Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ahmet M. Eskicioglu is active.

Publication


Featured researches published by Ahmet M. Eskicioglu.


acm workshop on multimedia and security | 2004

Robust DWT-SVD domain image watermarking: embedding data in all frequencies

Emir Ganic; Ahmet M. Eskicioglu

Protection of digital multimedia content has become an increasingly important issue for content owners and service providers. As watermarking is identified as a major technology to achieve copyright protection, the relevant literature includes several distinct approaches for embedding data into a multimedia element (primarily images, audio, and video). Because of its growing popularity, the Discrete Wavelet Transform (DWT) is commonly used in recent watermarking schemes. In a DWT-based scheme, the DWT coefficients are modified with the data that represents the watermark. In this paper, we present a hybrid scheme based on DWT and Singular Value Decomposition (SVD). After decomposing the cover image into four bands, we apply the SVD to each band, and embed the same watermark data by modifying the singular values. Modification in all frequencies allows the development of a watermarking scheme that is robust to a wide range of attacks.


IEEE Transactions on Image Processing | 2006

An SVD-based grayscale image quality measure for local and global assessment

Aleksandr Shnayderman; Alexander Gusev; Ahmet M. Eskicioglu

The important criteria used in subjective evaluation of distorted images include the amount of distortion, the type of distortion, and the distribution of error. An ideal image quality measure should, therefore, be able to mimic the human observer. We present a new grayscale image quality measure that can be used as a graphical or a scalar measure to predict the distortion introduced by a wide range of noise sources. Based on singular value decomposition, it reliably measures the distortion not only within a distortion type at different distortion levels, but also across different distortion types. The measure was applied to five test images (airplane, boat, Goldhill, Lena, and peppers) using six types of distortion (JPEG, JPEG 2000, Gaussian blur, Gaussian noise, sharpening, and DC-shifting), each with five distortion levels. Its performance is compared with PSNR and two recent measures.


Journal of Electronic Imaging | 2005

Robust embedding of visual watermarks using discrete wavelet transform and singular value decomposition

Emir Ganic; Ahmet M. Eskicioglu

Protection of digital multimedia content has become an increasingly important issue for content owners and service providers. As watermarking is identified as a major technology to achieve copyright protection, the relevant literature includes several distinct approaches for embedding data into a multimedia element. Because of its growing popularity, the discrete wavelet transform (DWT) is commonly used in recent watermarking schemes. In a DWT-based scheme, the DWT coefficients are modified with the data that represents the watermark. We present a hybrid nonblind scheme based on DWT and singular value decomposition (SVD). After decomposing the cover image into four bands (LL, HL, LH, and HH, where L stands for lowpass and H stands for highpass), we apply the SVD to each band, and modify the singular values of the cover image with the singular values of the visual watermark. Modification in all frequencies enables the development of a watermarking scheme that is robust to a wide range of attacks. We compare our hybrid algorithm with a pure SVD-based scheme, and show that it is considerably more robust and reliable.


Internet multimedia management systems. Conference | 2004

A robust multiple watermarking scheme in the discrete wavelet transform domain

Peining Tao; Ahmet M. Eskicioglu

Because of the transition from analog to digital technologies, content owners are seeking technologies for the protection of copyrighted multimedia content. Encryption and watermarking are two major tools that can be used to prevent unauthorized consumption and duplication. In this paper, we generalize an idea in a recent paper that embeds a binary pattern in the form of a binary image in the LL and HH bands at the second level of Discrete Wavelet Transform (DWT) decomposition. Our generalization includes all four bands (LL, HL, LH, and HH), and a comparison of embedding a watermark at first and second level decompositions. We tested the proposed algorithm against fifteen attacks. Embedding the watermark in lower frequencies is robust to a group of attacks, and embedding the watermark in higher frequencies is robust to another set of attacks. Only for rewatermarking and collusion attacks, the watermarks extracted from all four bands are identical. Our experiments indicate that first level decomposition appear advantageous for two reasons: The area for watermark embedding is maximized, and the extracted watermarks are more textured with better visual quality.


electronic imaging | 2003

Multidimensional image quality measure using singular value decomposition

Aleksandr Shnayderman; Alexander Gusev; Ahmet M. Eskicioglu

The important criteria used in subjective evaluation of distorted images include the amount of distortion, the type of distortion, and the distribution of error. An ideal image quality measure should therefore be able to mimic the human observer. We present a new image quality measure that can be used as a multidimensional or a scalar measure to predict the distortion introduced by a wide range of noise sources. Based on the Singular Value Decomposition, it reliably measures the distortion not only within a distortion type at different distortion levels but also across different distortion types. The measure was applied to Lena using six types of distortion (JPEG, JPEG 2000, Gaussian blur, Gaussian noise, sharpening and DC-shifting), each with five distortion levels.


