June 2024
·
2 Reads
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
June 2024
·
2 Reads
April 2024
·
46 Reads
Iraqi Journal for Electrical And Electronic Engineering
In the last couple decades, several successful steganography approaches have been proposed. Least Significant Bit (LSB) Insertion technique has been deployed due to its simplicity in implementation and reasonable payload capacity. The most important design parameter in LSB techniques is the embedding location selection criterion. In this work, LSB insertion technique is proposed which is based on selecting the embedding locations depending on the weights of coefficients in Cosine domain (2D DCT). The cover image is transformed to the Cosine domain (by 2D DCT) and predefined number of coefficients are selected to embed the secret message (which is in the binary form). Those weights are the outputs of an adaptive algorithm that analyses the cover image in two domains (Haar and Cosine). Coefficients, in the Cosine transform domain, with small weights are selected. The proposed approach is tested with samples from the BOSSbase, and a custom-built databases. Two metrics are utilized to show the effectiveness of the technique, namely, Root Mean Squared Error (RMSE), and Peak Signal-to-Noise Ratio (PSNR). In addition, human visual inspection of the result image is also considered. As shown in the results, the proposed approach performs better, in terms of (RMSE, and PSNR) than commonly employed truncation and energy based methods.
November 2023
·
52 Reads
·
2 Citations
Journal of Engineering and Applied Science
Over the past few decades, there have been several successful methods developed for steganography. One popular technique is the insertion method, which is favored for its simplicity and ability to hold a reasonable amount of hidden data. This study introduces an adaptive insertion technique based on the two-dimensional discrete Haar filter (2D DHF). The technique involves transforming the cover image into the wavelet domain using 2D DWT and selecting a predetermined number of coefficients to embed the binary secret message. The selection process is carried out by analyzing the cover image in two non-orthogonal domains: 2D discrete cosine transform and 2D DHF. An adaptive algorithm is employed to minimize the impact on the unrepresented parts of the cover image. The algorithm determines the weights of each coefficient in each domain, and coefficients with low weights are chosen for embedding. To evaluate the effectiveness of the proposed approach, samples from the BOSSbase and custom databases are used. The technique’s performance is measured using three metrics: mean squared error (MSE), peak signal-to-noise ratio (PSNR), and structural similarity index (SSIM). Additionally, a visual inspection by humans is conducted to assess the resulting image. The results demonstrate that the proposed approach outperforms recently reported methods in terms of MSE, PSNR, SSIM, and visual quality.
November 2022
·
40 Reads
·
1 Citation
Circuits Systems and Signal Processing
Minimally perturbed adversarial examples were shown to drastically reduce the performance of one-stage classifiers while being imperceptible. This paper investigates the susceptibility of hierarchical classifiers, which use fine and coarse level output categories, to adversarial attacks. We formulate a program that encodes minimax constraints to induce misclassification of the coarse class of a hierarchical classifier (e.g., changing the prediction of a 'monkey' to a 'vehicle' instead of some 'animal'). Subsequently, we develop solutions based on convex relaxations of said program. An algorithm is obtained using the alternating direction method of multipliers with competitive performance in comparison with state-of-the-art solvers. We show the ability of our approach to fool the coarse classification through a set of measures such as the relative loss in coarse classification accuracy and imperceptibility factors. In comparison with perturbations generated for one-stage classifiers, we show that fooling a classifier about the 'big picture' requires higher perturbation levels which results in lower imperceptibility. We also examine the impact of different label groupings on the performance of the proposed attacks. Supplementary information: The online version contains supplementary material available at 10.1007/s00034-022-02226-w.
September 2022
·
140 Reads
·
1 Citation
Circuits Systems and Signal Processing
Convolutional neural network (CNN) has emerged as one of the primary tools for image classification. In particular, deep CNNs are now considered the main tool for this purpose. However, these networks are often large and require computing and storage power that may not be available in very small sensor devices such as IoT (Internet of Things) devices; their training is also time and computing power consuming. As a result, in some applications, reducing the size of input data (images) and the processing network becomes necessary. Such reduction usually comes at the cost of reduced classification performance. In this paper, we consider networks with under 200k learnable parameters, as opposed to millions in deeper networks. We examine how domain transforms can be used for efficient size reduction and improvement of classification accuracy for small networks. We emphasize that finding optimal hyperparameters or network configurations is not our objective in this paper. It is shown that by using transforms such as discrete wavelet transforms (DWT) or discrete cosine transform (DCT), it is possible to efficiently improve the performance of size-reduced networks and inputs. We demonstrate that in most cases, the improvement can be traced to higher entropy of resized input using transforms. While transforms such as DCT allow variable input and network sizes to be utilized, DWT proves to be very effective when significant size reduction is needed (improving the result by up to 5%). It is also shown that input size reduction of up to 75% is possible, without loss of classification accuracy in some cases. We use two datasets of small images, including Fashion MNIST and CIFAR-10, to evaluate the performance of size reduction methods.
