Shahrokh Ghaemmaghami

Learn More
In this paper we propose a novel approach to insertion of watermark in the video sequences. The proposed scheme is based on visual cryptography and performs temporal scrambling for watermark embedding. Watermark, which may be a visible logo, is frequently split and inserted into video frames. Watermark detection can be verified by the human eye. Inserted(More)
A new high capacity method for transform domain image steganography is introduced in this paper. The proposed steganography algorithm works on the wavelet transform coefficients of the original image to embed the secret data. As compared to current transform domain data hiding methods, this scheme can provide a larger capacity for data hiding without(More)
This paper addresses a new approach to the keyframe extraction problem employing generalized Gaussian density (GGD) parameters of wavelet transform subbands along with Kullback-Leibler distance (KLD) measurement. Shot and cluster boundaries are selected using KLDs between GGD feature vectors, and then keyframes are located based on similarity and(More)
With rapid proliferation of affordable video capturing devices and state-of-the-art video editing software tools, it is now easier than ever to manipulate video contents. In this paper a passive method for copy/move video forgery detection in MPEG videos is proposed. The method first divides each video frame into suspicious and apparently innocent parts.(More)
In this paper, we present a novel speech steganography method using discrete wavelet transform and sparse decomposition to address the undetectability concern in speech steganography. The proposed speech steganography method exploits the sparse representation to embed secret messages into higher semantic levels of the cover signal, resulting in increased(More)
Transparent, robust watermarking schemes tend to insert invisible watermarks with the highest possible energy. Singular values, in singular value decomposition (SVD), are shown to be robust to intentional and unintentional attacks. However, none of the algorithms proposed in the literature considered the visual imperceptibility constraint imposed by the(More)