Loading...
Search for: akhaee--m--a
0.012 seconds
Total 27 records

    Forensic detection of image manipulation using the zernike moments and pixel-pair histogram

    , Article IET Image Processing ; Volume 7, Issue 9 , December , 2013 , Pages 817-828 ; 17519659 (ISSN) Shabanifard, M ; Shayesteh, M. G ; Akhaee, M. A ; Sharif University of Technology
    2013
    Abstract
    Integrity verification or forgery detection of an image is a difficult procedure, since the forgeries use various transformations to create an altered image. Pixel mapping transforms, such as contrast enhancement, histogram equalisation, gamma correction and so on, are the most popular methods to improve the objective property of an altered image. In addition, fabricators add Gaussian noise to the altered image in order to remove the statistical traces produced because of pixel mapping transforms. A new method is introduced to detect and classify four various categories including original, contrast modified, histogram-equalised and noisy images. In the proposed method, the absolute value of... 

    Robust video watermarking using maximum likelihood decoder

    , Article European Signal Processing Conference, 29 August 2011 through 2 September 2011, Barcelona ; 2011 , Pages 2044-2048 ; 22195491 (ISSN) Diyanat, A ; Akhaee, M. A ; Ghaemmaghami, S ; Sharif University of Technology
    Abstract
    In this paper, a robust multiplicative video watermarking scheme is presented. We segment the video signal into 3-D blocks like cubes, and then apply 3-D wavelet transform to each block. The watermark is inserted through multiplying the low frequency wavelet coefficients by a constant parameter that controls the power of the watermark. The proposed watermark extraction procedure is based on the maximum likelihood rule applied to the watermarked wavelet coefficients  

    Timing mismatch compensation in TI-ADCS using Bayesian approach

    , Article 2015 23rd European Signal Processing Conference, EUSIPCO 2015, 31 August 2015 through 4 September 2015 ; August , 2015 , Pages 1391-1395 ; 9780992862633 (ISBN) Araghi, H ; Akhaee, M. A ; Amini, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2015
    Abstract
    A TI-ADC is a circuitry to achieve high sampling rates by passing the signal and its shifted versions through a number of parallel ADCs with lower sampling rates. When the time shifts between the C channels of a TI-ADC are properly tuned, the aggregate of the obtained samples is equivalent to that of a single ADC with C-times the sampling rate. However, the performance of a TI-ADC can be seriously degraded under interchannel timing mismatch. As this non-ideality cannot be avoided in practice, we need to first estimate the mismatch value, and then, compensate it. In this paper, by adopting a stochastic bandlimited signal model we study the signal recovery problem from the samples of a TI-ADC... 

    Interference alignment for two-user two-hop interference X-channel with delayed and no CSIT

    , Article International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 6 October 2014 through 8 October 2014 ; Volume 2015-January, Issue January , 2015 , Pages 473-479 ; 21570221 (ISSN) Kheirkhah Sangdeh, P ; Mirmohseni, M ; Akhaee, M. A ; Sharif University of Technology
    IEEE Computer Society  2015
    Abstract
    Capacity approximation of multi-hop unicast and multi-hop multicast channels is one of unsolved problems in information theory. Recently some researches investigate Degrees of Freedom (DoF) characterization and Interference Alignment schemes for these channels. However most of them assumed perfect instantaneous Channel State Information (CSI) at the relays and the transmitters. Due to practical limitations, like the delay and the rate limitation in the feedback links and the fading channels, it is difficult to provide perfect instantaneous CSI at the transmitters and even the relays. Achievable DoF by the IA schemes collapses greatly with imperfect CSI. It has been shown that the delayed CSI... 

    Blind interference alignment for three-user multi-hop SISO interference channel

    , Article International Congress on Ultra Modern Telecommunications and Control Systems and Workshops, 6 October 2014 through 8 October 2014 ; Volume 2015-January, Issue January , 2015 , Pages 462-467 ; 21570221 (ISSN) Kheirkhah Sangdeh, P ; Mirmohseni, M ; Akhaee, M. A ; Sharif University of Technology
    IEEE Computer Society  2015
    Abstract
    Interference Alignment (IA) is a rather new technique to achieve higher Degrees-of-Freedom (DoF) compared to traditional orthogonal naive methods, like, Time Division Multiple Access (TDMA). In many IA schemes, Instantaneous Channel State Information at Transmitter (CSIT) is mandatory. However, this requirement becomes an obstacle to implement those methods in practice. In some practical scenarios, it is not possible to provide instantaneous or even delayed CSIT. Recently, Blind Interference Alignment (BIA) has been introduced as a solution to align interference without CSIT. In spit of major advances in single-hop Interference Channels (ICs), few researches focused on multi-hop ICs. In this... 

