Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Özdemir Çetin is active.

Publication


Featured researches published by Özdemir Çetin.


Computers & Security | 2009

A new steganography algorithm based on color histograms for data embedding into raw video streams

Özdemir Çetin; A. Turan Ozcerit

Steganography, embedding secret data into unsuspected objects, has emerged as a significant sub-discipline of data-embedding methods. While mostly applied to still images in the past, it has become very popular for video streams recently. When steganographic methods are applied to digital video streams, the selection of target pixels, which are used to store the secret data, is especially crucial for an effective and successful-embedding process; if pixels are not selected carefully, undesired spatial and temporal perception problems occur in the stego-video. In this paper, two new steganographic algorithms are proposed utilizing similar histograms and dissimilar histograms. Both algorithms are based on selecting appropriate pixel approaches by focusing on perceptibility and capacity parameters of the cover video. When compared to traditional steganographic techniques, they not only result in improved temporal and spatial perception levels in the stego-video but also offer a relatively high data-embedding capacity.


The Imaging Science Journal | 2012

A blind steganography method based on histograms on video files

Özdemir Çetin; F Akar; A T Ozcerit; M Cakiroglu; C Bayilmis

Abstract Several techniques of data embedding and data hiding have been proposed and developed especially during the last two decades due to continually increasing needs of secure communication. Still image, audio and video files are the most promising digital mediums for steganography applications. However, video files have a vast potential for embedding secret data compared to other alternatives in terms of storage size. Selecting the most appropriate pixels is of great importance in the procedure of embedding secret data into video files. Unsuccessful pixel selection can trigger some negative spatial and/or temporal awareness, which eventually causes an ineffective data embedding process. In this paper, we have proposed and developed an effective blind steganography method, which uses an appropriate pixel selection mechanism, based on histogram techniques. The method we have proposed proves its success by means of perceptibility of the secret data in both spatial and temporal domains.


signal processing and communications applications conference | 2015

Edge dedection application with FPGA based Sobel operator

Ismail Koyuncu; Özdemir Çetin; Ferzan Katırcıoğlu; Murat Tuna

Image processing can be defined as analysis of the images consists of the several steps. The edge detection process that is one of these steps can be performed using a variety of operators. Sobel edge detection operator, is a basic operator, is preferred to use with high noisy images because its corruption is insensible on images. The proposed work presents an edge detection algorithm using Sobel operator based on FPGA architecture. Proposed system is designed using IEEE 754-1985 floating-point standard and VHDL hardware description language. Design is synthesized for Xilinx Virtex-6 FPGA chip with 160 MHz operating frequency. The performance is decreed according chip statistics.


Journal of Medical Systems | 2012

An Analysis Tool to Calculate Permeability Based on the Patlak Method

Özdemir Çetin

Strokes are commonly diagnosed by utilizing images obtained from magnetic resonance imaging (MRI) technology. Nowadays, computer software can play a large role in analyzing these images and arriving at diagnoses quickly and accurately. Additionally, this software can reduce workload for medical personnel and lower misdiagnoses. In this paper a flexible permeability calculation tool called PCT based on the Patlak plot method is presented. Using the PCT we can calculate the permeability co-efficient of the Blood-Brain Barrier (BBB) function. The PCT tool offers both manual and automatic options for diagnosing the regions of the brain affected by stroke. Moreover, the PCT tool supports various extensions such as dicom, nifty and analyze.


signal processing and communications applications conference | 2011

High secure infrared communication application

Akif Akgul; Özdemir Çetin; Feyzi Akar

In this paper, design and applications are performed to increase security in IR based systems, which can work at high speeds in wireless environment with low costs. Firstly, a new protocol is called SATE is designed instead of standard protocol. After TEA algorithm, which is a block encryption algorithm in symmetric key systems, is added to the system. Finally, a user interface is implemented in the system to prevent unauthorized entries from transmitting circuit. This interface will accept users who are authorized to use system. With this interface administrator can check the user statistics such as usage rates and access times of users, and interfere the system if necessary. Success of SATE protocol is performed according to memory size and performance of work measures and then compared with existing protocols.


Computer Applications in Engineering Education | 2016

Development of a web interface for performing morphological operations on CUDA platform

Ömer Kuşcu; Halit Cetiner; Özdemir Çetin

In order to make use of the performance advantages offered by modern graphics processing units (GPUs), certain image‐processing methods are used on GPU platforms. This study presents a web‐based interface, named cuDO‐Lab, whose capabilities include morphological operations. Different from other similar studies, using this interface, experimental studies can be done on both CPU and GPU platforms. NVIDIA®s Compute Unified Device Architecture (CUDA®) platform was employed to perform GPU operations. Thanks to cuDO‐Lab, students can perform basic morphological operations without paying for licenses or requiring hardware such as CUDA® enabled GPU and software or driver installations. The cuDO‐Lab also offers a responsive web‐user interface, so the laboratory can be accessed from many devices, such as phones, tablets, laptops, and personal computers, with any screen resolution. This offers time savings, ease of use, and access from anywhere.


Archive | 2010

Performance evaluation of scalable encryption algorithm for wireless sensor networks

Cüneyt Bayilmi; Ahmet Turan Özcerit; Özdemir Çetin


Turkish Journal of Electrical Engineering and Computer Sciences | 2014

A web laboratory using MATLAB Builder NE for computer image processing

Sezgin Kaçar; Cüneyt Bayilmiş; Özdemir Çetin


international conference on wireless networks | 2006

A New Data Embedding Method into Motion Pictures.

Ahmet Turan Özcerit; Özdemir Çetin; Murat Çakiroglu


Turkish Journal of Electrical Engineering and Computer Sciences | 2015

A real-time life-care monitoring framework: WarnRed hardware and software design

Gamze Doğali Çetin; Özdemir Çetin; Cüneyt Bayilmiş

Collaboration


Dive into the Özdemir Çetin's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Halit Cetiner

Süleyman Demirel University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Murat Tuna

Kırklareli University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge