Learn More
Modern digital technology has made it possible to manipulate multi-dimensional signals with systems that range from simple digital circuits to advanced parallel computers. The goal of this manipulation can be divided into three categories: • Image Processing image in ! image out. • Image Analysis image in ! measurements out. • Image Understanding image in !(More)
Unlike airborne multi-echo laser scanner systems, full-waveform systems are able to digitize and record the entire backscattered signal of each laser pulse. It has been demonstrated that decomposing the return waveforms into a mixture of Gaussian components was suitable. In this paper, we focus on the improvement of peak detection and of raw signal(More)
This work presents a new method that combines image encryption and watermarking technique for safe transmission purpose. This method is based on the combination of public-private keys and secret key ciphering, and watermarking. The encryption algorithm with secret key is applied to the image. We encrypt the secret key with an encryption method based on(More)
This paper presents a novel method for the protection of copyrighted multimedia content. The problem of selective encryption (SE) is being addressed along with the compression for the state of the art video codec H.264/AVC. SE is performed in the context-based adaptive binary arithmetic coding (CABAC) module of video codec. For this purpose, CABAC is(More)
This paper presents a new approach for reconstructing images mapped or painted on straight uniform generalized cylinders (SUGC). A set of monocular images is taken from di!erent viewpoints in order to be mosaiced and to represent the entire scene in detail. The expressions of the SUGC's projection axis are derived from two cross-sections projected onto the(More)
Since several years, the protection of multimedia data is becoming very important. The protection of this multi-media data can be done with encryption or data hiding algorithms. To decrease the transmission time, the data compression is necessary. Since few years, a new problem is trying to combine in a single step, compression, encryption and data hiding.(More)
In recent years, a variety of chaos-based cryptosystems have been proposed. Some of these systems are used in designing a pseudo random bit generator (PRBG) for stream cipher applications. Most of the chaotic systems used in cryptography have good chaotic properties like ergodicity, sensitivity to initial values and sensitivity to control parameters.(More)
Recently, a variety of chaos-based cryptosystems have been proposed. Some of these novel chaotic encryption schemes are not very suitable for image encryption due to their density function which is not uniformly distributed or due to their small key space. In this paper, we propose a new scheme for image encryption based on the use of a chaotic map with(More)
In this study we propose a new approach for selective encryp-tion in the Huffman coding of the Discrete Cosine Transform (DCT) coefficients using the Advanced Encryption Standard (AES). The objective is to partially encrypt the human face in an image or video sequence. This approach is based on the AES stream ciphering using Variable Length Coding (VLC) of(More)