scispace - formally typeset
Search or ask a question
Author

Fatih Kurugollu

Bio: Fatih Kurugollu is an academic researcher from University of Derby. The author has contributed to research in topics: Image segmentation & Digital watermarking. The author has an hindex of 20, co-authored 119 publications receiving 1676 citations. Previous affiliations of Fatih Kurugollu include Scientific and Technological Research Council of Turkey & TÜBİTAK Marmara Research Center.


Papers
More filters
Journal ArticleDOI
TL;DR: A novel hybrid approach is proposed for simultaneous feature selection and feature weighting of K-NN rule based on Tabu Search (TS) heuristic, and it is revealed that the proposed hybrid TS heuristic is superior to both simple TS and sequential search algorithms.

201 citations

Journal ArticleDOI
TL;DR: It is shown that for multiband images, multithresholding subsets of bands followed by a fusion stage results in improved performance and running time.

155 citations

Journal ArticleDOI
TL;DR: A new blind and readable H.264 compressed domain watermarking scheme is proposed in which the embedding/extracting is performed using the syntactic elements of the compressed bit stream using a priority matrix defined which can be adjusted based on the application requirements.
Abstract: In this paper, a new blind and readable H.264 compressed domain watermarking scheme is proposed in which the embedding/extracting is performed using the syntactic elements of the compressed bit stream. As a result, it is not necessary to fully decode a compressed video stream both in the embedding and extracting processes. The method also presents an inexpensive spatiotemporal analysis that selects the appropriate submacroblocks for embedding, increasing watermark robustness while reducing its impact on visual quality. Meanwhile, the proposed method prevents bit-rate increase and restricts it within an acceptable limit by selecting appropriate quantized residuals for watermark insertion. Regarding watermarking demands such as imperceptibility, bit-rate control, and appropriate level of security, a priority matrix is defined which can be adjusted based on the application requirements. The resulted flexibility expands the usability of the proposed method.

111 citations

Journal ArticleDOI
TL;DR: A novel trust model, namely, MiTM attack resistance trust model in connected vehicles (MARINE), which identifies dishonest nodes performing MiTM attacks in an efficient way as well as revokes their credentials is proposed.
Abstract: Vehicular ad hoc network (VANET), a novel technology, holds a paramount importance within the transportation domain due to its abilities to increase traffic efficiency and safety. Connected vehicles propagate sensitive information which must be shared with the neighbors in a secure environment. However, VANET may also include dishonest nodes such as man-in-the-middle (MiTM) attackers aiming to distribute and share malicious content with the vehicles, thus polluting the network with compromised information. In this regard, establishing trust among connected vehicles can increase security as every participating vehicle will generate and propagate authentic, accurate, and trusted content within the network. In this article, we propose a novel trust model, namely, MiTM attack resistance trust model in connected vehicles (MARINE), which identifies dishonest nodes performing MiTM attacks in an efficient way as well as revokes their credentials. Every node running MARINE system first establishes trust for the sender by performing multidimensional plausibility checks. Once the receiver verifies the trustworthiness of the sender, the received data are then evaluated both directly and indirectly. Extensive simulations are carried out to evaluate the performance and accuracy of MARINE rigorously across three MiTM attacker models and the benchmarked trust model. The simulation results show that for a network containing 35% of MiTM attackers, MARINE outperforms the state-of-the-art trust model by 15%, 18%, and 17% improvements in precision, recall, and $F$ -score, respectively.

93 citations

Journal ArticleDOI
TL;DR: This paper proposes the use of programmable hardware to accelerate the calculation of GLCM and Haralick texture features and as an example of the speedup offered by programmable logic, a multispectral computer vision system for automatic diagnosis of prostatic cancer has been implemented.
Abstract: Grey Level Co-occurrence Matrix (GLCM), one of the best known tool for texture analysis, estimates image properties related to second-order statistics. These image properties commonly known as Haralick texture features can be used for image classification, image segmentation, and remote sensing applications. However, their computations are highly intensive especially for very large images such as medical ones. Therefore, methods to accelerate their computations are highly desired. This paper proposes the use of programmable hardware to accelerate the calculation of GLCM and Haralick texture features. Further, as an example of the speedup offered by programmable logic, a multispectral computer vision system for automatic diagnosis of prostatic cancer has been implemented. The performance is then compared against a microprocessor based solution.

75 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: 40 selected thresholding methods from various categories are compared in the context of nondestructive testing applications as well as for document images, and the thresholding algorithms that perform uniformly better over nonde- structive testing and document image applications are identified.
Abstract: We conduct an exhaustive survey of image thresholding methods, categorize them, express their formulas under a uniform notation, and finally carry their performance comparison. The thresholding methods are categorized according to the information they are exploiting, such as histogram shape, measurement space clustering, entropy, object attributes, spatial correlation, and local gray-level surface. 40 selected thresholding methods from various categories are compared in the context of nondestructive testing applications as well as for document images. The comparison is based on the combined performance measures. We identify the thresholding algorithms that perform uniformly better over nonde- structive testing and document image applications. © 2004 SPIE and IS&T. (DOI: 10.1117/1.1631316)

4,543 citations

Journal ArticleDOI
TL;DR: The authors found that people are much more likely to believe stories that favor their preferred candidate, especially if they have ideologically segregated social media networks, and that the average American adult saw on the order of one or perhaps several fake news stories in the months around the 2016 U.S. presidential election, with just over half of those who recalled seeing them believing them.
Abstract: Following the 2016 U.S. presidential election, many have expressed concern about the effects of false stories (“fake news”), circulated largely through social media. We discuss the economics of fake news and present new data on its consumption prior to the election. Drawing on web browsing data, archives of fact-checking websites, and results from a new online survey, we find: (i) social media was an important but not dominant source of election news, with 14 percent of Americans calling social media their “most important” source; (ii) of the known false news stories that appeared in the three months before the election, those favoring Trump were shared a total of 30 million times on Facebook, while those favoring Clinton were shared 8 million times; (iii) the average American adult saw on the order of one or perhaps several fake news stories in the months around the election, with just over half of those who recalled seeing them believing them; and (iv) people are much more likely to believe stories that favor their preferred candidate, especially if they have ideologically segregated social media networks.

3,959 citations

Proceedings Article
01 Jan 1989
TL;DR: A scheme is developed for classifying the types of motion perceived by a humanlike robot and equations, theorems, concepts, clues, etc., relating the objects, their positions, and their motion to their images on the focal plane are presented.
Abstract: A scheme is developed for classifying the types of motion perceived by a humanlike robot. It is assumed that the robot receives visual images of the scene using a perspective system model. Equations, theorems, concepts, clues, etc., relating the objects, their positions, and their motion to their images on the focal plane are presented. >

2,000 citations

01 Jan 2016
TL;DR: Biomechanics and motor control of human movement is downloaded so that people can enjoy a good book with a cup of tea in the afternoon instead of juggling with some malicious virus inside their laptop.
Abstract: Thank you very much for downloading biomechanics and motor control of human movement. Maybe you have knowledge that, people have search hundreds times for their favorite books like this biomechanics and motor control of human movement, but end up in infectious downloads. Rather than enjoying a good book with a cup of tea in the afternoon, instead they juggled with some malicious virus inside their laptop.

1,689 citations

Journal ArticleDOI
TL;DR: This survey provides a summary of color image segmentation techniques available now based on monochrome segmentation approaches operating in different color spaces and some novel approaches such as fuzzy method and physics-based method are investigated.

1,682 citations