    Steganalysis of JPEG images using enhanced neighbouring joint density features

    , Article IET Image Processing ; Volume 9, Issue 7 , 2015 , Pages 545-552 ; 17519659 (ISSN) Karimi, H ; Shayesteh, M. G ; Akhaee, M. A ; Sharif University of Technology
    Institution of Engineering and Technology  2015
    Abstract
    In this study, a blind steganalysis approach which accurately discloses low rate data hiding schemes is proposed. The absolute values of neighbouring joint density (absNJ) are used for feature extraction. In this way, the intra- and inter-block situations are employed providing a variety of different features. Aside from the absolute values of discrete cosine transform (DCT) coefficients, the differential DCT coefficients are also exploited to extract the features. Moreover, the absNJ features will be extended and used over differential DCT coefficients. It is shown that applying the Pth power of the DCT coefficients instead of their first power gains more discriminative features. Then,... 

    Approximateml estimator for compensation of timing mismatch and jitter noise in Ti-ADCS

    , Article European Signal Processing Conference, 28 August 2016 through 2 September 2016 ; Volume 2016-November , 2016 , Pages 2360-2364 ; 22195491 (ISSN) ; 9780992862657 (ISBN) Araghi, H ; Akhaee, M. A ; Amini, A ; Sharif University of Technology
    European Signal Processing Conference, EUSIPCO  2016
    Abstract
    Time-interleaved analog to digital converters (TI-ADC) offer high sampling rates by passing the input signal through C parallel low-rate ADCs. We can achieve C-times the sampling rate of a single ADC if all the shifts between the channels are identical. In practice, however, it is not possible to avoid mismatch among shifts. Besides, the samples are also subject to jitter noise. In this paper, we propose a blind method to mitigate the joint effects of sampling jitter and shift mismatch in the TI-ADC structure. We assume the input signal to be bandlimited and incorporate the jitter via a stochastic model. Next, we derive an approximate model based on a first-order Taylor series and use an... 

    Blind image watermarking based onsample rotation with optimal detector

    , Article European Signal Processing Conference, 24 August 2009 through 28 August 2009, Glasgow ; 2009 , Pages 278-282 ; 22195491 (ISSN) Sahraeian, S. M. E ; Akhaee, M. A ; Marvasti, F ; Sharif University of Technology
    Abstract
    This paper present a simple watermarking approach based on the rotation of low frequency components of image blocks. The rotation process is performed with less distortion by projection of the samples on specific lines according to message bit. To have optimal detection Maximum Likelihood criteria has been used. Thus, by computing the distribution of rotated noisy samples the optimum decoder is presented and its performance is analytically investigated. The privilege of this proposed algorithm is its inherent robustness against gain attack as well as its simplicity. Experimental results confirm the validity of the analytical derivations and also high robustness against common attacks. ©... 

    Information hiding with optimal detector for highly correlated signals

    , Article 2009 IEEE International Conference on Communications, ICC 2009, Dresden, 14 June 2009 through 18 June 2009 ; 2009 ; 05361486 (ISSN); 9781424434350 (ISBN) Sahraeian, M. E ; Akhaee, M. A ; Marvasti, F ; Sharif University of Technology
    2009
    Abstract
    In this paper, a novel scaling based information hiding approach robust against noise and gain attack is presented. The host signal is assumed to be stationary Gaussian modeled with a first-order autoregressive process. For data embedding, the host signal is divided into two parts. One part is manipulated while the other part is kept unchanged for parameter estimation. The decoding scheme using the ratio of samples is suitable for highly correlated signals in which the decoding process is difficult. By calculating the distribution of the ratio, the performance of the maximum likelihood decoder is analytically studied. The proposed algorithm is applied to several artificial Gaussian... 

    Joint compensation of jitter noise and time-shift errors in multichannel sampling system

    , Article IEEE Transactions on Instrumentation and Measurement ; Volume 68, Issue 10 , 2019 , Pages 3932-3941 ; 00189456 (ISSN) Araghi, H ; Akhaee, M. A ; Amini, A ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc  2019
    Abstract
    In high-speed analog-To-digital converters (ADCs), two main factors contribute to high power consumption. The first is the super linear relationship with the sampling rate; i.e., by doubling the sampling rate, the power consumption more than doubles. The second factor arises from the consumption of analog circuitry responsible to mitigate the jitter noise. By employing a multichannel sampling system, one can achieve high sampling rates by incorporating multiple low sampling-rate channels, which results in a linear scaling of power consumption with the number of channels. The main drawback of this system is the timing mismatch between the sampling channels. In this paper, we intend to jointly... 

