6 research outputs found

    PSO Based Lossless and Robust Image Watermarking using Integer Wavelet Transform

    Get PDF
    In recent days, the advances in the broadcasting of multimedia contents in digital format motivate to protect this digital multimedia content form illegal use, such as manipulation, duplication and redistribution. However, watermarking algorithms are designed to meet the requirements of different applications, because, various applications have various requirements. This paper intends to design a new watermarking algorithm with an aim of provision of a tradeoff between the robustness and imperceptibility and also to reduce the information loss. This approach applies Integer Wavelet Transform (IWT) instead of conventional floating point wavelet transforms which are having main drawback of round of error. Then the most popular artificial intelligence technique, particle swarm optimization (PSO) used for optimization of watermarking strength. The strength of watermarking technique is directly related to the watermarking constant alpha. The PSO optimizes alpha values such that, the proposed approach achieves better robustness over various attacks and an also efficient imperceptibility. Numerous experiments are conducted over the proposed approach to evaluate the performance. The obtained experimental results demonstrates that the proposed approach is superior compared to conventional approach and is able to provide efficient resistance over Gaussian noise, sal

    Development of Coordinated Methodologies for Modeling CO2-Containing Systems in Petroleum Industry.

    Get PDF
    Masters Degree. University of KwaZulu-Natal, Durban.Clathrate hydrates formation in natural gas processing facilities or transportation pipelines may lead to process and/or safety hazards. On the other hand, a number of applications are suggested on the basis of promoting the gas hydrate formation. Some researchers have investigated separation and purification processes through gas hydrate crystallization technology. Some works report that the hydrate formation is applicable to the gas transportation and storage. Gas hydrate concept is also studied as a potential method for CO2 capture and/or sequestration. Water desalination/sweetening, and refrigeration and air conditioning systems are other proposed uses of hydrates phenomenon. In the realm of food processing and engineering, several studies have been done investigating the application of gas hydrate technology as an alternative to the conventional processes. Accurate knowledge of phase equilibria of clathrate hydrates is crucial for preventing or utilizing the hydrates. It is believed that energy production or extraction from different fossil fuels is responsible for considerable emissions of CO2, as an important greenhouse gas, into the atmosphere. Furthermore, CO2 removal from the streams of natural gas is important for enhancing the gaseous streams’ heating value. Employment of solvent-based processes and technologies for removing the CO2 is a widely employed approach in practical applications. Amine-based or pure amine solutions are the most common choice to remove the produced CO2 in numerous carbon capture systems. Further to the above, ionic liquids (ILs) are capable to be utilized to capture CO2 from industrial streams. Other potential solvent are sodium piperazine (PZ) and glycinate (SG) solutions. Equilibrium absorption of carbon dioxide in the aqueous phase is a key parameter in any solvent-based CO2 capture process designing. The captured CO2, then, can be injected into the hydrocarbon reservoirs. In addition to the fact that injection of CO2 into potential sources is one of the most reliable methodologies for enhanced hydrocarbon recovery, utilizing this process in conjunction with the CO2 capture systems mitigates the greenhouse effects of CO2. One of the most significant variables determining the success of CO2 injection is known to be the minimum miscibility pressure (MMP) of CO2-reservoir oil. This research study concerns implementation of computer-based methodologies called artificial neural networks (ANNs), classification and regression trees (CARTs)/AdaBoost-CART, adaptive neuro-fuzzy inference systems (ANFISs) and least squares support vector machines (LSSVMs) for modeling: (a) phase equilibria of clathrate hydrates in: 1- pure water, 2- aqueous solutions of salts and/or alcohols, and 3- ILs, (b) phase equilibria (equilibrium) of hydrates of methane in ILs; (c) equilibrium absorption of CO2 in amine-based solutions, ILs, PZ solutions, and SG solutions; and (d) MMP of CO2-reservoir oil. To this end, related experimental data have been gathered from the literature. Performing error analysis, the performance of the developed models in representing/ estimating the independent parameter has been assessed. For the studied hydrate systems, the developed ANFIS, LSSVM, ANN and AdaBoost-CART models show the average absolute relative deviation percent (AARD%) of 0.04-1.09, 0.09-1.01, 0.05-0.81, and 0.03-0.07, respectively. In the case of hydrate+ILs, error analysis of the ANFIS, ANN, LSSVM, and CART models showed 0.31, 0.15, 0.08, and 0.10 AARD% of the results from the corresponding experimental values. Employing the collected experimental data for carbon dioxide (CO2) absorption in amine-based solutions, the presented models based on ANFIS, ANN, LSSVM, and AdaBoost-CART methods regenerated the targets with AARD%s between 2.06 and 3.69, 3.92 and 8.73, 4.95 and 6.52, and 0.51 and 2.76, respectively. For the investigated CO2+IL systems, the best results were obtained using CART method as the AARD% found to be 0.04. Amongst other developed models, i.e. ANN, ANFIS, and LSSVM, the LSSVM model provided better results (AARD%=17.17). The proposed AdaBoost-CART tool for the CO2+water+PZ system reproduced the targets with an AARD% of 0.93. On the other hand, LSSVM, ANN, and ANFIS models showed AARD% values equal to 16.23, 18.69, and 15.99, respectively. Considering the CO2+water+SG system, the proposed AdaBoost-CART tool correlated the targets with a low AARD% of 0.89. The developed ANN, ANFIS, and LSSVM showed AARD% of more than 13. For CO2-oil MMP, the proposed AdaBoost-CART model (AARD%=0.39) gives better estimations than the developed ANFIS (AARD%=1.63). These findings revealed the reliability and accuracy of the CART/AdaBoost-CART methodology over other intelligent modeling tools including ANN, ANFIS, and LSSVM

