Robust additive watermarking in the DTCWT domain based on perceptual masking
Zebbiche, Khalil, Khelifi, Fouad, Loukhaoukha, Khaled
Published in Multimedia tools and applications (01.08.2018)
Published in Multimedia tools and applications (01.08.2018)
Get full text
Journal Article
Efficient and secure cryptosystem for fingerprint images in wavelet domain
Loukhaoukha, Khaled, Refaey, Ahmed, Zebbiche, Khalil, Shami, Abdallah
Published in Multimedia tools and applications (01.04.2018)
Published in Multimedia tools and applications (01.04.2018)
Get full text
Journal Article
Ambiguity attacks on robust blind image watermarking scheme based on redundant discrete wavelet transform and singular value decomposition
Loukhaoukha, Khaled, Refaey, Ahmed, Zebbiche, Khalil
Published in Journal of Electrical Systems and Information Technology (01.12.2017)
Published in Journal of Electrical Systems and Information Technology (01.12.2017)
Get full text
Journal Article
Securing Biometric Systems by using Perceptual Hashing Techniques
Hamadouche, Maamar, Zebbiche, Khalil, Zafoune, Youcef
Published in 2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA) (04.12.2023)
Published in 2023 20th ACS/IEEE International Conference on Computer Systems and Applications (AICCSA) (04.12.2023)
Get full text
Conference Proceeding
Chaos based fingerprint image encryption in the wavelet domain
Benseddik, Mohamed Lamine, Zebbiche, Khalil, Azzaz, Mohamed Salah, Sadoudi, Said, Loukhaoukha, Khaled
Published in 2023 International Conference on Advances in Electronics, Control and Communication Systems (ICAECCS) (06.03.2023)
Published in 2023 International Conference on Advances in Electronics, Control and Communication Systems (ICAECCS) (06.03.2023)
Get full text
Conference Proceeding
Comments on “Homomorphic image watermarking with a singular value decomposition algorithm”
Loukhaoukha, Khaled, Refaey, Ahmed, Zebbiche, Khalil
Published in Information processing & management (01.07.2016)
Published in Information processing & management (01.07.2016)
Get full text
Journal Article
Ambiguity attacks on the digital image watermarking using discrete wavelet transform and singular value decomposition
El Maadi, Amar, Loukhaoukha, Khaled, Benmami, Mahmoud, Zebbiche, Khalil, Mehallegue, Noureddine
Published in Multimedia tools and applications (03.04.2024)
Published in Multimedia tools and applications (03.04.2024)
Get full text
Journal Article
Comments on "efficient SVD speech watermarking with encrypted images"
El Maadi, Amar, Loukhaoukha, Khaled, Benmami, Mahmoud, Mehallegue, Noureddine, Zebbiche, Khalil
Published in Multimedia tools and applications (01.02.2024)
Published in Multimedia tools and applications (01.02.2024)
Get full text
Journal Article
Comments on “A robust color image watermarking with singular value decomposition method”
Loukhaoukha, Khaled, Refaey, Ahmed, Zebbiche, Khalil
Published in Advances in engineering software (1992) (01.03.2016)
Published in Advances in engineering software (1992) (01.03.2016)
Get full text
Journal Article
Efficient Interpolation-based Reversible Watermarking for Protecting Fingerprint Images
Benseddik, Mohamed Lamine, Zebbiche, Khalil, Azzaz, Mohamed Salah, Sadoudi, Said
Published in 2021 International Conference on Networking and Advanced Systems (ICNAS) (27.10.2021)
Published in 2021 International Conference on Networking and Advanced Systems (ICNAS) (27.10.2021)
Get full text
Conference Proceeding
An efficient image encryption algorithm based on blocks permutation and Rubik's cube principle for iris images
Loukhaoukha, Khaled, Nabti, Makram, Zebbiche, Khalil
Published in 2013 8th International Workshop on Systems, Signal Processing and their Applications (WoSSPA) (01.05.2013)
Published in 2013 8th International Workshop on Systems, Signal Processing and their Applications (WoSSPA) (01.05.2013)
Get full text
Conference Proceeding
Efficient Joint Watermarking and WSQ Compression Scheme
Zebbiche, Khalil, Khelifi, Fouad, Saadi, Karima Ait
Published in 2013 Fourth International Conference on Emerging Security Technologies (01.09.2013)
Published in 2013 Fourth International Conference on Emerging Security Technologies (01.09.2013)
Get full text
Conference Proceeding
Protecting Fingerprint Data Using Watermarking
Zebbiche, K., Ghouti, L., Khelifi, F., Bouridane, A.
Published in First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06) (2006)
Published in First NASA/ESA Conference on Adaptive Hardware and Systems (AHS'06) (2006)
Get full text
Conference Proceeding
Maximum-Likelihood Watermarking Detection on Fingerprint Images
Zebbiche, K., Khelifi, F., Bouridane, A.
Published in 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security (BLISS 2007) (01.08.2007)
Published in 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security (BLISS 2007) (01.08.2007)
Get full text
Conference Proceeding