Yazar "Yesilyurt, Murat" seçeneğine göre listele
Listeleniyor 1 - 3 / 3
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe A Robust Watermarking Method for Mpeg-4 Based on Kurtosis(Oxford Univ Press, 2015) Yesilyurt, Murat; Yalman, Yildiray; Ozcerit, A. TuranWatermarking is a method of data hiding in relation to information security and copyright protection. In this paper, a new kurtosis-based watermarking approach is proposed for compressed video files. The proposed approach has two main parts. First, an intraframe of the video file is transformed from RGB to YCbCr color space and each Y component's kurtosis value is calculated. A threshold kurtosis value is determined for the video because it is recommended to interpret the kurtosis values in combination with noise and resolution measurement. Secondly, the middle band Discrete Cosine Transform (DCT) coefficients of the luminance (Y) component is used for watermarking processes considering the threshold kurtosis values. Each bit of the binary watermark is embedded in a different DCT block. The experimental results show that the proposed method can be safely used for watermarking processes when the point of interest is binary watermarks. In addition, the proposed watermarking approach is highly imperceptible and robust. Statistical and perceptual quality evaluations show that the proposed approach is better than its counterparts.Öğe Information Security Threats and Information Assurance(Assoc Information Communication Technology Education & Science, 2013) Yalman, Yildiray; Yesilyurt, MuratToday, the benefits of rapidly developing technology, as well as come to the fore the problems brought about. For this reason, individuals, institutions and organizations take measures to ensure the security of information. Information assurance is the practice of managing risks related to the use, processing, storage and transmission of information or data and the systems and processes used for those purposes. Thus, information security is now provided with information assurance measures. The presented work, especially in today's digital and networking technologies in order to ensure effective information security threats and describes the scope of what required for information assurance.Öğe Security Threats on Mobile Devices and their Effects: Estimations for the Future(Nadia, 2016) Yesilyurt, Murat; Yalman, YildirayPortable devices are today used in all areas of life thanks to their ease of use as well as their applications with unique features. The increase in the number of users, however, also leads to an increase in security threats. This study examines the threats to mobile operating systems. Addressing the four mobile operating systems (Android, Apple OS (iOS), Symbian and Java ME) with the highest number of users, the study provides statistical information about the features of the corresponding operating systems and their areas of use. In the study, the most important threats faced by the mobile operating systems (Malware, Vulnerabilities, Attacks) and the risks posed by these threats were analyzed in chronological order and the future-oriented security perspective was suggested..