    Extracción y análisis de características para identificación, agrupamiento y modificación de la fuente de imágenes generadas por dispositivos móviles

    Get PDF
    Tesis inédita de la Universidad Complutense de Madrid, Facultad de Informática, Departamento de Ingeniería del Software e Inteligencia Artificial, leída el 02/10/2017.Nowadays, digital images play an important role in our society. The presence of mobile devices with integrated cameras is growing at an unrelenting pace, resulting in the majority of digital images coming from this kind of device. Technological development not only facilitates the generation of these images, but also the malicious manipulation of them. Therefore, it is of interest to have tools that allow the device that has generated a certain digital image to be identified. The digital image source can be identified through the features that the generating device permeates it with during the creation process. In recent years most research on techniques for identifying the source has focused solely on traditional cameras. The forensic analysis techniques of digital images generated by mobile devices are therefore of particular importance since they have specific characteristics which allow for better results, and forensic techniques for digital images generated by another kind of device are often not valid. This thesis provides various contributions in two of the main research lines of forensic analysis, the field of identification techniques and the counter-forensics or attacks on these techniques. In the field of digital image source acquisition identification techniques, both closed and open scenarios are addressed. In closed scenarios, the images whose acquisition source are to be determined belong to a group of devices known a priori. Meanwhile, an open scenario is one in which the images under analysis belong to a set of devices that is not known a priori by the fo rensic analyst. In this case, the objective is not t he concrete image acquisition source identification, but their classification into groups whose images all belong to the same mobile device. The image clustering t echniques are of particular interest in real situations since in many cases the forensic analyst does not know a priori which devices have generated certain images. Firstly, techniques for identifying the device type (computer, scanner or digital camera of the mobile device) or class (make and model) of the image acquisition source in mobile devices are proposed, which are two relevant branches of forensic analysis of mobile device images. An approach based on different types of image features and Support Vector Machine as a classifier is presented. Secondly, a technique for the ident ification in open scenarios that consists of grouping digital images of mobile devices according to the acquisition source is developed, that is to say, a class-grouping of all input images is performed. The proposal is based on the combination of hierarchical grouping and flat grouping using the Sensor Pattern Noise. Lastly, in the area of att acks on forensic t echniques, topics related to the robustness of the image source identificat ion forensic techniques are addressed. For this, two new algorithms based on the sensor noise and the wavelet transform are designed, one for the destruction of t he image identity and another for its fo rgery. Results obtained by the two algorithms were compared with other tools designed for the same purpose. It is worth mentioning that the solution presented in this work requires less amount and complexity of input data than the tools to which it was compared. Finally, these identification t echniques have been included in a tool for the forensic analysis of digital images of mobile devices called Theia. Among the different branches of forensic analysis, Theia focuses mainly on the trustworthy identification of make and model of the mobile camera that generated a given image. All proposed algorithms have been implemented and integrated in Theia thus strengthening its functionality.Actualmente las imágenes digitales desempeñan un papel importante en nuestra