Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hamurabi Gamboa Rosales is active.

Publication


Featured researches published by Hamurabi Gamboa Rosales.


SpringerPlus | 2016

Enhanced image fusion using directional contrast rules in fuzzy transform domain

Amita Nandal; Hamurabi Gamboa Rosales

In this paper a novel image fusion algorithm based on directional contrast in fuzzy transform (FTR) domain is proposed. Input images to be fused are first divided into several non-overlapping blocks. The components of these sub-blocks are fused using directional contrast based fuzzy fusion rule in FTR domain. The fused sub-blocks are then transformed into original size blocks using inverse-FTR. Further, these inverse transformed blocks are fused according to select maximum based fusion rule for reconstructing the final fused image. The proposed fusion algorithm is both visually and quantitatively compared with other standard and recent fusion algorithms. Experimental results demonstrate that the proposed method generates better results than the other methods.


Springer Topics in Signal Processing | 2017

Natural Language Watermarking

Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales

Nowadays, a mass traffic of Internet is occupied by text data transactions. Because text data is widely distributed, searched, and reused in various applications, it is essential to control the copyright over text as well as other forms of data including video, image, and audio. Semantic and syntactic structures of text are good candidates for embedding watermarks.


Security and Communication Networks | 2017

Optimization of a Blind Speech Watermarking Technique against Amplitude Scaling

Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales

This paper presents a gain invariant speech watermarking technique based on quantization of the Lp-norm. In this scheme, first, the original speech signal is divided into different frames. Second, each frame is divided into two vectors based on odd and even indices. Third, quantization index modulation (QIM) is used to embed the watermark bits into the ratio of the Lp-norm between the odd and even indices. Finally, the Lagrange optimization technique is applied to minimize the embedding distortion. By applying a statistical analytical approach, the embedding distortion and error probability are estimated. Experimental results not only confirm the accuracy of the driven statistical analytical approach but also prove the robustness of the proposed technique against common signal processing attacks.


Springer Topics in Signal Processing | 2017

Three-Dimensional (3D) Watermarking

Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales

Three-dimensional (3D) computer graphic is applied widely in digital archives, video games, entertainment, animation, MPEG-4, and Web3D. 3D watermarking focuses on embedding hidden data in 3D materials. As discussed in Chap. 5, 3D watermarking is very similar to a compression standard that implies watermarks on a sequence of still images [1].


Springer Topics in Signal Processing | 2017

Security Enhancement of Digital Watermarking

Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales

This chapter discusses the security enhancement applications of digital watermarking in various technologies. Furthermore, the combination of watermarking technology with other computer security technologies such as biometric and cryptography is discussed. This chapter discusses the remaining issues in the digital watermarking science.


Springer Topics in Signal Processing | 2017

Hardware IP Watermarking

Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales

Recently, System-On-a-Chip (SOC) technology can easily design and implement a full system on a single chip (chipset). In order to consume time and cost for designing SOC, Intellectual Property blocks (IPs) or virtual components are used. This IP designs require significant amount of time and effort to be developed and verified.


Archive | 2017

Relational Database, XML, and Ontology Watermarking

Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales

Today, digital watermarking technology has emerged as an effective tool for relational databases and eXtensible Mark-up Language (XML) data in order to protect the copyright, detect tamper, trace traitor, and maintain the integrity of the data.


Archive | 2017

Network Stream Watermarking

Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales

Detection of stepping stones is a famous problem in computer security. In order to hide the identity, Internet attackers broadcast their traffic on multiple hosts known as stepping stones. A common approach to detect these hosts is to observe the pattern of hosts’ entering and leaving the network.


Archive | 2017

Preliminary on Watermarking Technology

Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales

A recent development in communication technology, storage device, and digital recording has created an Internet environment with the ability to distribute, duplicate, obtain, and replicate digital media without any quality lossless.


Mathematical Problems in Engineering | 2017

Semifragile Speech Watermarking Based on Least Significant Bit Replacement of Line Spectral Frequencies

Mohammad Ali Nematollahi; Chalee Vorakulpipat; Hamurabi Gamboa Rosales

There are various techniques for speech watermarking based on modifying the linear prediction coefficients (LPCs); however, the estimated and modified LPCs vary from each other even without attacks. Because line spectral frequency (LSF) has less sensitivity to watermarking than LPC, watermark bits are embedded into the maximum number of LSFs by applying the least significant bit replacement (LSBR) method. To reduce the differences between estimated and modified LPCs, a checking loop is added to minimize the watermark extraction error. Experimental results show that the proposed semifragile speech watermarking method can provide high imperceptibility and that any manipulation of the watermark signal destroys the watermark bits since manipulation changes it to a random stream of bits.

Collaboration


Dive into the Hamurabi Gamboa Rosales's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Navneet Upadhyay

Autonomous University of Zacatecas

View shared research outputs
Top Co-Authors

Avatar

Jorge Flores Troncoso

Autonomous University of Zacatecas

View shared research outputs
Top Co-Authors

Avatar

José J. Juarez Salinas

Autonomous University of Zacatecas

View shared research outputs
Top Co-Authors

Avatar

José Rodríguez

Autonomous University of Zacatecas

View shared research outputs
Top Co-Authors

Avatar

Luis Sánchez

Autonomous University of Zacatecas

View shared research outputs
Top Co-Authors

Avatar

Manuel Hernández Calviño

Autonomous University of Zacatecas

View shared research outputs
Top Co-Authors

Avatar

Remberto Sandoval Arechiga

Autonomous University of Zacatecas

View shared research outputs
Researchain Logo
Decentralizing Knowledge