alireza ghaemi - Academia.edu (original) (raw)

alireza ghaemi

Uploads

Papers by alireza ghaemi

Research paper thumbnail of CRT-Based Robust Data Hiding Method by Extracting Features in DCT Domain

2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)

In this paper a robust data hiding method is presented by applying Discrete Cosine Transform (DCT... more In this paper a robust data hiding method is presented by applying Discrete Cosine Transform (DCT) to the host signal and performing feature extraction, based on Chinese Remainder Theorem (CRT). Improving the robustness reduces the imperceptibility in watermarking systems due to the tradeoff between imperceptibility, robustness and capacity in data hiding schemes. The proposed method offers high imperceptibility alongside robustness. To embed the hidden information CRT based feature extraction process is carried out in DCT domain. Extracted features are distances of CRT remainders. These distances are not varied much in noisy situations thus it is possible to extract the hidden bits with high accuracy. To analyze the robustness of the proposed method common signal processing manipulations are applied to the watermarked images. Bit Correct Rate (BCR) values are calculated for extracted watermarks to evaluate the robustness. Results are compared to other state of the art methods and confirm the superiority of the proposed method.

Research paper thumbnail of Reversible Data Hiding in Encryption Domain based on two dimensional histogram shifting and secure encryption system

Multimedia Tools and Applications

Research paper thumbnail of Simple, robust and secure data hiding based on CRT feature extraction and closed-loop chaotic encryption system

Journal of Real-Time Image Processing, 2020

Robust data hiding methods are basically used when rightful ownership is intended and/or transmit... more Robust data hiding methods are basically used when rightful ownership is intended and/or transmitting channel is prone to noise. In this paper, a robust and secure data hiding method is proposed in Tchebichef domain. For feature extraction, remainders of Tchebichef coefficients are calculated according to Chinese remainder theorem (CRT). Distances of these remainders are utilized as the extracted features. These distances are then modified according to the hidden bits, to complete the embedding process. To reduce the chance of illegal access and increase the security of the proposed method, a closedloop chaotic encryption system (CLCES) has been introduced. The proposed CLCES requires very little side information and produces extremely sensitive noise-like sequences with high security. Robustness and security of the proposed method have been analyzed. Comparison results with other related methods in the current literature confirm the superiority of the proposed method. Due to its simplicity, the proposed method is a good candidate for real-time data hiding applications.

Research paper thumbnail of CRT-Based Robust Data Hiding Method by Extracting Features in DCT Domain

2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)

In this paper a robust data hiding method is presented by applying Discrete Cosine Transform (DCT... more In this paper a robust data hiding method is presented by applying Discrete Cosine Transform (DCT) to the host signal and performing feature extraction, based on Chinese Remainder Theorem (CRT). Improving the robustness reduces the imperceptibility in watermarking systems due to the tradeoff between imperceptibility, robustness and capacity in data hiding schemes. The proposed method offers high imperceptibility alongside robustness. To embed the hidden information CRT based feature extraction process is carried out in DCT domain. Extracted features are distances of CRT remainders. These distances are not varied much in noisy situations thus it is possible to extract the hidden bits with high accuracy. To analyze the robustness of the proposed method common signal processing manipulations are applied to the watermarked images. Bit Correct Rate (BCR) values are calculated for extracted watermarks to evaluate the robustness. Results are compared to other state of the art methods and confirm the superiority of the proposed method.

Research paper thumbnail of Reversible Data Hiding in Encryption Domain based on two dimensional histogram shifting and secure encryption system

Multimedia Tools and Applications

Research paper thumbnail of Simple, robust and secure data hiding based on CRT feature extraction and closed-loop chaotic encryption system

Journal of Real-Time Image Processing, 2020

Robust data hiding methods are basically used when rightful ownership is intended and/or transmit... more Robust data hiding methods are basically used when rightful ownership is intended and/or transmitting channel is prone to noise. In this paper, a robust and secure data hiding method is proposed in Tchebichef domain. For feature extraction, remainders of Tchebichef coefficients are calculated according to Chinese remainder theorem (CRT). Distances of these remainders are utilized as the extracted features. These distances are then modified according to the hidden bits, to complete the embedding process. To reduce the chance of illegal access and increase the security of the proposed method, a closedloop chaotic encryption system (CLCES) has been introduced. The proposed CLCES requires very little side information and produces extremely sensitive noise-like sequences with high security. Robustness and security of the proposed method have been analyzed. Comparison results with other related methods in the current literature confirm the superiority of the proposed method. Due to its simplicity, the proposed method is a good candidate for real-time data hiding applications.

Log In