Thien Huynh-The

Learn More
This paper presents a novel watermarking scheme for authentication of digital color images in social networks. The procedure consists of the embedding of a binary watermark image, containing the owner information, into the image to be authenticated. In order to minimize the artifacts in the host image the process is carried out in the wavelets domain.(More)
The monitoring of human lifestyles has gained much attention in the recent years. This work presents a novel approach to combine multiple context-awareness technologies for the automatic analysis of people's conduct in a comprehensive and holistic manner. Activity recognition, emotion recognition, location detection, and social analysis techniques are(More)
Availability is one of the most important requirements in the production system. Keeping the level of high availability in Infrastructure-as-a-Service (IaaS) cloud computing is a challenge task because of the complexity of service providing. By definition, the availability can be maintain by using fault tolerance approaches. Recently, many fault tolerance(More)
Supporting safe and resilient authentication and integrity of digital images is of critical importance in a time of enormous creation and sharing of these contents. This paper presents an improved digital image watermarking model based on a coefficient quantization technique that intelligently encodes the owner's information for each color channel to(More)
In this paper, we go beyond the problem of recognizing human interactions using videos collected from CCTV-based surveillance systems. We propose an approach that permits to deeply describe common person-person activities in the daily life based on the human poses. The joint coordinates of detected human objects are first located by an impressive(More)
There is sufficient evidence proving the impact that negative lifestyle choices have on people's health and wellness. Changing unhealthy behaviours requires raising people's self-awareness and also providing healthcare experts with a thorough and continuous description of the user's conduct. Several monitoring techniques have been proposed in the past to(More)