Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–6 of 6 results for author: Taherinia, A H

.
  1. arXiv:2312.01351  [pdf

    eess.IV cs.CV

    Deep learning and traditional-based CAD schemes for the pulmonary embolism diagnosis: A survey

    Authors: Seyed Hesamoddin Hosseini, Amir Hossein Taherinia, Mahdi Saadatmand

    Abstract: Nowadays, pulmonary Computed Tomography Angiography (CTA) is the main tool for detecting Pulmonary Embolism (PE). However, manual interpretation of CTA volume requires a radiologist, which is time-consuming and error-prone due to the specific conditions of lung tissue, large volume of data, lack of experience, and eye fatigue. Therefore, Computer-Aided Design (CAD) systems are used as a second opi… ▽ More

    Submitted 3 December, 2023; originally announced December 2023.

    Comments: 22 pages, 6 figures, 5 tables

  2. arXiv:2005.03382  [pdf, other

    cs.CR cs.CV cs.NE

    WSMN: An optimized multipurpose blind watermarking in Shearlet domain using MLP and NSGA-II

    Authors: Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Ahad Harati, Modjtaba Rouhani

    Abstract: Digital watermarking is a remarkable issue in the field of information security to avoid the misuse of images in multimedia networks. Although access to unauthorized persons can be prevented through cryptography, it cannot be simultaneously used for copyright protection or content authentication with the preservation of image integrity. Hence, this paper presents an optimized multipurpose blind wa… ▽ More

    Submitted 7 May, 2020; originally announced May 2020.

  3. arXiv:1804.11240  [pdf, other

    cs.MM

    A blind robust watermarking method based on Arnold Cat map and amplified pseudo-noise strings with weak correlation

    Authors: Seyyed Hossein Soleymani, Amir Hossein Taherinia, Amir Hossein Mohajerzadeh

    Abstract: In this paper, a robust and blind watermarking method is proposed, which is highly resistant to the common image watermarking attacks, such as noises, compression, and image quality enhancement processing. In this method, Arnold Cat map is used as a pre-processing on the host image, which increases the security and imperceptibility of embedding watermark bits with a strong gain factor. Moreover, t… ▽ More

    Submitted 30 March, 2018; originally announced April 2018.

  4. arXiv:1803.11286  [pdf, other

    cs.MM

    High Capacity Image Data Hiding of Scanned Text Documents Using Improved Quadtree

    Authors: Seyyed Hossein Soleymani, Amir Hossein Taherinia

    Abstract: In this paper, an effective method was introduced to steganography of text document in the host image. In the available steganography methods, the message has a random form. Therefore, the embedding capacity is generally low. In the proposed method, the main underlying idea was the sparse property of scanned documents. The scanned documents were converted from gray-level form to binary values by h… ▽ More

    Submitted 29 March, 2018; originally announced March 2018.

  5. arXiv:1803.02623  [pdf, other

    cs.CR cs.CV cs.MM

    TRLG: Fragile blind quad watermarking for image tamper detection and recovery by providing compact digests with quality optimized using LWT and GA

    Authors: Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Amir Hossein Mohajerzadeh

    Abstract: In this paper, an efficient fragile blind quad watermarking scheme for image tamper detection and recovery based on lifting wavelet transform and genetic algorithm is proposed. TRLG generates four compact digests with super quality based on lifting wavelet transform and halftoning technique by distinguishing the types of image blocks. In other words, for each 2*2 non-overlap blocks, four chances f… ▽ More

    Submitted 7 March, 2018; originally announced March 2018.

  6. arXiv:1802.07119  [pdf, other

    cs.CR cs.MM

    TRLF: An Effective Semi-fragile Watermarking Method for Tamper Detection and Recovery based on LWT and FNN

    Authors: Behrouz Bolourian Haghighi, Amir Hossein Taherinia, Reza Monsefi

    Abstract: This paper proposes a novel method for tamper detection and recovery using semi-fragile data hiding, based on Lifting Wavelet Transform (LWT) and Feed-Forward Neural Network (FNN). In TRLF, first, the host image is decomposed up to one level using LWT, and the Discrete Cosine Transform (DCT) is applied to each 2*2 blocks of diagonal details. Next, a random binary sequence is embedded in each block… ▽ More

    Submitted 18 February, 2018; originally announced February 2018.