    An invertible quantization based watermarking approach

    , Article 2008 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP, Las Vegas, NV, 31 March 2008 through 4 April 2008 ; 2008 , Pages 1677-1680 ; 15206149 (ISSN) ; 1424414849 (ISBN); 9781424414840 (ISBN) Saberian, M. J ; Akhaee, M. A ; Marvasti, F ; Sharif University of Technology
    2008
    Abstract
    In this paper a new class of invertible watermarking approach based on quantization has been introduced. Based on the necessary conditions (blindness, reversibility and imperceptibility), a set of linear convex functions which satisfy these requirements are found. Then the optimum of this function set with the least distortion has been selected. The main advantage of this method is that the inserted distortion can be easily controlled by adjusting quantization levels. The low computational complexity is another advantage of this method. Experimental results show that the proposed algorithm achieves higher embedding capacity while its distortion is lower than other invertible watermarking... 

    Two techniques for audio watermarking based on a novel transformation

    , Article 2007 IEEE International Conference on Signal Processing and Communications, ICSPC 2007, Dubai, 14 November 2007 through 27 November 2007 ; 2007 , Pages 1139-1142 ; 9781424412365 (ISBN) Feizi khankandi, S ; Akhaee, M. A ; Marvasti, F ; Sharif University of Technology
    2007
    Abstract
    The main purpose of this paper is to embed data in the transform domain of audio signals. Data embedding is similar to Quantization Index Modulation (QIM) approach. But the embedding process is performed in a novel transformation named PPG (Point to Point Graph) which converts the audio signal to a set of points in the Cartesian Coordinates. Two watermarking schemes are proposed in this paper. The first approach uses the QIM method on the radius of the PPG points while the second approach employs the logical operand for this aim. Simulation results show that these two methods have great robustness against the common attack (such as White Gaussian noise, echo and filtering). Subjective... 

    Performance improvement of spread spectrum additive data hiding over codec-distorted voice channels

    , Article European Signal Processing Conference ; Volume. 97, Issue. 9 , 2014 , pp. 2510-2514 ; ISSN: 22195491 Boloursaz, M ; Kazemi, R ; Behnia, F ; Akhaee, M. A ; Sharif University of Technology
    Abstract
    This paper considers the problem of covert communication through dedicated voice channels by embedding secure data in the cover speech signal utilizing spread spectrum additive data hiding. The cover speech signal is modeled by a Generalized Gaussian (GGD) random variable and the Maximum A Posteriori (MAP) detector for extraction of the covert message is designed and its reliable performance is verified both analytically and by simulations. The idea of adaptive estimation of detector parameters is proposed to improve detector performance and overcome voice non-stationarity. The detector's bit error rate (BER) is investigated for both blind and semi-blind cases in which the GGD shape... 

    Improved iterative techniques to compensate for interpolation distortions

    , Article Signal Processing ; Volume 92, Issue 4 , 2012 , Pages 963-976 ; 01651684 (ISSN) Parandehgheibi, A ; Ayremlou, A ; Akhaee, M. A ; Marvasti, F ; Sharif University of Technology
    2012
    Abstract
    In this paper a novel hybrid algorithm for compensating the distortion of any interpolation has been proposed. In this Hybrid method, a modular approach was incorporated in an iterative fashion. The proposed technique features an impressive improvement at reduced computational complexity. The authors also extend the scheme to 2-D signals and actual (real) images and find that the solution exhibits great potential. Both the simulation results and mathematical analysis confirm the superiority of the Hybrid model over competing methods and demonstrate its robustness against additive noise  

    Information hiding with maximum likelihood detector for correlated signals

    , Article Digital Signal Processing: A Review Journal ; Volume 36, Issue C , January , 2015 , Pages 144-155 ; 10512004 (ISSN) Sahraeian, S. M. E ; Akhaee, M. A ; Sankur, B ; Marvasti, F ; Sharif University of Technology
    Elsevier Inc  2015
    Abstract
    In this paper, a new scaling based information hiding approach with high robustness against noise and gain attack is presented. The host signal is assumed to be stationary Gaussian with first-order autoregressive model. For data embedding, the host signal is divided into two parts, and just one patch is manipulated while the other one is kept unchanged for parameter estimation. A maximum likelihood (ML) decoder is proposed which uses the ratio of samples for decoding the watermarked data. Due to the decorrelating property of the proposed decoder, it is very efficient for watermarking highly correlated signals for which the decoding process is not straightforward. By calculating the... 

