelet sub-bands are combined with the extended DCT-Markov features, and the features that are most sensitive to the data embedding are chosen through a SVM-RFE based selection algorithm. Experimental results show significant improvement over baseline methods, especially for steganalysis of Perturbed Quantization (PQ), which is known to be one of most secure JPG-based steganography...
A machine learning framework for predicting entrapment efficiency in niosomal particles
, Article International Journal of Pharmaceutics ; Volume 627 , 2022 ; 03785173 (ISSN) ; Aftab, A ; Ghaemmaghami, S ; Sharif University of Technology
Elsevier B.V
2022
Abstract
Niosomes are vesicles formed mostly by nonionic surfactant and cholesterol incorporation as an excipient. The drug entrapment efficiency of niosomal vesicles is particularly important and depends on many parameters. Changing the effective parameters to have maximum entrapment efficiency in the laboratory is time-consuming and costly. In this study, a machine learning framework was proposed to address these problems. In order to find the most critical parameter affecting the entrapment efficiency and its optimal value in a specific experiment, data were first extracted from articles of the last decade using keywords of niosome and thin-film hydration method. Then, deep neural network (DNN),...
Non-Smooth regularization: improvement to learning framework through extrapolation
, Article IEEE Transactions on Signal Processing ; Volume 70 , 2022 , Pages 1213-1223 ; 1053587X (ISSN) ; Soltanian, M ; Sadeghi, M ; Ghaemmaghami, S ; Sharif University of Technology
Institute of Electrical and Electronics Engineers Inc
2022
Abstract
Deep learning architectures employ various regularization terms to handle different types of priors. Non-smooth regularization terms have shown promising performance in the deep learning architectures and a learning framework has recently been proposed to train autoencoders with such regularization terms. While this framework efficiently manages the non-smooth term during training through proximal operators, it is limited to autoencoders and suffers from low convergence speed due to several optimization sub-problems that must be solved in a row. In this paper, we address these issues by extending the framework to general feed-forward neural networks and introducing variable extrapolation...