Search or add a thesis

Advanced Search (Beta)
Home > Intelligent Perceptual Shaping of a Digital Watermark

Intelligent Perceptual Shaping of a Digital Watermark

Thesis Info

Access Option

External Link

Author

Khan, Asifullah

Program

PhD

Institute

Ghulam Ishaq Khan Institute of Engineering Sciences and Technology

City

Topi

Province

KPK

Country

Pakistan

Thesis Completing Year

2006

Thesis Completion Status

Completed

Subject

Applied Sciences

Language

English

Link

http://prr.hec.gov.pk/jspui/handle/123456789/115

Added

2021-02-17 19:49:13

Modified

2024-03-24 20:25:49

ARI ID

1676726483905

Asian Research Index Whatsapp Chanel
Asian Research Index Whatsapp Chanel

Join our Whatsapp Channel to get regular updates.

Similar


Embedding of a digital watermark in a digital media is proving to be a workable solution for many of the recent problems like copyright protections and content authentication. However, the embedding of a digital watermark in a digital media is not without constraints. This requires perceptual shaping of a watermark in context of Human Visual System (HVS). The goal of this thesis is to develop a new watermarking scheme based on intelligent shaping of a digital watermark using GP. To achieve this goal, the research focuses on making efficient tradeoffs between two of the most important, but contradicting properties of a watermarking system; robustness and imperceptibility. This thesis makes the following contributions: (1) An analysis of the importance of perceptual shaping of a watermark in making a trade off between robustness and imperceptibility is performed, (2) intelligent search technique, like GP, is used to exploit the characteristics of HVS in evolving superior perceptual shaping functions, (3) the concept of bonus fitness has been proposed to implement multi-objective fitness function, in the GP simulation. This helps in simultaneously handling the estimated robustness and imperceptibility requirements during embedding stage, and actual robustness during decoding stage, (4) we realize that perceptual shaping of a watermark is not only important for making a superior trade off, but could also be used to tailor the watermark in accordance to an anticipated attack, (5) watermarking systems are becoming more and more sophisticated, as such this thesis, using intelligent search technique like GP, points towards the solution strategy of many complex issues in watermarking that are difficult to be computed analytically. A series of empirical investigations are performed to analyze the performance of the genetically evolved perceptual shaping functions (GPSFs) using standard benchmark, which shows the effectiveness of our approach.
Loading...
Loading...

Similar Books

Loading...

Similar Chapters

Loading...

Similar News

Loading...

Similar Articles

Loading...

Similar Article Headings

Loading...

ادوات استفہام

ادوات استفہام

ادواتِ استفہام سے مراد ایسے اسما و حروف ہیں جن سے سوال کیا جاتا ہے۔ قرآن مجید میں بھی ادواتِ استفہام کا ستعمال بکثرت موجود ہے۔ڈاکٹر عبد ہ الراجحی تحریر فرماتے ہیں:

"تمام ادوات استفہام اسمائے استفہام ہیں سوائے دو کلموں کے "ھل اور ھمزہ" یہ دونوں حروف استفہام ہیں اور مبنی ہیں اور اسمائے استفہام سب مبنی ہیں سوائے"اي" کے‘‘۔[[1]]

نحویوں نے ادوات استفہام کی دو اقسام بیان کی ہیں:

۱-حروف استفہام                                                                     ۲-اسمائے استفہام



[[1]]     عبده الراجحى،التطبيق النحوى،دارالمعرفة، مصر، ۲۰۰۷ء، ص ۵۹۔

STUDENT'S READINESS TO CARRY OUT FACE-TO-FACE LEARNING AT KENDARI VOCATIONAL HIGH SCHOOL

The slowing spread of Covid-19 infections has brought positive changes in the education sector. The issue of implementing limited face to face learning begins to excite students in gaining knowledge. Online learning effects for approximately two years was relatively difficult to keep students away from themselves. This study time to determine how the level of student learning readiness in facing offline learning. This was quantitative research with a survey type. The population were State vocatoonal high school 2 Kendari students, totaling 558 students. The sample was drawn randomly with a magnitude estimated using the Slovin formula at a significance of 5% so that the total sample size was 233 students. Data were collected by learning readiness scale. Data were analyzed descriptively and comparative statistics. The results showed that the learning readiness of State vocatoonal high school Negeri 2 Kendari students was in the high category and female students had a higher level of learning readiness than male students.

Smart Routing Based on Ddos Detection With Intelligent Survivable Centric Network Agent

The DDoS attacks are the most common attacks of the network and the mechanism and nature of these attacks change day by day. DDoS attacks can simply exhaust the network communication resources, it cause the failure of the network within a less time. The fundamental technologies and network protocols have flaws and vulnerabilities that can open doors for attackers to attack the network. This problem is a hurdle for secure and reliable communication with in network. To overcome this issue, there is a need to create a more effective and accurate attack detection algorithm specifically for DDoS attack. Numerous attack detection mechanisms already developed to detect a DDoS attack in network. An effective attack detection mechanism that can provide the entire attack details is therefore required to overcome the problem. Additionally, need to develop such a diverse system to address not only DDoS attack details and also provide proactive measures to avoid the same kind of attacks in future by designing intelligent system. Therefore, in this thesis, we propose SRDD, a smart routing based DDoS detection system for entire network. In SRDD, the DDoS attacks can be detected at the initial phase. In this research, we have been developed a DDoS detection system which is based on decision tree algorithm to prevent the DDoS attack. The decision tree algorithm, include with signature based detection methodologies, perform automatic prediction, and provide effective detection of malicious traffic. The decision tree algorithm classifying the received packets and making a decision based on the classification of results. For validation of proposed system, selected some of other machine learning techniques and provide comparison with our proposed system. This proposed SRDD system evaluates the network resources and the traffic dataset in order to train the centric agent for detection system to detect legitimate and malicious traf?c. The proposed SRDD system allowed legitimate traffic to pass through network and malicious traf?c is ?agged malicious to go through detection system. Finally, the results are discussed in terms of accuracy, exposure and specificity. The system not only can identify the attacks, but also detect the attacker IPs and start a process of mitigation to provide very well protection of the network system at initial stage of an attack is identified. The proposed research focused on the security aspect of legacy protocols as the baseline for mapping our desired research objectives to align with intelligent survivable centric network agent.