Multimedia Systems | 2003

Multimedia security in group communications: recent progress in key management, authentication, and watermarking

Ahmet M. Eskicioglu

Abstract.Multicast is an internetwork service that provides efficient delivery of data from a source to multiple receivers. It reduces the bandwidth requirements of the network and the computational overhead of the host devices. This makes multicast an ideal technology for communication among a large group of participants. Secure group communications involves many service types include teleconferencing, pay TV and real-time delivery of stock quotes. IP multicast is the traditional mechanism to support multicast communications. Multicast security includes group membership control, secure key distribution, secure data transfer and copyright protection. This paper is an overview of the schemes proposed for group key management, authentication and watermarking in wired networks with fixed members and wireless networks with mobile members.


International Symposium on Optical Science and Technology | 2001

Security of digital entertainment content from creation to consumption

Ahmet M. Eskicioglu; John Town; Edward J. Delp

With the advent of digital technologies, many new market opportunities have emerged for content owners, content distributors, and consumer electronics/information technology industries. An essential requirement for developing a thriving marketplace is the protection of copyrighted content in digital form. There are four major stages in the delivery of content to the consumer: (1) capturing on digital media, (2) packaging, (3) distribution to home networks, and (4) transfer to the final audio/visual device within the home network. Entertainment content is of particular importance as it will be in high demand for many years to come. If an end-to-end security cannot be provided in a digital market, there would be no incentive for content creation. Lack of new supplies would result in detrimental effects for all the industries involved in the delivery chain. In this paper, we present the primary means of securing the entertainment content from creation to consumption in an attempt to understand the overall complexity of the problem.


conference on security steganography and watermarking of multimedia contents | 2006

A DWT-based robust semi-blind image watermarking algorithm using two bands

Ersin Elbasi; Ahmet M. Eskicioglu

Robust image watermarking is the process of embedding an invisible watermark in an image with the purpose of keeping the watermark intact after intentional attacks and normal audio/visual processes. A recent DWT image watermarking paper embeds a PRN sequence as a watermark in three bands, excluding the low pass subband, using coefficients that are higher than a given threshold T1. During watermark detection, all the coefficients higher than another threshold T2 are chosen for correlation with the original watermark. In this paper, we extend the idea to embed the same watermark in two bands (LL and HH). Our experiments show that for one group of attacks, the correlation with the real watermark is higher than the threshold in the LL band, and for another group of attacks, the correlation with the real watermark is higher than the threshold in the HH band.


IEEE Transactions on Consumer Electronics | 2002

A key transport protocol based on secret sharing applications to information security

Ahmet M. Eskicioglu; Edward J. Delp

Digital multimedia content is delivered to homes via the Internet, satellite, terrestrial and cable networks. Scrambling is a common approach used by conditional access systems to prevent unauthorized access to audio/visual data. The descrambling keys are securely distributed to the receivers in the same transmission channel. Their protection is an important part of the key management problem. Although public-key cryptography provides a viable solution, alternative methods are sought for economy and efficiency. Message authentication is an important objective of information security in modern electronic distribution networks. This objective is met by providing the receiver of a message an assurance of the senders identity. As physical protection such as sealed envelopes is not possible for messages expressed as binary sequences, digital tools have been developed using cryptography. A major limitation of all cryptographic methods for message authentication lies in their use of algorithms with fixed symmetric or public keys. This paper presents a key transport protocol based on secret sharing. Conditional access and message authentication are two important application areas for which the advantages of the proposed protocol are discussed. The protocol eliminates the need for a cipher, yet effectively combines the advantages of symmetric and public-key ciphers. It can be used to build a new key management scheme that allows the service providers to generate different keys for different sets of receivers, and to renew these keys in a convenient way.


conference on security steganography and watermarking of multimedia contents | 2005

Embedding multiple watermarks in the DFT domain using low- and high-frequency bands

Emir Ganic; Scott Dexter; Ahmet M. Eskicioglu

Although semi-blind and blind watermarking schemes based on Discrete Cosine Transform (DCT) or Discrete Wavelet Transform (DWT) are robust to a number of attacks, they fail in the presence of geometric attacks such as rotation, scaling, and translation. The Discrete Fourier Transform (DFT) of a real image is conjugate symmetric, resulting in a symmetric DFT spectrum. Because of this property, the popularity of DFT-based watermarking has increased in the last few years. In a recent paper, we generalized a circular watermarking idea to embed multiple watermarks in lower and higher frequencies. Nevertheless, a circular watermark is visible in the DFT domain, providing a potential hacker with valuable information about the location of the watermark. In this paper, our focus is on embedding multiple watermarks that are not visible in the DFT domain. Using several frequency bands increases the overall robustness of the proposed watermarking scheme. Specifically, our experiments show that the watermark embedded in lower frequencies is robust to one set of attacks, and the watermark embedded in higher frequencies is robust to a different set of attacks.

Collaboration


Dive into the Ahmet M. Eskicioglu's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Peining Tao

City University of New York

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Eugene Girshtel

City University of New York

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Vitaliy Slobodyan

City University of New York

View shared research outputs
Researchain Logo
Decentralizing Knowledge