Thien Huynh-The

Learn More
This paper presents a novel watermarking scheme for authentication of digital color images in social networks. The procedure consists of the embedding of a binary watermark image, containing the owner information, into the image to be authenticated. In order to minimize the artifacts in the host image the process is carried out in the wavelets domain.(More)
The monitoring of human lifestyles has gained much attention in the recent years. This work presents a novel approach to combine multiple context-awareness technologies for the automatic analysis of people's conduct in a comprehensive and holistic manner. Activity recognition, emotion recognition, location detection, and social analysis techniques are(More)
CCTV-based behavior recognition systems have gained considerable attention in recent years in the transportation surveillance domain for identifying unusual patterns, such as traffic jams, accidents, dangerous driving and other abnormal behaviors. In this paper, a novel approach for traffic behavior modeling is presented for video-based road surveillance.(More)
Availability is one of the most important requirements in the production system. Keeping the level of high availability in Infrastructure-as-a-Service (IaaS) cloud computing is a challenge task because of the complexity of service providing. By definition, the availability can be maintain by using fault tolerance approaches. Recently, many fault tolerance(More)
This paper improves a remarkable background estimation algorithm, namely Neighbor-based Intensity Correction (NIC) which is used in the background subtraction technique for foreground detection. The algorithm has an efficient intensity correction scheme to update the current background based on calculating the standard deviation of two windows captured from(More)
The number of application based on Apache Hadoop is increasing dramatically due to the robustness and dynamic features of this system. At the heart of Apache Hadoop, the Hadoop File System (HDFS) provides the reliability, scalability and high availability to computation by applying a static replication strategy. However, because of the characteristics of(More)
In this paper, we go beyond the problem of recognizing human interactions using videos collected from CCTV-based surveillance systems. We propose an approach that permits to deeply describe common person-person activities in the daily life based on the human poses. The joint coordinates of detected human objects are first located by an impressive(More)