A. Nikolaidis

ORCID: 0000-0002-8732-4475
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Steganography and Watermarking Techniques
  • Chaos-based Image/Signal Encryption
  • Digital Media Forensic Detection
  • Particle Detector Development and Performance
  • Dark Matter and Cosmic Phenomena
  • Particle physics theoretical and experimental studies
  • Cellular Automata and Applications
  • Astrophysics and Cosmic Phenomena
  • Image Retrieval and Classification Techniques
  • Microencapsulation and Drying Processes
  • Solar and Space Plasma Dynamics
  • Biometric Identification and Security
  • Particle Accelerators and Free-Electron Lasers
  • Proteins in Food Systems
  • Vehicle License Plate Recognition
  • Image and Object Detection Techniques
  • Astronomy and Astrophysical Research
  • Gamma-ray bursts and supernovae
  • Handwritten Text Recognition Techniques
  • Adaptive optics and wavefront sensing
  • Opportunistic and Delay-Tolerant Networks
  • Long-Term Effects of COVID-19
  • Cosmology and Gravitation Theories
  • Food Chemistry and Fat Analysis
  • Caching and Content Delivery

Nottingham University Hospitals NHS Trust
2024

University of Nottingham
2024

International Hellenic University
2022

Aristotle University of Thessaloniki
2002-2020

Technological Educational Institute of Central Macedonia
2007-2019

Hellenic Agency for Local Development and Local Government
2018

Information Technology Institute
2008

General Hospital of Serres
2008

University of Minnesota
1996

Hypothetical axionlike particles with a two-photon interaction would be produced in the sun by Primakoff process. In laboratory magnetic field ("axion helioscope"), they transformed into x-rays energies of few keV. Using decommissioned Large Hadron Collider test magnet, CERN Axion Solar Telescope ran for about 6 months during 2003. The first results from analysis these data are presented here. No signal above background was observed, implying an upper limit to axion-photon coupling...

10.1103/physrevlett.94.121301 article EN Physical Review Letters 2005-04-01

10.1016/s0031-3203(99)00176-4 article EN Pattern Recognition 2000-11-01

We introduce a novel method for embedding and detecting chaotic watermark in the digital spatial image domain, based on segmenting locating regions that are robust to several manipulations. The robustness of is confirmed by experimental results display immunity embedded kinds attacks, such as compression, filtering, scaling, cropping, rotation.

10.1109/83.967400 article EN IEEE Transactions on Image Processing 2001-01-01

A novel technique for data hiding in JPEG images is proposed. The relies on modification of zero quantised coefficients each image block, contrast to most previously proposed methods which also affect non‐zero and/or the quantisation tables. Both embedding and extraction are performed a per‐block basis, without need preprocess whole image. provides significantly lower distortion similar capacity, compared with recent state‐of‐the‐art techniques.

10.1049/iet-ipr.2014.0689 article EN IET Image Processing 2015-03-27

ABSTRACT The polymer science approach can be applied to the understanding of physical changes in foods such as loss texture upon moisture gain. glass transition temperature (T g ) a commercial cracker was measured by Dynamic Mechanical Thermal Analysis (DMTA) function water content. final state diagram showed that plasticized with decreased content increased. When compared published data on cereal ingredients, gluten may main component responsible for mechanical and crispness products when is

10.1111/j.1365-2621.1996.tb12206.x article EN Journal of Food Science 1996-07-01

A benchmarking system for watermarking algorithms is described. The proposed can be used to evaluate the performance of methods copyright protection, authentication, fingerprinting, etc. Although described image watermarking, general framework used, by introducing a different set attacks, video and audio data.

10.1109/icip.2001.958300 article EN 2002-11-13

We introduce a novel method for embedding and detecting chaotic watermark in the digital spatial domain of color facial images, based on localizing salient features. These features define certain area which is embedded detected. An assessment watermarking robustness done experimentally, by testing resistance to several attacks, such as compression, filtering, noise addition, scaling, cropping rotation.

10.1109/6046.865482 article EN IEEE Transactions on Multimedia 2000-01-01

A thorough investigation on all possible scenarios where digital imperceptible watermarking is applicable presented. All previously proposed schemes fall to at least one of the referenced application categories. Possible attacks are divided into categories and presented, always referring parameters involved.

10.1109/icip.2001.958292 article EN 2002-11-13

In this paper, theoretical performance analysis of watermarking schemes based on correlation detection is undertaken, leading to a number important observations the system performance. Statistical properties watermark sequences generated by piecewise-linear Markov maps are investigated. Correlation/spectral such easily controllable, which fact that reflects A family chaotic maps, namely skew tent map family, used verify analysis. Skew compared against widely pseudorandom sequences,...

10.1109/tsp.2003.811245 article EN IEEE Transactions on Signal Processing 2003-06-23

The current paper presents a method for image watermarking based on chaotic sequences produced by different functions. effect of embedding watermark an is examined. Extensive experimental results JPEG and filtering attacks images watermarked the functions are presented together with comparative study them. show that efficient methods chaos can be designed under certain conditions.

10.1109/iscas.2000.857483 article EN 2002-11-07

10.1007/s11042-014-2377-4 article EN Multimedia Tools and Applications 2014-11-25

The purpose of this article is to present a novel method for region based image watermarking that can tolerate local distortions substantially greater extent than existing methods. first stage the relies on computing normalized version original using moments. next step extract set feature points will act as centers watermark embedding areas. Four different extraction techniques are tested: Radial Symmetry Transform (RST), scale-invariant transform (SIFT), speeded up robust features (SURF)...

10.1186/1687-6180-2012-97 article EN cc-by EURASIP Journal on Advances in Signal Processing 2012-05-02

A Mark III DMTA (Polymer Laboratories, Loughborough, U.K.) was used to measure the glass transition temperatures (T g) of a commercial cracker and its dough, each equilibrated various water activities covering range 0.11–0.75 for 0.11–0.90 dough. measures change in elastic modulus (E′) loss (E″), as well that tanδ (E″/E′), with temperature. The temperature two systems followed pattern similar found complex food polymers (gluten, amylopectin), withT g decreasing moisture content increased....

10.1007/bf01992830 article EN Journal of thermal analysis 1996-11-01

In this paper, statistical analysis of watermarking schemes based on correlation detection is presented. Statistical properties watermark sequences generated by piecewise-linear Markov maps are exploited, resulting in superior reliability. Correlation/spectral such easily controllable, a fact that reflects the system performance.

10.1109/iscas.2001.921005 article EN 2002-11-13

A novel technique for image watermarking aiming at robustness against geometrical attacks is proposed in the current paper. The first stage relies on computing a normalized version of original using moments. radial symmetry transform then applied to image, followed by non-maxima suppression step. feature points extracted this way act as centers area where watermark be embedded. To minimize distortion, we embed inversely (initially formed DCT domain) image. detection process consists...

10.1109/icip.2011.6116233 article EN 2011-09-01
Coming Soon ...