scispace - formally typeset
Search or ask a question
Author

Bijan G. Mobasseri

Bio: Bijan G. Mobasseri is an academic researcher from Villanova University. The author has contributed to research in topics: Digital watermarking & Watermark. The author has an hindex of 16, co-authored 73 publications receiving 1061 citations. Previous affiliations of Bijan G. Mobasseri include United States Department of the Navy.
Topics: Digital watermarking, Watermark, Chirp, Sonar, JPEG


Papers
More filters
Journal ArticleDOI
TL;DR: This work demonstrates that fuzzy c-means clustering is capable of robust recovery of the unknown constellation and proposes to use constellation shape as a robust signature for digital modulation recognition.

186 citations

Proceedings ArticleDOI
TL;DR: This paper proposes a gait classifier based on subspace learning using principal components analysis(PCA) and shows that gait signature is captured effectively in feature vectors and is used in training a minimum distance classifiers based on Mahalanobis distance metric.
Abstract: Radar has established itself as an effective all-weather, day or night sensor. Radar signals can penetrate walls and provide information on moving targets. Recently, radar has been used as an effective biometric sensor for classification of gait. The return from a coherent radar system contains a frequency offset in the carrier frequency, known as the Doppler Effect. The movements of arms and legs give rise to micro Doppler which can be clearly detailed in the time-frequency domain using traditional or modern time-frequency signal representation. In this paper we propose a gait classifier based on subspace learning using principal components analysis(PCA). The training set consists of feature vectors defined as either time or frequency snapshots taken from the spectrogram of radar backscatter. We show that gait signature is captured effectively in feature vectors. Feature vectors are then used in training a minimum distance classifier based on Mahalanobis distance metric. Results show that gait classification with high accuracy and short observation window is achievable using the proposed classifier.

89 citations

Journal ArticleDOI
TL;DR: An algorithm to embed data directly in the bitstream of JPEG imagery by remapping run/size values of marked VLCs so that standard viewers do not lose synchronization and displays the image with minimum loss of quality.
Abstract: We propose an algorithm to embed data directly in the bitstream of JPEG imagery. The motivation for this approach is that images are seldom available in uncompressed form. Algorithms that operate in spatial domain, or even in coefficient domain, require full (or at best) partial decompression. Our approach exploits the fact that only a fraction of JPEG code space is actually used by available encoders. Data embedding is performed by mapping a used variable length code (VLC) to an unused VLC. However, standard viewers unaware of the change will not properly display the image. We address this problem by a novel error concealment technique. Concealment works by remapping run/size values of marked VLCs so that standard viewers do not lose synchronization and displays the image with minimum loss of quality. It is possible for the embedded image to be visually identical to the original even though the two files are bitwise different. The algorithm is fast and transparent and embedding is reversible and file-size preserving. Under certain circumstances, file size may actually decrease despite carrying a payload.

83 citations

Proceedings ArticleDOI
10 Sep 2000
TL;DR: The proposed watermarking algorithm can identify cut start and duration down to single frame precision and embeds a watermark with a strong timing content that can be traced back to the parameters of the editing operation.
Abstract: We report on the development of a watermarking algorithm designed for video authentication and tamper detection. The objectives are to determine unauthorized cut-and-splice or cut-insert-splice operation and quantify the extent of such editing. We demonstrate that the proposed algorithm can identify cut start and duration down to single frame precision. The approach embeds a watermark with a strong timing content, violation of which can be traced back to the parameters of the editing operation.

81 citations

Proceedings ArticleDOI
31 Oct 1999
TL;DR: A new digital modulation recognition algorithm in an AWGN channel and in the presence of carrier recovery errors is reported on that shows shape as a global signature exhibits considerable stability in high noise, weakly synchronous environments.
Abstract: This work reports on a new digital modulation recognition algorithm in an AWGN channel and in the presence of carrier recovery errors. The proposed classification technique uses the signal constellation shape as a stable modulation signature. The recovered constellations are modeled by binomial nonhomogenous spatial random fields and are used in an ML classifier. We experimentally show that shape as a global signature exhibits considerable stability in high noise, weakly synchronous environments. Experimental results are shown for various modulation standards including V.29, V.29 fallback, 8-PSK and 16-QAM.

64 citations


Cited by
More filters
Book
24 Oct 2001
TL;DR: Digital Watermarking covers the crucial research findings in the field and explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied.
Abstract: Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital Watermarking covers the crucial research findings in the field: it explains the principles underlying digital watermarking technologies, describes the requirements that have given rise to them, and discusses the diverse ends to which these technologies are being applied. As a result, additional groundwork is laid for future developments in this field, helping the reader understand and anticipate new approaches and applications.