    Compensating for distortions in interpolation of two-dimensional signals using improved iterative techniques

    , Article ICT 2010: 2010 17th International Conference on Telecommunications, 4 April 2010 through 7 April 2010 ; April , 2010 , Pages 929-934 ; 9781424452477 (ISBN) ParandehGheibi, A ; Rahimian, M. A ; Akhaee, M. A ; Ayremlou, A ; Marvasti, F ; Sharif University of Technology
    2010
    Abstract
    In this paper we extended a previously investigated modular method that is designed to compensate for interpolation distortions of one-dimensional signals, to two dimensions (2-D). Next the proposed 2-D modular technique was applied in an iterative fashion and was shown through both simulations and theoretical analyses to enhance the convergence of the iterative technique. In fact, with only a few modules we were able to achieve drastic improvements in signal reconstruction, and with a much less computational complexity. Moreover, both the simulations and the theoretical analysis confirmed the robustness of the proposed scheme against additive noise  

    Data hiding robust to mobile communication vocoders

    , Article IEEE Transactions on Multimedia ; Volume 18, Issue 12 , 2016 , Pages 2345-2357 ; 15209210 (ISSN) Kazemi, R ; Perez Gonzalez, F ; Akhaee, M. A ; Behnia, F ; Sharif University of Technology
    Institute of Electrical and Electronics Engineers Inc 
    Abstract
    The swift growth of cellular mobile networks in recent years has made voice channels almost accessible everywhere. Besides, data hiding has recently attracted significant attention due to its ability to imperceptibly embed side information that can be used for signal enhancement, security improvement, and two-way authentication purposes. In this regard, we aim at proposing efficient schemes for hiding data in the widespread voice channel of cellular networks. To this aim, our first contribution is to model the channel accurately by considering a linear filter plus a nonlinear scaling function. This model is validated through experiments with true speech signals. Then we leverage on this... 

    Covert communications through mobile voice channels

    , Article IET Information Security ; Volume 10, Issue 3 , 2016 , Pages 156-164 ; 17518709 (ISSN) Kazemi, R ; Rezaei, R ; Akhaee, M. A ; Behnia, F ; Sharif University of Technology
    Institution of Engineering and Technology  2016
    Abstract
    The rapid development and growth of cellular mobile networks in recent years has made voice channels widely available almost everywhere. On the other hand, voice dedicated channels possess properties that make them ideal options for high priority real-time secure communications. Beside these realities, information embedding has gained remarkable attention in recent years due to its potential application in multimedia security. In this regard, this study aims to propose an efficient scheme for data hiding to show the feasibility of exploiting these channels for covert communications. To this end, the authors propose new suboptimal but practical schemes based on additive and multiplicative... 

    Semi-reversible quantization based data hiding using missing samples recovery technique

    , Article 16th International Conference on Telecommunications, ICT 2009, 25 May 2009 through 27 May 2009 ; 2009 , Pages 298-302 ; 9781424429370 (ISBN) Ameri, A ; Saberian, M. J ; Akhaee, M. A ; Marvasti, F ; Sharif University of Technology
    Abstract
    A blind semi-invertible quantization based data hiding scheme, which reconstructs the original signal with high precision has been proposed. In order to produce correlated quantization yielding reversibility of the quantization based approach, a new transform domain has been introduced. In decoder, by compensating the quantization error and using the iterative technique, the original signal is recovered; then the watermarked signal is compared with the reconstructed original signal and hidden data is retrieved. Simulation results show that the proposed method in comparison with other reversible methods imposes less distortion and thus a higher Signal to Noise Ratio (SNR) is achieved. © 2009... 

    A combinational adaptive noise canceller using filter bank

    , Article 6th International Symposium on Image and Signal Processing and Analysis, ISPA 2009, Salzburg, 16 September 2009 through 18 September 2009 ; 2009 , Pages 71-74 ; 9789531841351 (ISBN) Ameri Mahabadi, A ; Hejazi, A ; Akhaee, M. A ; Eshghi, M ; Sharif University of Technology
    2009
    Abstract
    This paper proposes a novel combinational Adaptive Noise Canceller (ANC), which is suitable for non stationary noise environments. Pre-filter bank structure improves the convergence rate leading to less error in real-time applications. During our investigations, we have found out adaptive algorithms have better performance for low frequency subbands. Thus, by using Singular Value Decomposition (SVD) in each subband, a simplified version of variable step-size algorithms has been employed in low frequency subbands; while for high frequency subbands, some conventional techniques have been used. Simulation results show that combination of adaptive and conventional methods have better performance...