scispace - formally typeset
A

A.M. Tekalp

Researcher at Koç University

Publications -  234
Citations -  10880

A.M. Tekalp is an academic researcher from Koç University. The author has contributed to research in topics: Motion estimation & Image restoration. The author has an hindex of 50, co-authored 225 publications receiving 10468 citations. Previous affiliations of A.M. Tekalp include Rensselaer Polytechnic Institute & Bilkent University.

Papers
More filters
Proceedings ArticleDOI

Reversible data hiding

TL;DR: A prediction-based conditional entropy coder which utilizes static portions of the host as side-information improves the compression efficiency, and thus the lossless data embedding capacity.
Journal ArticleDOI

Lossless generalized-LSB data embedding

TL;DR: In this paper, a generalization of the well-known least significant bit (LSB) modification is proposed as the data-embedding method, which introduces additional operating points on the capacity-distortion curve.
Journal ArticleDOI

Automatic soccer video analysis and summarization

TL;DR: The proposed framework includes some novel low-level processing algorithms, such as dominant color region detection, robust shot boundary detection, and shot classification, as well as some higher-level algorithms for goal detection, referee detection,and penalty-box detection.
Proceedings ArticleDOI

High-resolution image reconstruction from lower-resolution image sequences and space-varying image restoration

TL;DR: A new two-step procedure is proposed, and it is shown that the POCS formulation presented for the high-resolution image reconstruction problem can also be used as a new method for the restoration of spatially invariant blurred images.
Journal ArticleDOI

Lossless watermarking for image authentication: a new framework and an implementation

TL;DR: A novel framework for lossless (invertible) authentication watermarking is presented, which enables zero-distortion reconstruction of the un-watermarked images upon verification and enables public(-key) authentication without granting access to the perfect original and allows for efficient tamper localization.