alireza ghaemi - Academia.edu (original) (raw)
Uploads
Papers by alireza ghaemi
2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)
In this paper a robust data hiding method is presented by applying Discrete Cosine Transform (DCT... more In this paper a robust data hiding method is presented by applying Discrete Cosine Transform (DCT) to the host signal and performing feature extraction, based on Chinese Remainder Theorem (CRT). Improving the robustness reduces the imperceptibility in watermarking systems due to the tradeoff between imperceptibility, robustness and capacity in data hiding schemes. The proposed method offers high imperceptibility alongside robustness. To embed the hidden information CRT based feature extraction process is carried out in DCT domain. Extracted features are distances of CRT remainders. These distances are not varied much in noisy situations thus it is possible to extract the hidden bits with high accuracy. To analyze the robustness of the proposed method common signal processing manipulations are applied to the watermarked images. Bit Correct Rate (BCR) values are calculated for extracted watermarks to evaluate the robustness. Results are compared to other state of the art methods and confirm the superiority of the proposed method.
Multimedia Tools and Applications
Journal of Real-Time Image Processing, 2020
Robust data hiding methods are basically used when rightful ownership is intended and/or transmit... more Robust data hiding methods are basically used when rightful ownership is intended and/or transmitting channel is prone to noise. In this paper, a robust and secure data hiding method is proposed in Tchebichef domain. For feature extraction, remainders of Tchebichef coefficients are calculated according to Chinese remainder theorem (CRT). Distances of these remainders are utilized as the extracted features. These distances are then modified according to the hidden bits, to complete the embedding process. To reduce the chance of illegal access and increase the security of the proposed method, a closedloop chaotic encryption system (CLCES) has been introduced. The proposed CLCES requires very little side information and produces extremely sensitive noise-like sequences with high security. Robustness and security of the proposed method have been analyzed. Comparison results with other related methods in the current literature confirm the superiority of the proposed method. Due to its simplicity, the proposed method is a good candidate for real-time data hiding applications.
2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)
In this paper a robust data hiding method is presented by applying Discrete Cosine Transform (DCT... more In this paper a robust data hiding method is presented by applying Discrete Cosine Transform (DCT) to the host signal and performing feature extraction, based on Chinese Remainder Theorem (CRT). Improving the robustness reduces the imperceptibility in watermarking systems due to the tradeoff between imperceptibility, robustness and capacity in data hiding schemes. The proposed method offers high imperceptibility alongside robustness. To embed the hidden information CRT based feature extraction process is carried out in DCT domain. Extracted features are distances of CRT remainders. These distances are not varied much in noisy situations thus it is possible to extract the hidden bits with high accuracy. To analyze the robustness of the proposed method common signal processing manipulations are applied to the watermarked images. Bit Correct Rate (BCR) values are calculated for extracted watermarks to evaluate the robustness. Results are compared to other state of the art methods and confirm the superiority of the proposed method.
Multimedia Tools and Applications
Journal of Real-Time Image Processing, 2020
Robust data hiding methods are basically used when rightful ownership is intended and/or transmit... more Robust data hiding methods are basically used when rightful ownership is intended and/or transmitting channel is prone to noise. In this paper, a robust and secure data hiding method is proposed in Tchebichef domain. For feature extraction, remainders of Tchebichef coefficients are calculated according to Chinese remainder theorem (CRT). Distances of these remainders are utilized as the extracted features. These distances are then modified according to the hidden bits, to complete the embedding process. To reduce the chance of illegal access and increase the security of the proposed method, a closedloop chaotic encryption system (CLCES) has been introduced. The proposed CLCES requires very little side information and produces extremely sensitive noise-like sequences with high security. Robustness and security of the proposed method have been analyzed. Comparison results with other related methods in the current literature confirm the superiority of the proposed method. Due to its simplicity, the proposed method is a good candidate for real-time data hiding applications.