- Advanced Steganography and Watermarking Techniques
- Chaos-based Image/Signal Encryption
- Digital Media Forensic Detection
- Particle Detector Development and Performance
- Dark Matter and Cosmic Phenomena
- Particle physics theoretical and experimental studies
- Cellular Automata and Applications
- Astrophysics and Cosmic Phenomena
- Image Retrieval and Classification Techniques
- Microencapsulation and Drying Processes
- Solar and Space Plasma Dynamics
- Biometric Identification and Security
- Particle Accelerators and Free-Electron Lasers
- Proteins in Food Systems
- Vehicle License Plate Recognition
- Image and Object Detection Techniques
- Astronomy and Astrophysical Research
- Gamma-ray bursts and supernovae
- Handwritten Text Recognition Techniques
- Adaptive optics and wavefront sensing
- Opportunistic and Delay-Tolerant Networks
- Long-Term Effects of COVID-19
- Cosmology and Gravitation Theories
- Food Chemistry and Fat Analysis
- Caching and Content Delivery
Nottingham University Hospitals NHS Trust
2024
University of Nottingham
2024
International Hellenic University
2022
Aristotle University of Thessaloniki
2002-2020
Technological Educational Institute of Central Macedonia
2007-2019
Hellenic Agency for Local Development and Local Government
2018
Information Technology Institute
2008
General Hospital of Serres
2008
University of Minnesota
1996
Hypothetical axionlike particles with a two-photon interaction would be produced in the sun by Primakoff process. In laboratory magnetic field ("axion helioscope"), they transformed into x-rays energies of few keV. Using decommissioned Large Hadron Collider test magnet, CERN Axion Solar Telescope ran for about 6 months during 2003. The first results from analysis these data are presented here. No signal above background was observed, implying an upper limit to axion-photon coupling...
We introduce a novel method for embedding and detecting chaotic watermark in the digital spatial image domain, based on segmenting locating regions that are robust to several manipulations. The robustness of is confirmed by experimental results display immunity embedded kinds attacks, such as compression, filtering, scaling, cropping, rotation.
A novel technique for data hiding in JPEG images is proposed. The relies on modification of zero quantised coefficients each image block, contrast to most previously proposed methods which also affect non‐zero and/or the quantisation tables. Both embedding and extraction are performed a per‐block basis, without need preprocess whole image. provides significantly lower distortion similar capacity, compared with recent state‐of‐the‐art techniques.
ABSTRACT The polymer science approach can be applied to the understanding of physical changes in foods such as loss texture upon moisture gain. glass transition temperature (T g ) a commercial cracker was measured by Dynamic Mechanical Thermal Analysis (DMTA) function water content. final state diagram showed that plasticized with decreased content increased. When compared published data on cereal ingredients, gluten may main component responsible for mechanical and crispness products when is
A benchmarking system for watermarking algorithms is described. The proposed can be used to evaluate the performance of methods copyright protection, authentication, fingerprinting, etc. Although described image watermarking, general framework used, by introducing a different set attacks, video and audio data.
We introduce a novel method for embedding and detecting chaotic watermark in the digital spatial domain of color facial images, based on localizing salient features. These features define certain area which is embedded detected. An assessment watermarking robustness done experimentally, by testing resistance to several attacks, such as compression, filtering, noise addition, scaling, cropping rotation.
A thorough investigation on all possible scenarios where digital imperceptible watermarking is applicable presented. All previously proposed schemes fall to at least one of the referenced application categories. Possible attacks are divided into categories and presented, always referring parameters involved.
In this paper, theoretical performance analysis of watermarking schemes based on correlation detection is undertaken, leading to a number important observations the system performance. Statistical properties watermark sequences generated by piecewise-linear Markov maps are investigated. Correlation/spectral such easily controllable, which fact that reflects A family chaotic maps, namely skew tent map family, used verify analysis. Skew compared against widely pseudorandom sequences,...
The current paper presents a method for image watermarking based on chaotic sequences produced by different functions. effect of embedding watermark an is examined. Extensive experimental results JPEG and filtering attacks images watermarked the functions are presented together with comparative study them. show that efficient methods chaos can be designed under certain conditions.
The purpose of this article is to present a novel method for region based image watermarking that can tolerate local distortions substantially greater extent than existing methods. first stage the relies on computing normalized version original using moments. next step extract set feature points will act as centers watermark embedding areas. Four different extraction techniques are tested: Radial Symmetry Transform (RST), scale-invariant transform (SIFT), speeded up robust features (SURF)...
A Mark III DMTA (Polymer Laboratories, Loughborough, U.K.) was used to measure the glass transition temperatures (T g) of a commercial cracker and its dough, each equilibrated various water activities covering range 0.11–0.75 for 0.11–0.90 dough. measures change in elastic modulus (E′) loss (E″), as well that tanδ (E″/E′), with temperature. The temperature two systems followed pattern similar found complex food polymers (gluten, amylopectin), withT g decreasing moisture content increased....
In this paper, statistical analysis of watermarking schemes based on correlation detection is presented. Statistical properties watermark sequences generated by piecewise-linear Markov maps are exploited, resulting in superior reliability. Correlation/spectral such easily controllable, a fact that reflects the system performance.
A novel technique for image watermarking aiming at robustness against geometrical attacks is proposed in the current paper. The first stage relies on computing a normalized version of original using moments. radial symmetry transform then applied to image, followed by non-maxima suppression step. feature points extracted this way act as centers area where watermark be embedded. To minimize distortion, we embed inversely (initially formed DCT domain) image. detection process consists...