Loading...
Search for: papermaking
0.007 seconds

    A simple method for detecting the possible changes of hidden information of watermarked image in an MMS message

    , Article IEEE- International Symposium on Biometrics and Security Technologies, ISBAST'08, Islamabad, 23 April 2008 through 24 April 2008 ; 2008 Shirali Shahreza, M ; Sharif University of Technology
    2008
    Abstract
    After expanding the use of computer and its affect on different aspect of life, the copyright issue has gained many attractions. For this purpose watermarking methods are proposed. In these methods a code is embedded into digital material that can be used to approve ownership, it can be visible or invisible to the user. On the other hand with the rapid growth of mobile phones, mobile telecommunication companies starting to add additional features to their mobile phones such as MMS (Multimedia Messaging Service) in order to attract more customers. MMS is a technology that allows mobile phones sending messages that includes multimedia objects esp. images. For copyright protection of images... 

    Minimization of Wet End disturbances during web breaks using online LAV estimation

    , Article Control Engineering Practice ; Volume 18, Issue 4 , 2010 , Pages 433-447 ; 09670661 (ISSN) Nobakhti, A ; Wang, H ; Sharif University of Technology
    Abstract
    During a Wet End break, the loss of paper feed through the paper machine causes loss of sensory information and the remaining parts of the process are operated in open-loop. This causes the stock composition in the Headbox to deviate substantially from the nominal specifications, causing paper quality (after start up) and paper machine runability issues. In this work, the Base Sheet Ash measurement of the scanner is estimated using a least absolute value (LAV) model which can then be used for control of the chalk valve during the breaks to keep the Headbox Ash within specified limits. The model is computed using a very fast optimization algorithm which is able to compute the LAV solution... 

    Introducing a two dimensional measure for watermarking capacity in images

    , Article Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 25 June 2008 through 27 June 2008, Povoa de Varzim ; Volume 5112 LNCS , 2008 , Pages 213-220 ; 03029743 (ISSN) ; 9783540698111 (ISBN) Yaghmaee, F ; Jamzad, M ; Sharif University of Technology
    2008
    Abstract
    One of the most important parameters in evaluating a watermarking algorithm is its capacity. Of course capacity has a paradoxical relation with two other important parameters: image quality and robustness. Generally, watermarking capacity is expressed by bit per pixel (bpp) unit measure. This measure does not show what the side effects would be on image quality and capacity. Therefore, we proposed a two dimensional measure named capacity curve which shows the effects of capacity on visual quality. In this measure we can find the amount of degradation by a numerical value for each modification in pixels. Our experimental results are compatible with previous works in this field. © 2008... 

    Software watermarking by equation reordering

    , Article 2008 3rd International Conference on Information and Communication Technologies: From Theory to Applications, ICTTA, Damascus, 7 April 2008 through 11 April 2008 ; 2008 ; 1424417511 (ISBN); 9781424417513 (ISBN) Shirali Shahreza, M ; Shirali Shahreza, S ; Sharif University of Technology
    2008
    Abstract
    Watermarking is the process of hiding information in a media and usually used to for copyright protection. In software watermarking, the information is added to the source code of program and can be extracted from compiled executable code. In this paper, a new software watermarking algorithm is proposed by equation reordering. In this method, the order of operands in an equation is changed according to the information we want to hide in a way that the result of the equation is unchanged. One of the main advantages of this method is that no code added to the program, so the size and speed of the program not changed  

    Two techniques for audio watermarking based on a novel transformation

    , Article 2007 IEEE International Conference on Signal Processing and Communications, ICSPC 2007, Dubai, 14 November 2007 through 27 November 2007 ; 2007 , Pages 1139-1142 ; 9781424412365 (ISBN) Feizi khankandi, S ; Akhaee, M. A ; Marvasti, F ; Sharif University of Technology
    2007
    Abstract
    The main purpose of this paper is to embed data in the transform domain of audio signals. Data embedding is similar to Quantization Index Modulation (QIM) approach. But the embedding process is performed in a novel transformation named PPG (Point to Point Graph) which converts the audio signal to a set of points in the Cartesian Coordinates. Two watermarking schemes are proposed in this paper. The first approach uses the QIM method on the radius of the PPG points while the second approach employs the logical operand for this aim. Simulation results show that these two methods have great robustness against the common attack (such as White Gaussian noise, echo and filtering). Subjective... 

    Introducing a new method for estimation image complexity according to calculate watermark capacity

    , Article 2008 4th International Conference on Intelligent Information Hiding and Multiedia Signal Processing, IIH-MSP 2008, Harbin, 15 August 2008 through 17 August 2008 ; 2008 , Pages 981-984 ; 9780769532783 (ISBN) Yaghmaee, F ; Jamzad, M ; Sharif University of Technology
    2008
    Abstract
    One of the most important parameters in evaluating a watermarking algorithm is its capacity. In fact, capacity has a paradoxical relation with other two important parameters: image quality and robustness. Some works have been done on watermarking capacity and a few on image complexities. Most works on watermarking capacity is based on information theory and the capacity values which are calculated based on these methods are very tolerate. In this paper we propose a new method for calculating image complexity based on Region Of Interest (ROI) concept. After that we analyze three complexity measures named: Image compositional complexity (ICC), Quad tree and ROI method, with three different... 

    Audio watermarking based on quantization index modulation in the frequency domain

    , Article 2007 IEEE International Conference on Signal Processing and Communications, ICSPC 2007, Dubai, 14 November 2007 through 27 November 2007 ; 2007 , Pages 1127-1130 ; 9781424412365 (ISBN) Khademi, N ; Akhaee, M. A ; Ahadi, S. M ; Moradi, M ; Kashi, A ; Sharif University of Technology
    2007
    Abstract
    In this paper, our main purpose is to embed data in the frequency domain of audio signals. Data was embedded by means of Quantization Index Modulation (QIM) in the frequency domain. With this aim, the spectrum of the audio signal was divided into two parts. The first part consisted of the first 19 Barks and the second included the remaining 6 Barks. Each of these parts had a different quantization step size. In order to have large quantization step sizes which yield more robustness, Human Auditory System (HAS) has been used. Decoder detects the watermark signal, without using the original audio signal. Simulation results have shown that this watermarking scheme has better robustness against...