Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Lamri Laouamer is active.

Publication


Featured researches published by Lamri Laouamer.


Multimedia Tools and Applications | 2016

Securing data exchange in wireless multimedia sensor networks: perspectives and challenges

Musab Ghadi; Lamri Laouamer; Tarek Moulahi

The emerging use of Wireless Multimedia Sensor Networks (WMSNs) and communication facilities have increased the need for network security measures to protect different types of multimedia data either real time or non-real time during the transmission period. A lot of researchers are becoming more interested on secure WMSNs due to the broad application necessities which can be range over smart environment, security surveillance and smart health-care; so requirements on secure aggregation of multimedia data, Quality of Service (QoS) and privacy should be satisfied. Current technologies vs. proposed security techniques in WMSNs and its pros and cons from a security point of view are explored in details. In addition to promising future trends of this research area by giving more attention for new challenging problems including secure routing protocol, fault tolerant, robustness and recovery process. We believe that this paper will add significantly a valuable discussion among the researchers and promote them to fetch new research ideas to design approximately best model by combining the most important security issues in order to reach secure WMSNs.


intelligent information hiding and multimedia signal processing | 2008

A New Approach against Color Attacks of Watermarked Images

Abdelhamid Benhocine; Lamri Laouamer; Laurent Nana; Anca Christine Pascu

We present a new approach for modeling color attacks of RGB-color watermarked images. We have used a based interpolation watermarking algorithm and supposed that the attacks are simulated by a scaling of the colors followed by a translation. We give bounds for the extracted watermark depending on the original image, the watermark and the attack. Different attacks like LSB, embedding another watermark, Stirmark have been simulated and the quality of the extracted watermark is discussed in each case.


Journal of Innovation in Digital Ecosystems | 2015

Robust watermarking scheme and tamper detection based on threshold versus intensity

Lamri Laouamer; Muath AlShaikh; Laurent Nana; Anca Chrisitine Pascu

Abstract A watermarking field is necessary to prove the copyright, ownership, authenticity and other related security aspects of the electronic data. Semi-Blind watermarking refers to need the watermark image during the extraction process. While, informed watermarking generates the watermark data from the original image itself. Moreover, Tamper detection is useful to discover the tamper zone in the image. In this paper, we propose a semi blind and informed watermarking approach. We build the watermark from the original image using Weber Law. Our approach aims to provide a high robustness and imperceptibility with perfectly tamper detection zone. We divide the original image into blocks and the main pixel is chosen for watermark insertion, where the embedding/extraction operates in the spatial domain. The tamper detection is tested by tampering watermarked image, and then based on the extracted attacked watermark; we can discover the tamper area. Also, the robustness watermarking aspect is proved against different kind of geometric and non-geometric attacks. Based on the experimental results, the imperceptibility and robustness of our watermarking approach are proven and showing perfectly the detection of the tamper zones.


Journal of Innovation in Digital Ecosystems | 2015

Enhancing digital image integrity by exploiting JPEG bitstream attributes

Musab Ghadi; Lamri Laouamer; Tarek Moulahi

Abstract The need for protecting a huge amount of digital images on the internet has become an important requirement against different kind of attacks in order to insure transmitted process in a secure way. Cryptography introduces many security goals to achieve privacy of image include confidentiality, authentication and integrity. Encryption process may applied on the result of JPEG DCT-based encoding process, which are DC and AC coefficients, where DC coefficients present the average of the overall magnitude of the input image and AC coefficients present the higher frequency components of image. In this paper, we develop a new model for securing the transmitted images via wireless network by parsing JPEG bitstream to encrypting both DC and AC coefficients in each 8×8 block of image. This work utilizes the features of DCT-based encoding process preserving low complexity, efficient compression, and robustness to protect the image integrity. The experiments result shows that the proposed approach gives an interesting and a significant robustness ratio reaching a range of 60.3 dB for Peak Signal-to-Noise Ratio (PSNR) and a 0.006% for Bit Error Rate (BER) in average. The obtained results are discussed in details.


management of emergent digital ecosystems | 2016

A robust associative watermarking technique based on frequent pattern mining and texture analysis

Musab Ghadi; Lamri Laouamer; Laurent Nana; Anca Pascu

Nowadays, the principle of image mining plays a vital role in various areas of our life, where numerous frameworks based on image mining are proposed for object recognition, object tracking, sensing images and medical image diagnosis. Nevertheless, the research in the image authentication based on image mining is still confined. Therefore, this paper comes to present an efficient engagement between the frequent pattern mining and digital watermarking to contribute significantly in the authentication of images transmitted via public networks. The proposed framework exploits some robust features of image to extract the frequent patterns in the image data. The maximal relevant patterns are used to discriminate between the textured and smooth blocks within the image, where the texture blocks are more appropriate to embed the secret data than smooth blocks. The experiments result proves the efficiency of the proposed framework in terms of stabilization and robustness against different kind of attacks. The results are interesting and remarkable to preserve the image authentication.


