Papers by noura alexendre
International journal of engineering & technology, Dec 1, 2021
In this article, we present a robust new hybrid algorithm combining successive compression, chaot... more In this article, we present a robust new hybrid algorithm combining successive compression, chaotic encryption, and blind watermarking images based on the quaternionic wavelets transform (QWT) to ensure the fast, simple and secure transfer of digital data. The calculations of the various evaluation parameters were carried out with the aim of determining the robustness of our algorithm against certain attacks. The results obtained of the reconstructed images before and after attacks of the compressed-encrypted-watermarked images are appreciated by calculating the evaluation parameters values and by the human visual system. The application of this hybrid algorithm on CFA images allowed us to obtain a stand-alone transmission system and ensure the integrity of digital data.

Biomedical Physics & Engineering Express
As the current healthcare system faces problems of budget, staffing, and equipment, telemedicine ... more As the current healthcare system faces problems of budget, staffing, and equipment, telemedicine through wearable devices gives a means of solving them. However, their adoption by physicians is hampered by the quality of electrocardiogram (ECG) signals recorded outside the hospital setting. Due to the dynamic nature of the ECG and the noise that can occur in real-world conditions, Signal Quality Assessment (SQA) systems must use robust signal quality indices (SQIs). The aim of this study is twofold: to assess the robustness of the most commonly used SQIs and to report on their complexity in terms of computational speed. A total of 39 SQIs were explored, of which 16 were statistical, 7 were non-linear, 9 were frequency-based and 7 were based on QRS detectors. With 6 databases, we manually constructed 2 datasets containing many rhythms. Each signal was labelled as ‘acceptable’ or ‘unacceptable’ (subcategories: ‘motion artefacts’, ‘electromyogram noise’, ‘additive white Gaussian noise’...

The traffic of digital images has increased rapidly in the wide networks. The protection of this ... more The traffic of digital images has increased rapidly in the wide networks. The protection of this kind of data becomes important for many reasons such as confidentiality, authenticity and security. Nowadays, the most important engine to provide authenticity is watermarking. In this paper we present a method of invisible and robust hybrid watermarking to guarantee the authenticity and the confidentiality of images. This method or algorithm combines Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and Bi-dimensional Empirical Mode Decomposition (BEMD) .In fact we propose to apply the BEMD to the original image then we take the First Intrinsic Mode Function (IMFs) decomposition of the image, we apply the Discrete Wavelet Transform (DWT) level 2, then we apply the Discrete Cosine Transform (DCT), to obtained news coefficients. It is here that we proceed with the integration of the mark coefficients after use of fuzzy set, DWT and DCT transforms. The method is not blind b...
International Journal of Engineering & Technology, 2021
In this article, we present a robust new hybrid algorithm combining successive compression, chaot... more In this article, we present a robust new hybrid algorithm combining successive compression, chaotic encryption, and blind watermarking images based on the quaternionic wavelets transform (QWT) to ensure the fast, simple and secure transfer of digital data. The calculations of the various evaluation parameters were carried out with the aim of determining the robustness of our algorithm against certain attacks. The results obtained of the reconstructed images before and after attacks of the compressed-encrypted-watermarked images are appreciated by calculating the evaluation parameters values and by the human visual system. The application of this hybrid algorithm on CFA images al-lowed us to obtain a stand-alone transmission system and ensure the integrity of digital data.

The traffic of digital images has increased rapidly in the wide networks. The protection of this ... more The traffic of digital images has increased rapidly in the wide networks. The protection of this kind of data becomes important for many reasons such as confidentiality, authenticity and security. Nowadays, the most important engine to provide authenticity is watermarking. In this paper we present a method of invisible and robust hybrid watermarking to guarantee the authenticity and the confidentiality of images. This method or algorithm combines Discrete Wavelet Transform (DWT), Discrete Cosine Transform (DCT) and Bi-dimensional Empirical Mode Decomposition (BEMD) .In fact we propose to apply the BEMD to the original image then we take the First Intrinsic Mode Function (IMFs) decomposition of the image, we apply the Discrete Wavelet Transform (DWT) level 2, then we apply the Discrete Cosine Transform (DCT), to obtained news coefficients. It is here that we proceed with the integration of the mark coefficients after use of fuzzy set, DWT and DCT transforms. The method is not blind b...

Journal of Computational Chemistry, 2021
The advent of the Internet in these last years encouraged a considerable traffic of digital image... more The advent of the Internet in these last years encouraged a considerable traffic of digital images. In the sanitary field, precisely in telemedicine branch, medical images play a very important role for therapeutic diagnoses. Thus, it is necessary to protect medical images data before transmission over the network to preserve their security and prevent unauthorized access. In this paper, a secure algorithm for biomedical images encryption scheme based on the combination of watermarking technique and chaotic function is proposed. In the proposed method, to achieve high security level performances, a non-blind hybrid watermarking technique with audio signal, Discrete Wavelet Transform is used; smoothness is also used as selected criteria; the iterations obtained by the chaotic sequences are essential and allow a good realization of the encryption process. One of the main advantages of chaos-based encryption schemes is the generation of a large number of key spaces to resist brute forc...
Uploads
Papers by noura alexendre