Mustafa Ulutas

Mustafa Ulutas
Karadeniz Technical University · Department of Computer Engineering

PhD

About

80
Publications
10,814
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
777
Citations
Introduction
Skills and Expertise

Publications

Publications (80)
Article
Full-text available
The rapid pace of the digital age has led to an increase in the illegal copying, reproduction, and creation of forgeries of digital images. Copy-move forgery is one of the most common image forgery techniques which is used for tampering with image content. In this paper, a novel scheme is proposed to detect copy-move forgery and if the image is for...
Article
Full-text available
There is an increase in the requirement of digital image authentication in law, journalism, and medicine, even in the industry. Copy move forgery is the most common method of forgery methods which are applied to digital images. The importance of verifying digital images that are used in important areas with real-time systems is increasing. Taking t...
Article
Full-text available
Since digital images are one of the most important carriers of information, their authenticity is quite important. There are miscellaneous forgery techniques for manipulating digital images, and one of those is copy-move forgery. Many forgery detection techniques have been developed for detection of copy-move forgery so far. However, the main lack...
Article
Full-text available
Recently, the rapid development of video editing software has made video forgery applicable. Researchers have proposed methods to detect forged video frames. These methods utilize codec properties, motion artifacts, noise effect and frame similarity to detect forgery. Execution time and low detection accuracy are the two main drawbacks of forgery d...
Article
Full-text available
Nowadays, production and distribution of digital images has become part of our life. Since digital images, which are important carriers of information, are considered as the concrete proofs of facts in many fields and they can be used as evidence in the courts of law, development of techniques to ensure image authenticity is an active research topi...
Article
Full-text available
Duplicated sequence of frames in a video to cover up or replicate a scene is a video forgery. There are methods to authenticate video files, but embedding authentication information into videos requires extra hardware or software. It is possible to detect frame duplication forgery by carefully inspecting the content to discover high correlation amo...
Article
Full-text available
In this study, an adapted Particle Swarm Optimization (PSO) algorithm is proposed for the inverse kinematic solution of the robot that is designed for reduction in fracture treatment with external fixator and it is applied to this robot, which has six degrees of freedom. In the classic PSO algorithm, all of the particles are directed to the searche...
Article
Full-text available
In this article, we propose a new method for the estimation of the force, which is applied by two fractured parts of the bone on each other at the time of contact, while they are brought closer to each other, and the distance between these two bones. The manual alignment operations being applied today in the alignment of fractured bones does not be...
Article
Full-text available
Telemedicine has gained popularity in recent years. Medical images can be transferred over the Internet to enable the telediagnosis between medical staffs and to make the patient's history accessible to medical staff from anywhere. Therefore, integrity protection of the medical image is a serious concern due to the broadcast nature of the Internet....
Article
Full-text available
Up-to-date information is crucial in many fields such as medicine, science, and stock market, where data should be distributed to clients from a centralized database. Shared databases are usually stored in data centers where they are distributed over insecure public access network, the Internet. Sharing may result in a number of problems such as un...
Article
Multimedia devices have become increasingly popular due to high quality and low cost products using advanced technology. These devices can capture multimedia files, which can be modified easily by video editing tools. One of the most frequently encountered forgery types in video forensics is the frame duplication (FD) forgery. Many methods have bee...
Article
Full-text available
Real-time services require reliable and fault tolerant communication networks to support their stringent Quality of Service requirements. Multi Topology Routing based IP Fast Re-route (MT-IPFRR) technologies provide seamless forwarding of IP packets during network failures by constructing virtual topologies (VTs) to re-route the disrupted traffic....
Article
Ensuring authenticity of images has become an important issue recently. Copy move forgery is one of the most common tampering techniques used to modify images. Copy move forgery detection techniques in the literature divide the image into overlapping blocks and use various techniques to extract features from the blocks. Similarity between the featu...
Conference Paper
Real-time services in IP networks require a fast switching of disrupted traffic to alternate paths in case of link/node failures to satisfy their stringent Quality of Service requirements. Multi Topology Routing (MTR) based IP Fast Re-route (IPFRR) technologies rely on virtual topologies to seamlessly forward the IP packets during network failures...
Article
Copy move forgery is one of the most widely used tampering techniques to hide undesirable objects in a scene. Existing techniques to detect such tampering aim to improve the robustness of the methods. A robust method based on the colour moments and colour layout descriptors (CLD) is proposed in this paper. The method divides the image into overlapp...
Article
