Özdemir Çetin
Sakarya University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Özdemir Çetin.
Computers & Security | 2009
Özdemir Çetin; A. Turan Ozcerit
Steganography, embedding secret data into unsuspected objects, has emerged as a significant sub-discipline of data-embedding methods. While mostly applied to still images in the past, it has become very popular for video streams recently. When steganographic methods are applied to digital video streams, the selection of target pixels, which are used to store the secret data, is especially crucial for an effective and successful-embedding process; if pixels are not selected carefully, undesired spatial and temporal perception problems occur in the stego-video. In this paper, two new steganographic algorithms are proposed utilizing similar histograms and dissimilar histograms. Both algorithms are based on selecting appropriate pixel approaches by focusing on perceptibility and capacity parameters of the cover video. When compared to traditional steganographic techniques, they not only result in improved temporal and spatial perception levels in the stego-video but also offer a relatively high data-embedding capacity.
The Imaging Science Journal | 2012
Özdemir Çetin; F Akar; A T Ozcerit; M Cakiroglu; C Bayilmis
Abstract Several techniques of data embedding and data hiding have been proposed and developed especially during the last two decades due to continually increasing needs of secure communication. Still image, audio and video files are the most promising digital mediums for steganography applications. However, video files have a vast potential for embedding secret data compared to other alternatives in terms of storage size. Selecting the most appropriate pixels is of great importance in the procedure of embedding secret data into video files. Unsuccessful pixel selection can trigger some negative spatial and/or temporal awareness, which eventually causes an ineffective data embedding process. In this paper, we have proposed and developed an effective blind steganography method, which uses an appropriate pixel selection mechanism, based on histogram techniques. The method we have proposed proves its success by means of perceptibility of the secret data in both spatial and temporal domains.
signal processing and communications applications conference | 2015
Ismail Koyuncu; Özdemir Çetin; Ferzan Katırcıoğlu; Murat Tuna
Image processing can be defined as analysis of the images consists of the several steps. The edge detection process that is one of these steps can be performed using a variety of operators. Sobel edge detection operator, is a basic operator, is preferred to use with high noisy images because its corruption is insensible on images. The proposed work presents an edge detection algorithm using Sobel operator based on FPGA architecture. Proposed system is designed using IEEE 754-1985 floating-point standard and VHDL hardware description language. Design is synthesized for Xilinx Virtex-6 FPGA chip with 160 MHz operating frequency. The performance is decreed according chip statistics.
Journal of Medical Systems | 2012
Özdemir Çetin
Strokes are commonly diagnosed by utilizing images obtained from magnetic resonance imaging (MRI) technology. Nowadays, computer software can play a large role in analyzing these images and arriving at diagnoses quickly and accurately. Additionally, this software can reduce workload for medical personnel and lower misdiagnoses. In this paper a flexible permeability calculation tool called PCT based on the Patlak plot method is presented. Using the PCT we can calculate the permeability co-efficient of the Blood-Brain Barrier (BBB) function. The PCT tool offers both manual and automatic options for diagnosing the regions of the brain affected by stroke. Moreover, the PCT tool supports various extensions such as dicom, nifty and analyze.
signal processing and communications applications conference | 2011
Akif Akgul; Özdemir Çetin; Feyzi Akar
In this paper, design and applications are performed to increase security in IR based systems, which can work at high speeds in wireless environment with low costs. Firstly, a new protocol is called SATE is designed instead of standard protocol. After TEA algorithm, which is a block encryption algorithm in symmetric key systems, is added to the system. Finally, a user interface is implemented in the system to prevent unauthorized entries from transmitting circuit. This interface will accept users who are authorized to use system. With this interface administrator can check the user statistics such as usage rates and access times of users, and interfere the system if necessary. Success of SATE protocol is performed according to memory size and performance of work measures and then compared with existing protocols.
Computer Applications in Engineering Education | 2016
Ömer Kuşcu; Halit Cetiner; Özdemir Çetin
In order to make use of the performance advantages offered by modern graphics processing units (GPUs), certain image‐processing methods are used on GPU platforms. This study presents a web‐based interface, named cuDO‐Lab, whose capabilities include morphological operations. Different from other similar studies, using this interface, experimental studies can be done on both CPU and GPU platforms. NVIDIA®s Compute Unified Device Architecture (CUDA®) platform was employed to perform GPU operations. Thanks to cuDO‐Lab, students can perform basic morphological operations without paying for licenses or requiring hardware such as CUDA® enabled GPU and software or driver installations. The cuDO‐Lab also offers a responsive web‐user interface, so the laboratory can be accessed from many devices, such as phones, tablets, laptops, and personal computers, with any screen resolution. This offers time savings, ease of use, and access from anywhere.
Archive | 2010
Cüneyt Bayilmi; Ahmet Turan Özcerit; Özdemir Çetin
Turkish Journal of Electrical Engineering and Computer Sciences | 2014
Sezgin Kaçar; Cüneyt Bayilmiş; Özdemir Çetin
international conference on wireless networks | 2006
Ahmet Turan Özcerit; Özdemir Çetin; Murat Çakiroglu
Turkish Journal of Electrical Engineering and Computer Sciences | 2015
Gamze Doğali Çetin; Özdemir Çetin; Cüneyt Bayilmiş