Browsing by Author "Shehzad, Danish"
Now showing 1 - 8 of 8
- Results Per Page
- Sort Options
Master Thesis Developing novel techniques for spatial domain LSB i̇mage steganography(Kadir Has Üniversitesi, 2019) Shehzad, Danish; Da?, TamerSteganography is one of the most noteworthy information hiding mechanism, which is used as an alternative to cryptography in order to provide adequate data security. Image steganography is one of the key types of steganography where a message to be transmitted is hidden inside a cover image. The most commonly used techniques for image steganography rely on LSB Steganography. In this thesis, new techniques are developed for LSB image steganography to achieve maximum security, optimal data capacity along with provisioning of efficient steganography mechanism. In the first part of this work, a novel technique based on pairs matching is developed for LSB image steganography. In this technique MSBs along with LSBs are used in a delicate method for data hiding for the first time. The message bits from the secret information are compared with all defined pixel pairs and replace the least two significant bits with respective matched pair number. This technique shows good quality of stego image along with adequate peak signal to noise ratio and provides high payload of secret message. In the second part, threshold-based LSB image steganography technique is developed. This technique also works in spatial domain and categorizes the pixels based on threshold defined categories. Maximum four bits and minimum one bit is embedded in pixel based on its category. The prominence in THBS is on security and payload as it uses bits proficiently for data embedding. ETHBS allows efficient execution of the algorithm along with provisioning of optimal security. In the last part 1LSB Image steganography technique based on blocks matrix determinant is developed. It is a technique in which data is embedded by making minimal changes in image pixels. This technique is 1LSB substitution technique that works on matrix determinant of 2 by 2 blocks of image pixels. This technique ensures high PSNR and ensures good quality of stego image.Article Citation Count: 9LSB Image Steganography Based on Blocks Matrix Determinant Method(KSII-KOR SOC Internet Information, 2019) Dağ, Tamer; Dağ, TamerImage steganography is one of the key types of steganography where a message to be sent is hidden inside the cover image. The most commonly used techniques for image steganography rely on LSB steganography. In this paper, a novel image steganography technique based on blocks matrix determinant method is proposed. Under this method, a cover image is divided into blocks of size 2 x 2 pixels and the determinant of each block is calculated. The comparison of the determinant values and corresponding data bits yields a delicate way for the embedment of data bits. The main aim of the proposed technique is to ensure concealment of secret data inside an image without affecting the cover image quality. When the proposed steganography method is compared with other existing LSB steganography methods, it is observed that it not only provides higher PSNR, lower MSE but also guarantees better quality of the stego image.Article Citation Count: 6Novel Application Software for the Semi-Automated Analysis of Infrared Meibography Images(2019) Dağ, Tamer; Gorcuyeva, Sona; Dağ, Tamer; Bozkurt, BanuPurpose: To develop semi-automated application software that quickly analyzes infrared meibography images taken with the CSO Sirius Topographer (CSO, Italy) and to compare them to the manual analysis system on the device (Phoenix software platform). Methods: A total of 52 meibography images verified as high quality were used and analyzed through manual and semi-automated meibomian gland (MG) detector software in this study. For the manual method, an experienced researcher circumscribed the MGs by putting dots around grape-like clusters in a predetermined rectangular area, and Phoenix software measured the MG loss area by percentage, which took around 10 to 15 minutes. MG loss was graded from 1 (<25%) to 4 (severe >75%). For the semi-automated method, 2 blind physicians (I and II) determined the area to be masked by putting 5 to 6 dots on the raw images and measured the MG loss area using the newly developed semi-automated MG detector application software in less than 1 minute. Semi-automated measurements were repeated 3 times on different days, and the results were evaluated using paired-sample t test, Bland-Altman, and kappa κ analysis. Results: The mean MG loss area was 37.24% with the manual analysis and 40.09%, 37.89%, and 40.08% in the first, second, and third runs with the semi-automated analysis (P < 0.05). Manual analysis scores showed a remarkable correlation with the semi-automated analysis performed by 2 operators (r = 0.950 and r = 0.959, respectively) (P < 0.001). According to Bland-Altman analysis, the 95% limits of agreement between manual analysis and semi-automated analysis by operator I were between -10.69% and 5% [concordance correlation coefficient (CCC) = 0.912] and between -9.97% and 4.3% (CCC = 0.923) for operator II. The limit of interoperator agreement in semi-automated analysis was between -4.89% and 4.92% (CCC = 0.973). There was good to very good agreement in grading between manual and semi-automated analysis results (κ 0.76-0.84) and very good interoperator agreement with semi-automated software (κ 0.91) (P < 0.001). Conclusions: For the manual analysis of meibography images, around one hundred dots have to be put around grape-like clusters to determine the MGs, which makes the process too long and prone to errors. The newly developed semi-automated software is a highly reproducible, practical, and faster method to analyze infrared meibography images with excellent correlation with the manual analysis.Conference Object Citation Count: 5A Novel Image Steganography Technique based on Similarity of Bits Pairs(IEEE, 2017) Dağ, Tamer; Dağ, TamerSteganography is one of the most important information hiding mechanism which can be used along with cryptography for providing adequate data security. The common Steganographic mediums used are text image audio and video for hiding secret information. In the case of image medium mostly