Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Türker Tuncer is active.

Publication


Featured researches published by Türker Tuncer.


Advances in Engineering Software | 2011

A robust color image watermarking with Singular Value Decomposition method

Sengul Dogan; Türker Tuncer; Engin Avci; Arif Gülten

The performance of a watermarking method based on Singular Value Decomposition (SVD) has been improved for color image in this paper. One of the common methods used for hiding information on image files is Singular Value Decomposition method which used in the frequency domain. In Singular Value Decomposition based watermarking techniques; watermark embedding can usually be achieved by modifying the least significant bits of the singular value matrix. This paper gives application results which show the watermarking security of using this algorithm for the watermarking and demonstrate the accuracy of these methods. The performance comparison of the algorithms was also realized.


Displays | 2016

A reversible data hiding algorithm based on probabilistic DNA-XOR secret sharing scheme for color images

Türker Tuncer; Engin Avci

Abstract In this paper, a new data hiding method is proposed based on secret sharing scheme with the DNA exclusive or (DNA-XOR) operator for color images. The DNA-XOR secret sharing scheme uses a DNA-XOR truth table. Each input value of truth table is evaluated and according to that evaluation, highest PSNR (Peak Signal-to-Noise Ratio) value is selected for secret sharing. These selected values are embedded into cover image. Cover image is used as an encryption key in the proposed secret sharing process. In this study, the hidden data are divided into three secret shares and embedded into the red, green and blue channels of a cover image respectively. In here, the DNA-XOR operator has been firstly used as secret sharing operator in data hiding literature. Our proposed data hiding method was compared with previous methods. The comparison of these methods shows that our proposed method gives the most successful result.


Journal of Medical Systems | 2012

A New Watermarking System Based on Discrete Cosine Transform (DCT) in Color Biometric Images

Sengul Dogan; Türker Tuncer; Engin Avci; Arif Gülten

This paper recommend a biometric color images hiding approach An Watermarking System based on Discrete Cosine Transform (DCT), which is used to protect the security and integrity of transmitted biometric color images. Watermarking is a very important hiding information (audio, video, color image, gray image) technique. It is commonly used on digital objects together with the developing technology in the last few years. One of the common methods used for hiding information on image files is DCT method which used in the frequency domain. In this study, DCT methods in order to embed watermark data into face images, without corrupting their features.


signal processing and communications applications conference | 2015

A new method for object detection from binary images

Türker Tuncer; Engin Avci; Resul Coteli

There could be one or more objects in an image. Object detection algorithms are needed to detect these objects. Many methods have been proposed for the detection of objects. These methods are based on various feature extraction methods. In this study, a new algorithm is proposed for the detection of objects. The proposed method is object detection model based on thresholding. In this model, image is firstly converted into binary form and coordinates points of the object on the image are determined. The detected objects are determined by using these coordinate points of the object on the image are determined and the desired object is extracted.


advances in information technology | 2013

A Watermarking Application for Authentication of Holy Quran

Türker Tuncer; Fatih Ertam; Engin Avci

Nowadays, with the development of technology transfer to the information transmitted safely started to carry more importance to reach the desired aim. The science of information security is composed of steganography, watermarking, cryptography and authentication. Steganography is one of the subset of information security. In steganography objective data on the desired data to hide any cover. Thus, a computer file that appears cover data and data can be transmitted to the recipient in a hidden way. Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. In this study, the fragile watermarking techniques will use pages of the Quran by using steganography methods. Our aim is to authenticate the raffle and to prevent the unauthorized distribution of printed or modified in establishing the digital samples. XOR, LSB and Border watermarking techniques will be used. The success rates of these techniques, PSNR will be analyzed according to the ratio.