Previous studies show that topological characteristics in IP networks significantly influence the performance of networking algorithms, which therefore should be systematically analyzed using diverse topologies prior to their deployments. In this paper, we present an elaborate topological dependency analysis of a multi-topology routing-based IP fas...
Chapter
Increase on the availability of the image editing software makes the forgery of the digital image easy. Researchers proposed methods to cope with image authentication in recent years. We proposed a passive image authentication technique to determine the copy move forgery. First, the method divides the image into overlapping blocks. It uses LBP (Loc...
Conference Paper
In recent years, due to the increment in the image editing software applications and the easiness of using these, the probability of malicious changes on the images has also increased. Copy-move forgery is one of the most widely applied modification types on the images. In case of that the copied region is rotated before being pasted, forgery detec...
Conference Paper
Full-text available
Increase on the availability of the image editing software makes digital image forgery serious problem. Researchers proposed methods to cope with image authentication in recent years. We proposed a novel keypoint based passive image authentication technique to determine the copy move forgery. The method extracts the structural texture information f...
Conference Paper
Topological changes in IP networks may signifi- cantly influence the performance of networking algorithms, which therefore should be carefully evaluated using a large topology pool with diverse characteristics. In this paper, we present an automated topology generation and analysis tool to perform an elaborate topological dependency analysis of a M...
Article
The increase in the number of image processing tools to edit digital images and their ease of use have driven the need for image authentication techniques. A technique called Digital Watermarking based on hiding special codes in image has gained popularity among all other authentication techniques. An active research topic is to reconstruct the wat...
Conference Paper
Electroencephalogram (EEG) signals are widely used in many fields such as clinical diagnosis, Brain-Computer Interface, performance measurement and emotion analysis. The most important benefit of EEG signal analysis is to control a device without moving muscles or provide communication. In particular, patients with ALS (Amyotrophic Lateral Sclerosi...
Conference Paper
Full-text available
Özetçe— Son yıllardaki veritabanı uygulamalarının sayısındaki artış, sayısal hakların korunması problemini beraberinde getirmiştir. Çoklu ortam dosyalarındaki hak yönetimi için önerilen algoritmalar, veritabanları üzerinde doğrudan uygulanamamaktadır. Veritabanı damgalama için kullanılan yöntemlerden bazıları, ilişkide yer alan tarih biçimine sahip...
Conference Paper
Full-text available
The increase in the number of image processing tools to edit digital images and their ease of use have driven the need for image authentication techniques. A technique called Digital Watermarking based on hiding special codes in image has gained popularity among all other authentication techniques. An active research topic is to reconstruct the wat...
Conference Paper
Full-text available
In this paper, a technique to classify seven different forearm movements using surface electromyography (sEMG) data which were received from 8 able bodied subjects was proposed. A 2-channel sEMG system was used for data acquisition and recording, then this raw electromyography (EMG) signals were applied to the wavelet denoising. In the next step, t...
Conference Paper
A new method is proposed in this study to identify speakers in a relatively short time without decreasing success ratio. The method first extracts MFCC (Mel Frequency Cepstrum Coefficients) features. Then k-harmonic means is used to cluster samples before classification is performed by the nearest neighbor method. International HYKE database is use...
Conference Paper
Checking authentication of digital images have become a necessity due to ever increasing use in many fields. Passive methods, which make use of image statistics, have gained popularity among researchers lately. Block based authentication methods using feature vectors of subblocks in images can be classified as either spatial or frequency domain. A...
Conference Paper
Full-text available
Thanks to improving technology human life is consistently becoming easier. In points which exceeds human abilities machines come into play and they overcomes they remedy the deficiencies of human. One of the disciplines which must be evaluated in this coverage is manufacturing artificial hand for defective human which can manage with EMG signals. I...
Article
Large number of digital images and videos are acquired, stored, processed and shared nowadays. High quality imaging hardware and low cost, user friendly image editing software make digital mediums vulnerable to modifications. One of the most popular image modification techniques is copy move forgery. This tampering technique copies part of an image...
Conference Paper
Full-text available
Copy move forgery is a popular image tampering technique that copies part of the image onto another region of the same image. Detection is possible by exploring similar regions in an image and based on regional features' similarity. Many feature extraction algorithms are used to extract information from non overlapping blocks of the image. Similar...
Conference Paper
Creation and distribution of digital media has become part of daily life. Digital images are used in many fields but authenticity of an image is needed if it is used as evidence in a courtroom. Thus, development of techniques to ensure image authenticity is an active research topic. Passive methods make use of statistical features of images to judg...