least significant bits of pixels of a cover image are used for hiding secret information. In this paper a new technique based on pairs matching is proposed data bits of the message to be secured are arranged in pairs and image pixel bits are also arranged pairwise. The pixel bits are represented in forms of pairs as 7th and 6th bits makes 3rd pair 6th and 5th bits are named as 2nd pair while 5th and 4th bits are denoted with 1st pair and the last one 4th and 3rd pair represented as the 0th pair. The secret message bits are compared with all pairs and replace the least two significant bits with respective matched pair number. If no pair is matched then replace the 0th pair with message bits and replace two LSB with pair no 0. The proposed technique shows good quality of stego image along with acceptable PSNR and also carries the high capacity of secret message. By comparing the results with existing techniques the proposed technique shows good results.Conference Object Citation Count: 0Optimizing NEURON Brain Simulator With Remote Memory Access On Distributed Memory Systems(Institute of Electrical and Electronics Engineers Inc., 2016) Bozkuş, Zeki; Bozkuş, ZekiThe Complex neuronal network models require support from simulation environment for efficient network simulations. To compute the models increasing complexity necessitated the efforts to parallelize the NEURON simulation environment. The computational neuroscientists have extended NEURON by dividing the equations for its subnet among multiple processors for increasing the competence of hardware. For spiking neuronal networks inter-processor spikes exchange consume significant portion of overall simulation time on parallel machines. In NEURON Message Passing Interface (MPI) is used for inter processor spikes exchange MPI-Allgather collective operation is used for spikes exchange generated after each interval across distributed memory systems. However as the number of processors become larger and larger MPI-Allgather method become bottleneck and needs efficient exchange method to reduce the spike exchange time. This work has improved MPI-Allgather method to Remote Memory Access (RMA) based on MPI-3.0 for NEURON simulation environment MPI based on RMA provides significant advantages through increased communication concurrency in consequence enhances efficiency of NEURON and scaling the overall run time for the simulation of large network models.1 © 2015 IEEE.Article Citation Count: 0Optimizing NEURON Simulation Environment Using Remote Memory Access with Recursive Doubling on Distributed Memory Systems(Hindawi Ltd, 2016) Bozkuş, Zeki; Bozkuş, ZekiIncrease in complexity of neuronal network models escalated the efforts to make NEURON simulation environment efficient. The computational neuroscientists divided the equations into subnets amongst multiple processors for achieving better hardware performance. On parallel machines for neuronal networks interprocessor spikes exchange consumes large section of overall simulation time. In NEURON for communication between processors Message Passing Interface (MPI) is used. MPI Allgather collective is exercised for spikes exchange after each interval across distributed memory systems. The increase in number of processors though results in achieving concurrency and better performance but it inversely affects MPI Allgather which increases communication time between processors. This necessitates improving communication methodology to decrease the spikes exchange time over distributed memory systems. This work has improved MPI Allgather method using Remote Memory Access (RMA) by moving two-sided communication to one-sided communication and use of recursive doubling mechanism facilitates achieving efficient communication between the processors in precise steps. This approach enhanced communication concurrency and has improved overall runtime making NEURON more efficient for simulation of large neuronal network models.Article Citation Count: 2Performance Improvement of Threshold Based Audio Steganography Using Parallel Computation(Science & Information SAI Organization Ltd, 2016) Dağ, Tamer; Shehzad, Danish; Umar, Arif Iqbal; Khan, Zakir; Dağ, Tamer; Ul Amin, NoorAudio steganography is used to hide secret information inside audio signal for the secure and reliable transfer of information. Various steganography techniques have been proposed and implemented to ensure adequate security level. The existing techniques either focus on the payload or security but none of them has ensured both security and payload at same time. Data Dependency in existing solution was reluctant for the execution of steganography mechanism serially. The audio data and secret data pre-processing were done and existing techniques were experimentally tested in Matlab that ensured the existence of problem in efficient execution. The efficient least significant bit steganography scheme removed the pipelining hazard and calculated Steganography parallel on distributed memory systems. This scheme ensures security focuses on payload along with provisioning of efficient solution. The result depicts that it not only ensures adequate security level but also provides better and efficient solution.Article Citation Count: 10Threshold-based Steganography: A Novel Technique for Improved Payload and SNR(Zarka Private Univ, 2016) Khan, Zakir; Shah, Mohsin; Naeem, Muhammad; Mahmood, Toqeer; Khan, Shah; Amin, Noor Ul; Shehzad, DanishSteganography is the art of hiding user information in various file types including image audio and video. Security of steganography lies in imperceptibility of secret information in the cover image. Human Visual System (HVS) is not able to detect the changes in low color values of an image. To the best of our knowledge none of the available steganographic techniques have exploited this weakness of HVS. In this paper a new LSB technique is presented which hides information in the cover image taking into account the pixel value of color or grey level of every pixel. Our experiments show that the proposed technique has a high payload and low perceptibility of secret information hidden in the cover image as compared to the existing Least Significant Bit (LSB) based algorithms. We have used MATLAB for the implementation of proposed algorithm.