Multimedia Tools and Applications | 2018

A probabilistic image authentication method based on chaos

Türker Tuncer

Fragile watermarking methods have been used as active image authentication methods. These methods must have capabilities like high capacity, high visual quality, high image authentication ability and image recovery capability. Many of the fragile watermarking methods suggested in the literature do not provide all of these capabilities. In this article, a new probabilistic image authentication method with high capacity, high visual quality, high image authenticity ability and image recovery capability is proposed. Chaotic pseudo random number generators, a new watermark generation network which similar to neural network, modulo based watermark embedding functions, modulo based watermark extraction functions, tamper detection algorithm and perceptual hash based image recovery algorithm are utilized for creating a new probabilistic image authentication method in this article. The proposed method is a block based authentication method and 3 × 3 size of overlapping neighborhood blocks are used in this method. The proposed watermark generation network uses symmetric pixels as inputs and weights to generate predicted pixel. In this step, modulo operator and random numbers are used for calculating embeddable value. Owing to chaotic random number generator, the proposed method gains probabilistic and nonlinear structure. To generate random number, logistic map is used as random number generator in the proposed image watermarking method. Then, a modulo based watermark embedding function is used for embedding embeddable value (generated watermark). In the watermark extraction step, modulo operator is used. If the predicted value differs from the extracted value, tamper detection is performed. Otherwise, image authentication is success. A new image recovery algorithm is proposed in this method. This algorithm provides image recovery for tampered areas with high visual quality. The proposed image watermarking method can authenticate grayscale and color images. The experimental results demonstrated that, the proposed method has high payload capacity, high visual quality and high image authentication ability.


2017 International Conference on Computer Science and Engineering (UBMK) | 2017

A novel bit based reversible image watermarking method

Türker Tuncer; Fatih Özyurt; Engin Avci

Digital image watermarking methods are one of the mostly used methods for copyright protection and image content authentication. In this article, a new bit-based reversible digital image watermarking method (BB-RIW) is proposed for authentication in images. The proposed BB-RIW method consists of identifying the pixels to be stigmatized, generating the stamp, embedding the stamp, stamping, and image recovery. In the BB-RIW method, pixel bits belong to three groups: the most significant bits (MSBs), the middle bits (MBs) and the least significant bits (LSBs). In 8 bit images, 2 MSB, 4 OB and 2 LSB are used. Logical operations are performed on the MBs to check whether they are equal to 2 LSBs. If there is an equality, 2MSBs are embedded in 2LSBs of pixels. The positions of the matching pixels are recorded in the key. The key and mode 4 operator are used to stamp. In the image recovery phase, image recovery is performed using the key and MBs. Capacity and visual quality were used to assess the performance of the BB-RIW method. Experimental results show that the BB-RIW method can be used in many fields such as military and medical applications.


2017 International Conference on Computer Science and Engineering (UBMK) | 2017

The importance of standardization in biometric data for digital forensics

Semih Ulupinar; Sengul Dogan; Erhan Akbal; Türker Tuncer

Digital forensics is a multi-disciplinary science area that sets standards for the collection, storage, compilation and analysis of electronic data. To evaluate data in judicial information, the evidence must have certain standards. The evidence includes many types of data such as audio, video and text that exist in electronic devices. Especially biometric data that contain specific information about the person have a large share in assessing cases in the field of digital forensics. In this paper, standardization process of biometric data is presented. At the same time, the standardization of biometric data has been examined in terms of digital forensics.


2017 International Artificial Intelligence and Data Processing Symposium (IDAP) | 2017

Akilli telefonlar için geliştirilmiş hafif siklet veri gizleme uygulamasi

Veysel Gunduzalp; Türker Tuncer; Adli Bilisim Muhendisligi; Mustafa Ulas; Yazilim Muhendisligi; Engin Avci

Nowadays, the using of smartphones has expeditiously increased. The developing of information security applications for smartphones becomes important because of the fact that a clear majority of individuals informations accupy in smartphones. For this reason the developing of ligeweight information security applications becomes vitally important. In this study, a data-hiding schema that runs speedly and whose availability is high is suggested for smartphones. Data-hiding schema should be high capacity, speedy and safe is prioritised.


Gazi Üniversitesi Mühendislik-Mimarlık Fakültesi Dergisi | 2016

GÖKTÜRK ALFABESİ TABANLI GÖRSEL SIR PAYLAŞIMI METODU İLE VERİ GİZLEME UYGULAMASI

Türker Tuncer; Engin Avci

Imgelerin icerigini korumak bircok gorsel sir paylasimi metodu onerilmistir. Bu sir paylasimi algoritmalari genellikle gurultu benzeri sir parcalari uretmektedir. Gurultu benzeri imgeler saldirganlarin dikkatini cekmektedir. Bu makalede harf tabanli gorsel sir paylasimi metodu onerilmistir. Gurultu benzeri siyah beyaz piksellerin yerine harfler kullanilmistir ve sir pasrcalari anlamli bir forma donusturulmustur. Bu makalede 38 harften olusan gokturkce kullanilmistir. Sir parcalarinin olusturulmasi icin rastgele sayi ureteclerinden faydalanilmistir. Bu sir parcalarini ortu nesnesinin icerisine gizlemek icin veri gizleme algoritmalarindan kullanilmistir.

Collaboration


Dive into the Türker Tuncer's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge