Hamurabi Gamboa Rosales
Autonomous University of Zacatecas
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Hamurabi Gamboa Rosales.
SpringerPlus | 2016
Amita Nandal; Hamurabi Gamboa Rosales
In this paper a novel image fusion algorithm based on directional contrast in fuzzy transform (FTR) domain is proposed. Input images to be fused are first divided into several non-overlapping blocks. The components of these sub-blocks are fused using directional contrast based fuzzy fusion rule in FTR domain. The fused sub-blocks are then transformed into original size blocks using inverse-FTR. Further, these inverse transformed blocks are fused according to select maximum based fusion rule for reconstructing the final fused image. The proposed fusion algorithm is both visually and quantitatively compared with other standard and recent fusion algorithms. Experimental results demonstrate that the proposed method generates better results than the other methods.
Springer Topics in Signal Processing | 2017
Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales
Nowadays, a mass traffic of Internet is occupied by text data transactions. Because text data is widely distributed, searched, and reused in various applications, it is essential to control the copyright over text as well as other forms of data including video, image, and audio. Semantic and syntactic structures of text are good candidates for embedding watermarks.
Security and Communication Networks | 2017
Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales
This paper presents a gain invariant speech watermarking technique based on quantization of the Lp-norm. In this scheme, first, the original speech signal is divided into different frames. Second, each frame is divided into two vectors based on odd and even indices. Third, quantization index modulation (QIM) is used to embed the watermark bits into the ratio of the Lp-norm between the odd and even indices. Finally, the Lagrange optimization technique is applied to minimize the embedding distortion. By applying a statistical analytical approach, the embedding distortion and error probability are estimated. Experimental results not only confirm the accuracy of the driven statistical analytical approach but also prove the robustness of the proposed technique against common signal processing attacks.
Springer Topics in Signal Processing | 2017
Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales
Three-dimensional (3D) computer graphic is applied widely in digital archives, video games, entertainment, animation, MPEG-4, and Web3D. 3D watermarking focuses on embedding hidden data in 3D materials. As discussed in Chap. 5, 3D watermarking is very similar to a compression standard that implies watermarks on a sequence of still images [1].
Springer Topics in Signal Processing | 2017
Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales
This chapter discusses the security enhancement applications of digital watermarking in various technologies. Furthermore, the combination of watermarking technology with other computer security technologies such as biometric and cryptography is discussed. This chapter discusses the remaining issues in the digital watermarking science.
Springer Topics in Signal Processing | 2017
Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales
Recently, System-On-a-Chip (SOC) technology can easily design and implement a full system on a single chip (chipset). In order to consume time and cost for designing SOC, Intellectual Property blocks (IPs) or virtual components are used. This IP designs require significant amount of time and effort to be developed and verified.
Archive | 2017
Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales
Today, digital watermarking technology has emerged as an effective tool for relational databases and eXtensible Mark-up Language (XML) data in order to protect the copyright, detect tamper, trace traitor, and maintain the integrity of the data.
Archive | 2017
Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales
Detection of stepping stones is a famous problem in computer security. In order to hide the identity, Internet attackers broadcast their traffic on multiple hosts known as stepping stones. A common approach to detect these hosts is to observe the pattern of hosts’ entering and leaving the network.
Archive | 2017
Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales
A recent development in communication technology, storage device, and digital recording has created an Internet environment with the ability to distribute, duplicate, obtain, and replicate digital media without any quality lossless.
Mathematical Problems in Engineering | 2017
Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales
There are various techniques for speech watermarking based on modifying the linear prediction coefficients (LPCs); however, the estimated and modified LPCs vary from each other even without attacks. Because line spectral frequency (LSF) has less sensitivity to watermarking than LPC, watermark bits are embedded into the maximum number of LSFs by applying the least significant bit replacement (LSBR) method. To reduce the differences between estimated and modified LPCs, a checking loop is added to minimize the watermark extraction error. Experimental results show that the proposed semifragile speech watermarking method can provide high imperceptibility and that any manipulation of the watermark signal destroys the watermark bits since manipulation changes it to a random stream of bits.