sociedad. La presencia de dispositivos móviles con cámaras fotográficas integradas crece a un ritmo imparable, provocando que la mayoría de las imágenes digitales procedan de este tipo de dispositivos. El desarrollo tecnológico no sólo facilita la generación de estas imágenes, sino también la manipulación malintencionada de éstas. Es de interés, por tanto, contar con herramientas que permitan identificar al dispositivo que ha generado una cierta imagen digital. La fuente de una imagen digital se puede identificar a través de los rasgos que el dispositivo que la genera impregna en ella durante su proceso de creación. La mayoría de las investigaciones realizadas en los últimos años sobre técnicas de identificación de la fuente se han enfocado únicamente en las cámaras tradicionales. Las técnicas de análisis forense de imágenes generadas por dispositivos móviles cobran, pues, especial importancia, ya que éstos presentan características específicas que permiten obtener mejores resultados, no siendo válidas muchas veces además las técnicas forenses para imágenes digitales generadas por otros tipos de dispositivos. La presente Tesis aporta diversas contribuciones en dos de las principales líneas del análisis forense: el campo de las t écnicas de identificación de la fuente de adquisición de imágenes digitales y las contramedidas o at aques a est as técnicas. En el primer campo se abordan tanto los escenarios cerrados como los abiertos. En el escenario denominado cerrado las imágenes cuya fuente de adquisición hay que determinar pertenecen a un grupo de dispositivos conocidos a priori. Por su parte, un escenario abierto es aquel en el que las imágenes pertenecen a un conjunto de dispositivos que no es conocido a priori por el analista forense. En este caso el obj etivo no es la identificación concreta de la fuente de adquisición de las imágenes, sino su clasificación en grupos cuyas imágenes pertenecen todas al mismo dispositivo móvil. Las técnicas de agrupamiento de imágenes son de gran interés en situaciones reales, ya que en muchos casos el analist a forense desconoce a priori cuáles son los dispositivos que generaron las imágenes. En primer lugar se presenta una técnica para la identificación en escenarios cerrados del tipo de dispositivo (computador, escáner o cámara digital de dispositivo móvil) o la marca y modelo de la fuente en dispositivos móviles, que son dos problemáticas relevantes del análisis forense de imágenes digitales. La propuesta muestra un enfoque basado en distintos tipos de características de la imagen y en una clasificación mediante máquinas de soporte vectorial. En segundo lugar se diseña una técnica para la identificación en escenarios abiertos que consiste en el agrupamiento de imágenes digitales de dispositivos móviles según la fuente de adquisición, es decir, se realiza un agrupamiento en clases de todas las imágenes de ent rada. La propuesta combina agrupamiento jerárquico y agrupamiento plano con el uso del patrón de ruido del sensor. Por último, en el área de los ataques a las técnicas fo renses se tratan temas relacionados con la robustez de las técnicas forenses de identificación de la fuente de adquisición de imágenes. Se especifican dos algoritmos basados en el ruido del sensor y en la transformada wavelet ; el primero destruye la identidad de una imagen y el segundo falsifica la misma. Los resultados obtenidos por estos dos algoritmos se comparan con otras herramientas diseñadas para el mismo fin, observándose que la solución aquí presentada requiere de menor cantidad y complejidad de datos de entrada. Finalmente, estas técnicas de identificación han sido incluidas en una herramienta para el análisis forense de imágenes digitales de dispositivos móviles llamada Theia. Entre las diferentes ramas del análisis forense, Theia se centra principalmente en la identificación confiable de la marca y el modelo de la cámara móvil que generó una imagen dada. Todos los algoritmos desarrollados han sido implementados e integrados en Theia, reforzando así su funcionalidad.Depto. de Ingeniería de Software e Inteligencia Artificial (ISIA)Fac. de InformáticaTRUEunpu
    corecore