Conference Paper
Increase on the availability of the image editing tools makes it easy to create digital forgeries. More popular forgery in image manipulation is the copy move forgery where part of an image is copied into another location to hide an object. The methods that are used to detect the copy move forgery in images have a drawback. Length of the feature ve...
Conference Paper
Full-text available
Routers in IP networks, which were initially designed to carry data services only, need special protocols to seamlessly carry real-time services such as voice and video. As one of the leading activities in this context, IETF RTGWG working group has been working on standardizing IP Fast Re- Route (IPFRR) protocols which provide a complete alternate...
Conference Paper
Full-text available
To seamlessly support real-time services such as voice and video over next generation IP networks, routers must continue their forwarding tasks in case of link/node failures by limiting the service disruption time to sub-100 ms. IETF Routing Area Working Group (RTGWG) has been working on standardizing IP Fast Reroute (IPFRR) methods with a complete...
Article
Transmission of secret messages or images over the Internet using Shamir’s secret sharing scheme has become popular. Some researchers use steganography with Shamir’s method to hide noise like share images into natural looking cover images to improve secrecy. Stego images are authenticated against accidental or deliberate changes before recovering t...
Conference Paper
Hazelnut is one of the most important agricultural products of Turkey, the largest producer of hazelnuts in the world. The kernel of the hazelnut is a major ingredient of chocolate industry after its shell and skin is removed. Hazelnuts with partial skin after the skinning process are rejected by the chocolate industry. Manufacturers have hazelnuts...
Article
Secret image sharing based on Shamir's secret sharing scheme provides fault tolerance and trust to group policy during transmission of secret images over networks. After its initial use, research is focused on improving both visual quality of stego images accommodating shared values and authentication mechanism ensuring correctness of stego images....
Article
Full-text available
Secret image sharing is a technique to share a secret image among n participants using Shamir's secret sharing scheme. Secret image is revealed if any k of the n shares is processed according to the scheme. Research reported in the literature is focused on improving known issues of the method. Reconstruction without distortion, reducing the size ex...
Article
Full-text available
Blakley proposed a method to share a secret among a number of participants in 1979. His method uses the fact that a point (secret) in k-dimensional space is the intersection point of k hyperplanes. The secret is revealed if any k of the n hyperplane equations is known. Any number of hyperplanes less than k is not sufficient to reveal the secret. Th...
Conference Paper
Full-text available
Verilerin güvenli olarak paylaşımı ve saklanması günümüzün önemli uğraşı alanlarından birisidir. Video, resim gibi büyük boyutlu verilerin işlenmesi ve paylaşımı beraberinde zamanlama sorununu da getirmektedir. Hız sorununu çözmede sıkça başvurulan yöntemlerden biri de koşut (paralel) programlamadır. Bu çalışmada Asmuth-Bloom sır paylaşım yöntemini...
Conference Paper
Authentication capability and stego image distortion issues of secret sharing schemes are addressed and improved by the proposed scheme in this paper. Reduced fake stego block authentication probability and improved stego image Peak Signal to Noise Ratio (PSNR) are achieved by encoding both the share and authentication bits by XOR. Employing only e...
Article
Secret image sharing is a technique to share a secret image among n participants. Each participant has a meaningless, noise-like share. The image is revealed if any k of the shares are gathered. This scheme uses the polynomial based (k, n) secret sharing approach proposed by Shamir in 1979. In 2004, Lin and Tsai proposed a new secret image sharing...
Article
In this paper, the subject of removing unwanted objects (e.g. logos, stains, ads or the images of any kind of objects) from photographs without generating any perceivable distortion has been handled. An exemplarbased image inpainting technique relying on texture synthesis has been adopted to reach this goal. As the outcome of this work, it was obse...
Article
Full-text available
Shamir proposed a secret sharing method called by (k, n) t hreshold scheme that divides secret image among n participants in 1979. In 1983, Mignotte proposed a new threshold scheme that is based on Chinese Remainder Theorem. In recent years, secret sharing schemes become popular during the transmission of secret image over the Internet. While many...
Article
Full-text available
Medical applications such as telediagnosis require information exchange over insecure networks. Therefore, protection of the integrity and confidentiality of the medical images is an important issue. Another issue is to store electronic patient record (EPR) in the medical image by steganographic or watermarking techniques. Studies reported in the l...
Article
Medical image transmission over local or wide area networks has become popular with the rapid development of the networking technologies. Research on secure medical image transmission reported in the literature has two objectives. Providing integrity and authentication of the transferred image is one the objectives. Hiding electronic patient record...
Article
Secret Image Sharing is a technique to share a secret image among n participants using Shamir's secret sharing scheme. Secret image is revealed if any k of the n shares is processed according to the scheme. Research reported in the literature is focused on improving known issues of the method. Reconstruction without distortion, reducing the size ex...