2,849 citations

Journal Article
TL;DR: In this article, the authors explore the effect of dimensionality on the nearest neighbor problem and show that under a broad set of conditions (much broader than independent and identically distributed dimensions), as dimensionality increases, the distance to the nearest data point approaches the distance of the farthest data point.
Abstract: We explore the effect of dimensionality on the nearest neighbor problem. We show that under a broad set of conditions (much broader than independent and identically distributed dimensions), as dimensionality increases, the distance to the nearest data point approaches the distance to the farthest data point. To provide a practical perspective, we present empirical results on both real and synthetic data sets that demonstrate that this effect can occur for as few as 10-15 dimensions. These results should not be interpreted to mean that high-dimensional indexing is never meaningful; we illustrate this point by identifying some high-dimensional workloads for which this effect does not occur. However, our results do emphasize that the methodology used almost universally in the database literature to evaluate high-dimensional indexing techniques is flawed, and should be modified. In particular, most such techniques proposed in the literature are not evaluated versus simple linear scan, and are evaluated over workloads for which nearest neighbor is not meaningful. Often, even the reported experiments, when analyzed carefully, show that linear scan would outperform the techniques being proposed on the workloads studied in high (10-15) dimensionality!.

1,992 citations

Journal ArticleDOI
TL;DR: The authors provide a comprehensive survey of different modulation recognition techniques in a systematic way, and simulated some major techniques under the same conditions, which allows a fair comparison among different methodologies.
Abstract: The automatic recognition of the modulation format of a detected signal, the intermediate step between signal detection and demodulation, is a major task of an intelligent receiver, with various civilian and military applications. Obviously, with no knowledge of the transmitted data and many unknown parameters at the receiver, such as the signal power, carrier frequency and phase offsets, timing information and so on, blind identification of the modulation is a difficult task. This becomes even more challenging in real-world scenarios with multipath fading, frequency-selective and time-varying channels. With this in mind, the authors provide a comprehensive survey of different modulation recognition techniques in a systematic way. A unified notation is used to bring in together, under the same umbrella, the vast amount of results and classifiers, developed for different modulations. The two general classes of automatic modulation identification algorithms are discussed in detail, which rely on the likelihood function and features of the received signal, respectively. The contributions of numerous articles are summarised in compact forms. This helps the reader to see the main characteristics of each technique. However, in many cases, the results reported in the literature have been obtained under different conditions. So, we have also simulated some major techniques under the same conditions, which allows a fair comparison among different methodologies. Furthermore, new problems that have appeared as a result of emerging wireless technologies are outlined. Finally, open problems and possible directions for future research are briefly discussed.

1,140 citations

Journal ArticleDOI
01 Oct 2001
TL;DR: This paper presents an overview of the issues and algorithms involved in creating this semiautonomous, multicamera surveillance system and its potential to improve the situational awareness of security providers and decision makers.
Abstract: The Video Surveillance and Monitoring (VSAM) team at Carnegie Mellon University (CMU) has developed an end-to-end, multicamera surveillance system that allows a single human operator to monitor activities in a cluttered environment using a distributed network of active video sensors. Video understanding algorithms have been developed to automatically detect people and vehicles, seamlessly track them using a network of cooperating active sensors, determine their three-dimensional locations with respect to a geospatial site model, and present this information to a human operator who controls the system through a graphical user interface. The goal is to automatically collect and disseminate real-time information to improve the situational awareness of security providers and decision makers. The feasibility of real-time video surveillance has been demonstrated within a multicamera testbed system developed on the campus of CMU. This paper presents an overview of the issues and algorithms involved in creating this semiautonomous, multicamera surveillance system.

693 citations

Journal ArticleDOI
TL;DR: In this paper, the various RDH algorithms and researches have been classified into the following six categories: 1) RDH into image spatial domain; 2) RD h into image compressed domain (e.g., JPEG); 3) RDh suitable for image semi-fragile authentication; 4)RDH with image contrast enhancement; 5) RD H into encrypted images, which is expected to have wide application in the cloud computation; and 6) RDD into video and into audio.
Abstract: In the past two decades, reversible data hiding (RDH), also referred to as lossless or invertible data hiding, has gradually become a very active research area in the field of data hiding. This has been verified by more and more papers on increasingly wide-spread subjects in the field of RDH research that have been published these days. In this paper, the various RDH algorithms and researches have been classified into the following six categories: 1) RDH into image spatial domain; 2) RDH into image compressed domain (e.g., JPEG); 3) RDH suitable for image semi-fragile authentication; 4) RDH with image contrast enhancement; 5) RDH into encrypted images, which is expected to have wide application in the cloud computation; and 6) RDH into video and into audio. For each of these six categories, the history of technical developments, the current state of the arts, and the possible future researches are presented and discussed. It is expected that the RDH technology and its applications in the real word will continue to move ahead.

432 citations