A survey of 2D face recognition techniques

M Chihaoui, A Elkefi, W Bellil, C Ben Amar - Computers, 2016 - mdpi.com
Despite the existence of various biometric techniques, like fingerprints, iris scan, as well as
hand geometry, the most efficient and more widely-used one is face recognition. This is …

[PDF][PDF] Video watermarking techniques for copyright protection and content authentication

H Shojanazeri, WAW Adnan, SMS Ahmad - International Journal of …, 2013 - mirlabs.org
The advancement of Internet services and various storage technologies made video piracy
as an increasing problem particularly with the proliferation of media sharing through the …

Blind semi-fragile watermarking scheme for video authentication in video surveillance context

A Hammami, A Ben Hamida, C Ben Amar - Multimedia Tools and …, 2021 - Springer
With the development of advanced multimedia editing tools, numerous unauthorized
manipulations are easily doable to surveillance systems video files. Thus, video tamper …

A new DCT audio watermarking scheme based on preliminary MP3 study

M Charfeddine, M El'arbi, C Ben Amar - Multimedia tools and applications, 2014 - Springer
In this paper, a new audio watermarking scheme operating in the frequency domain and
based on neural network architecture is described. The watermark is hidden into the middle …

Online multi-sprites based video watermarking robust to collusion and transcoding attacks for emerging applications

I Bayoudh, S Ben Jabra, E Zagrouba - Multimedia Tools and Applications, 2018 - Springer
The rapid growth of network transmission of numeric videos has caused an urgent need for
copyright protection against pirating. Different video watermarking techniques have been …

[PDF][PDF] A Robust Deep Learning-Based Video Watermarking Using Mosaic Generation.

S Mansour, SB Jabra, E Zagrouba - VISIGRAPP (5: VISAPP), 2023 - scitepress.org
Recently, digital watermarking has benefited from the rise of deep learning and machine
learning approaches. Even while effective deep learning-based watermarking techniques …

Migration to object oriented platforms: A state transformation approach

Y Zou, K Kontogiannis - International Conference on Software …, 2002 - ieeexplore.ieee.org
It has become evident that the benefits of object orientation warrant the design and
development of reengineering methods that aim to migrate legacy procedural systems to …

Crypto-watermarking system for safe transmission of 3D multiresolution meshes

I Sayahi, A Elkefi, CB Amar - Multimedia Tools and Applications, 2019 - Springer
The idea of digitizing documents to be archived or shared has given rise to a variety of new
data types such as 3D meshes. The sharing of this data type between remote users, using …

A SVM-based zero-watermarking technique for 3D videos traitor tracing

K Abdelhedi, F Chaabane, C Ben Amar - Advanced Concepts for …, 2020 - Springer
The watermarking layer has a crucial role in a collusion-secure fingerprinting framework
since the hidden information, or the identifier, directly attached to user identification, is …

A robust video watermarking based on feature regions and crowdsourcing

A Kerbiche, SB Jabra, E Zagrouba… - Multimedia Tools and …, 2018 - Springer
Video watermarking technique aims at resolving insecurity problems. Recently, many
approaches have been proposed in order to satisfy the new constraints of video applications …