August 2021
·
13 Reads
August 2021
·
76 Reads
·
11 Citations
August 2021
·
7 Reads
August 2021
·
14 Reads
August 2021
·
24 Reads
... They are: a latent state, which appears from this time step; and a cell state, which serves as the input for the subsequent time step. LSTM is found suitable for Parkinson's [39], Brain Tumor [40], Alzheimer's [41] with an accuracy of 98.60 percent, 86.98 percent, and 85 percent respectively for VGRF Dataset [42], Molecular Brain Neoplasia Data (REMBRANDT) [43,44], and ADNI. For datasets, MINI-RGBD and RVI-25 [45], precision for the detection of Alzheimer's was found to be 91 percent. ...
August 2021
... is a matrix of size ( × ) containing a dataset with variables and m time points (Khandani & Mikhael, 2021). of with ( ) = is the factorization as shown in Equation 3 = ∑ ...
June 2021
Circuits Systems and Signal Processing
... They also evaluated the method for lung nodule classification, where they achieved 90.7% accuracy, 89.5% specificity, and 89.5% sensitivity. In [38] a combination of wavelet and discrete cosine transform representations were applied to extract the features in the input images. After these features were extracted, they were fed through 2 hidden layers of a neural network to classify the brain tumors. ...
August 2020
... Among these model variants, TDNN are the most common structure consisting of several layers with direct signal propagation (Liu et al., A time delay, 2020;Stegmayer et al., 2004). Such models are capable of learning from the input-output data of nonlinear dynamic objects and have excellent convergence properties (Sen, 2021;Khandani and Mikhael, 2020), which are advantages over the aforementioned Dynamic Neuro-SM and Wiener-type DNN methods. ...
August 2020
... For image classification, there are also non-additive methods that apply various transformations to an image in order to induce misclassifications [56]. This paper extends the scope of our recent work [7], which presents attacks on image HCs. An important distinction is that Alkhouri and Matloub et al. [7] make use of off-the-shelf targeted attack generators such as Papernot et al. [41] and Carlini and Wagner [12] to induce incorrect predictions of coarse labels. ...
July 2020
... Plusieurs travaux de recherche ont utilisé des approches simples et moins coûteuses basées sur des tests d'hypothèse pour la classication [51,83,84,85,86,87,88,89,90,91,92]. Ces approches sont des détecteurs statistiques. ...
July 2020
... Face recognition aims to give a computer system the ability to quickly and precisely recognize human faces in images or videos [3,4]. Numerous algorithms and methods, includ-ing recently proposed deep learning models, have been proposed to improve face recognition performance [5][6][7]. However, the face recognition system is far from perfect in terms of accuracy. ...
June 2020
International Journal of Intelligent Engineering and Systems
... Many papers have been published in the face recognition domain during during the past few years. Sapijaszko et al. [13] proposed a system for face recognition. The system used a preprocessing algorithm to enhance the images and then applied the two-dimensional Discrete Cosine Transform (DCT) with the two-dimensional Discrete Wavelet Transform (DWT) to extract features. ...
December 2020
Circuits Systems and Signal Processing
... In feature-based machine learning methods, [16] and [17] employed color, histogram of oriented gradients, and local binary patterns for feature design and extraction, followed by artificial neural networks for traffic sign classification. [18] and [19] constructed frameworks based on multilayer perceptrons and support vector machines (SVM), where [18] designed a logistic regression classification system, and [19] used discrete wavelet transform and cosine transform for feature design and extraction. [20] combined SVM and random forest algorithms, which used color descriptors for feature extraction. ...
August 2019
... The use of transforms and neural networks has received some attention for time series and image classification applications [1,2,16,17,20,21,28]. For time-series application, our recent work [22] provides a thorough overview which will not be repeated here in this paper; instead, in this section, we review the use of domain transforms in image classification. ...
August 2019