Proceedings of the 2nd International Conference on Advanced Intelligent Systems and Informatics AISI2016 | 2016

Fuzzy Rough Set Based Image Watermarking Approach

Musab Ghadi; Lamri Laouamer; Laurent Nana; Anca Christine Pascu

Computational intelligent techniques can be useful in developing efficient watermarking approaches that are able to maintain and reduce risks to integrity, confidentiality, and availability of information and resources in computer and network systems. This paper aims to develop a new spatial domain-based watermarking approach that uses the fuzzy rough set to select well thought out blocks to embed secret data with acceptable rate of imperceptibility and robustness against different scenarios of attacks. The proposed model focuses on analyzing the host image to discover specified features in some blocks that in turn will be considered in the watermarking process. These features include the characteristics of the Human Visual System (HVS) regarding the color sensitivity and the textured/semi-smooth regions, where embedding the watermark in low color sensitivity to the human eye and more textured regions gains high imperceptibility and robustness. The experiment results show that the proposed approach gives interesting and remarkable results to preserve the image authentication.


management of emergent digital ecosystems | 2015

JPEG bitstream based integrity with lightweight complexity of medical image in WMSNS environment

Musab Ghadi; Lamri Laouamer; Laurent Nana; Anca Pascu

The study aims to preserve integrity of JPEG bitstream transmitted in Wireless Multimedia Sensor Networks (WMSNs) environment, lightweight complex process that is proposed to parse bitstream of encoded medical image and formulated the encryption process for that represented bit of Diff value in DC coefficients rather than appended bits of ACs coefficients. Our choice deals with low down complexity by encrypting limited numbers of DC coefficients versus ACs coefficients per block, or even all image blocks. This model may be utilized in building a secure framework of remote image analysis and archiving center for that transmitted medical images from body sensors and clinician, or even other remote imaging center with high integrity and low complexity. The experiments result shows that the proposed approach gives an interesting and remarkable result to preserve the medical image integrity. The obtained results are discussed in details.


Archive | 2018

Rough Set Theory Based on Robust Image Watermarking

Musab Ghadi; Lamri Laouamer; Laurent Nana; Anca Chrisitine Pascu

Computational intelligence involves convenient adaptation and self-organization concepts, theories, and algorithms, which provide appropriate actions for a complex and changing environment. Fuzzy systems, artificial neural networks, and evolutionary computation are the main computational intelligence approaches used in applications. Rough set theory is one of the important fuzzy systems that have a significant role in extracting rough information from vague and uncertain knowledge. It has a pivotal role in many vague problems linked to image processing, fault diagnosis, intelligent recommendation, and intelligent support decision-making. Image authentication and security are one of the essential demands due to the rapid evolution of tele-image processing systems and to the increase of cyberattacks on applications relying on such systems. Designing such image authentication and security systems requires the analysis of digital image characteristics which are, in majority, based on uncertain and vague knowledge. Digital watermarking is a well-known solution for image security and authentication. This chapter introduces intelligent systems based on image watermarking and explores the efficiency of rough set theory in designing robust image watermarking with acceptable rate of imperceptibility and robustness against different scenarios of attacks.


International Journal of Computer Applications | 2012

Motion JPEG Video Authentication Based on Quantization Matrix Watermarking: Application in Robotics

Lamri Laouamer; Abdelhamid Benhocine; Laurent Nana; Anca Pascu

The images authentication transmitted through the communication networks must verify the proof of the originality and robustness against the hacker attacks. The existing techniques such as the cryptographic methods are not sufficient. An effectiveness and robust solution is proposed in this paper. This solution is based on the watermarking of the video and especially the Motion JPEG stream. We focused on one of the major properties of the JPEG image which is the quantization matrix. The watermarking is performed on this matrix. We detail the obtained results against several attacks.


International Conference on Advanced Machine Learning Technologies and Applications | 2018

Toward a Secure and Robust Medical Image Watermarking in Untrusted Environment

Abdallah Soualmi; Adel Alti; Lamri Laouamer

An untrusted environment such public Cloud as a model delivering hosted services through network. Several data are transmitted over the cloud which is considered as unsecured network, some of them may contain sensitive and important information such as medical images. In order to protect these images from several attacks, implementing a new robust digital image watermarking technique becomes necessary. In such techniques, a selected watermark is embedded in the medical image transmitted through network. The embedded watermark must be invisible and undetectable and only authorized persons can extract it to prove authentication. This paper propose a new hybrid image watermarking technique based on Number Theoretic Transform (NTT) and Diffie-Hellman on medical images in order to guarantee the security and preserve quality of medical images. We measured the robustness of the proposed approach by the commonly used metrics against several scenarios of attacks such as adding noise, rotation, etc. The tests are performed on several types of medical images.

Collaboration


Dive into the Lamri Laouamer's collaboration.

Top Co-Authors

Avatar

Laurent Nana

European University of Brittany

View shared research outputs
Top Co-Authors

Avatar

Anca Pascu

University of Western Brittany

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Anca Christine Pascu

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Anca Chrisitine Pascu

University of Western Brittany

View shared research outputs
Researchain Logo
Decentralizing Knowledge