Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

High-Speed Data Communications For Vehicular Networks Using Free-Space Optical Communications, Yagiz Kaymak Dec 2018

High-Speed Data Communications For Vehicular Networks Using Free-Space Optical Communications, Yagiz Kaymak

Dissertations

The demand for high-speed Internet access for vehicles, such as high-speed trains (HSTs) and cars, is on the rise. Several Internet access technologies that use radio frequency are being considered for vehicular networking. Radio-frequency communications technologies cannot provide high data rates due to interference, bandwidth limitations, and the inherent limited data rates of radio technology. Free-space optical communications (FSOC) is an alternative approach and a line-of-sight (LOS) technology that uses modulated light to transfer data between two free-space optical (FSO) transceivers. FSOC systems for vehicular networks are expected to provide data rates in the range of Gbps for stationary and …


Computational Intelligence In Steganography: Adaptive Image Watermarking, Xin Zhong Dec 2018

Computational Intelligence In Steganography: Adaptive Image Watermarking, Xin Zhong

Dissertations

Digital image watermarking, as an extension of traditional steganography, refers to the process of hiding certain messages into cover images. The transport image, called marked-image or stego-image, conveys the hidden messages while appears visibly similar to the cover-image. Therefore, image watermarking enables various applications such as copyright protection and covert communication. In a watermarking scheme, fidelity, capacity and robustness are considered as crucial factors, where fidelity measures the similarity between the cover- and marked-images, capacity measures the maximum amount of watermark that can be embedded, and robustness concerns the watermark extraction under attacks on the marked-image. Watermarking techniques are often …