Article
Full-text available
This paper presents a new scheme for hiding two halftone secret images into two meaningful shares created from halftone cover images. Meaningful shares are more desirable than noise-like (meaningless) shares in Visual Secret Sharing because they look natural and do not attract eavesdroppers' attention. Previous works in the field focus on either in...
Article
At this work, a novel macromodel circuit is proposed for current followers. Proposed macromodel can handle both linear and non-linear behavior of current followers and saves simulation time and design effort for engineers explicitly. Proposed circuit is tested on a current follower circuit with AC and DC inputs. Finally biquad filter which uses cur...
Article
The Chinese Remainder Theorem (CRT) is used for secret sharing by both Mignotte and Asmuth Bloom in 1983. Then Shyu et al. used Mignotte's scheme in the field of secret image sharing in 2008. However, their method use a Pseudo Random Number Generator (PRNG) with a seed to generate different pixel values for the consecutive secret pixels that have t...
Conference Paper
Secret image sharing is a technique to share the secret among n participants. Each participant has meaningless, noise like shares. The secret image is revealed if any k of the shares are gathered. This scheme uses polynomial based (k, n) secret sharing approach proposed by Shamir in 1979. In 2007, Chen et al. proposed a new secret image sharing met...
Conference Paper
Visual Secret Sharing (VSS) is a method to encode a secret image into multiple shares. Coding one pixel of secret image into m sub-pixels in shares during encoding process causes pixel expansion problem. Probabilistic Visual Secret Sharing Scheme (PVSS) are proposed in recent years to overcome this problem. In traditional VSS and PVSS methods, huma...
Article
Full-text available
In this study, the aim is to detect an induction motor's winding faults by using independent component analysis (ICA). Many laboratory experiments have been done on an induction motor to check the performance of the proposed method. The phase currents of the induction motor are used in the fault detection algorithm. The algorithm is implemente d by...
Article
In 1979, Blakley and Shamir proposed a new concept called secret sharing based on dividing the secret among n participants. This method, also called the (t, n) threshold scheme, requires at least t of the n participants for revealing the secret. Chen used the Blakley's geometry based secret sharing scheme for secret image sharing in 2008. Share ima...
Article
Full-text available
Protection of the sensitive data is an important issue because of the fast development of applications that need exchange of the secret information over the Internet. Secret sharing is an idea proposed by Shamir and Blakley separately with different implementations in 1979. Lin and Tsai proposed a method that uses Steganography to create meaningful...
Article
Visual secret sharing (VSS) is a method to scatter a secret image into shares of random patterns that have to be stacked together to reconstruct the secret. Since each share is a random pattern of black and white pixels, it is not enough to rebuild the secret from just one share. Stacking two shares reconstructs the first secret whereas rotating th...
Conference Paper
Hiding data in a medium such that it can not be perceived easily is called Steganography. Two of the most important performance metrics of steganography are the embedding capacity and noticeability. Specific features of a cover image determine the amount of data to be embedded. A novel algorithm utilizing all pixels of a cover image and does not ne...
Conference Paper
Compound current conveyor, which generates both positive and negative current output without an additional mirror stage had been proposed in literature. In this work given circuit has been modified to reduce current tracking error. The other circuit performance values doesn't affected by this modification. SPICE simulation results show us the wide...
Conference Paper
A new current-mode low input impedance second order allpass and notch filter with single current follower was proposed in this work. Circuit contains one dual output current-follower, two capacitors and four resistors. Circuit shows a good sensitivity characteristics for all passive components. Filter performance is tested in SPICE simulation with...
Conference Paper
A new fault detection and identification (FDI) scheme for transformer faults are suggested in this paper. The new method is based on fuzzy discrete event, from now FDES, composed from between a transformer's measured outputs and its faults. In the FDES, events and state membership functions take values between zero and one. All events occur at the...
Article
One of the basic problems in pattern recognition is the detection of a pattern in noise. This problem becomes particularly difficult if the spectral content of the signal and noise overlap. In this case, high signal-to-noise ratios make detection of the signal very difficult. Noise cancellation using adaptive filters has been successful when the no...
Article
structure is assumed the characteristics of the network, described by it's weights, can then be learned.The learning or training process involves developing a training set of known inputs and outputs forthe system and adapting the internal weights of the network so that the inputs will yield the desiredoutputs. The weights are adjusted to minimize...
Article
Full-text available
Information security and digital rights management are important topics of computer science as most of the transactions are performed over non secure channels nowadays. Steganography and watermarking are methods suggested for information security and digital rights management. Image complexity is used as a parameter by these techniques for improvin...

Network

Cited By