- Autonomous Vehicle Technology and Safety
- Face recognition and analysis
- Face and Expression Recognition
- Remote Sensing and LiDAR Applications
- Biometric Identification and Security
- Cryptography and Data Security
- Video Surveillance and Tracking Methods
- RFID technology advancements
- Advanced Vision and Imaging
- Cryptographic Implementations and Security
- Coding theory and cryptography
- Advanced Authentication Protocols Security
- Advanced Neural Network Applications
- Image and Object Detection Techniques
- Cryptography and Residue Arithmetic
- Physical Unclonable Functions (PUFs) and Hardware Security
- Advanced Image and Video Retrieval Techniques
- Medical Image Segmentation Techniques
- Gaze Tracking and Assistive Technology
- Medical Imaging Techniques and Applications
- Hand Gesture Recognition Systems
- Anomaly Detection Techniques and Applications
- Vehicle License Plate Recognition
- Advanced Image Processing Techniques
- Radiomics and Machine Learning in Medical Imaging
Laboratoire Traitement du Signal et de l'Image
2025
University of Monastir
2016-2022
Institut Supérieur de l'Électronique et du Numérique
2022
Université de Bourgogne
2022
Bridge University
2022
Over the past few decades, interest in theories and algorithms for face recognition has been growing rapidly. Video surveillance, criminal identification, building access control, unmanned autonomous vehicles are just a examples of concrete applications that gaining attraction among industries. Various techniques being developed including local, holistic, hybrid approaches, which provide image description using only features or whole facial features. The main contribution this survey is to...
Lane departure warning systems have gained considerable research interest in the past decade for its promising usage automotive, where lane detection and tracking is applied. However, it a challenging task to improve robustness of due environmental factors, such as perspective effect, possible low visibility lanes, partial occlusions. To deal with these issues, we propose reliable vision-based real-time markings system that can adapt various conditions. The composed three stages:...
The implementation of RFID technology has globally impacted several industries and this revolution improved the aspects service delivery in many sectors, such as logistics, supply chain visibility, access control, military, agri-food sector. provides security services to protect data transmitted between a tag reader IoT environment. However, these advantages do not prevent an attacker communication remaining various privacy issues systems. Furthermore, with rapid growth IoT, there is urgent...
In recent years, Lane Departure Warning System for security has attracted great attention of driving assistance in order to enhance safety and usage on road driving. This paper presents the implementation a real-time monocular vision based lane departure warning system. make it useful real situation, our proposed system is suggested be time. Otsu's threshold method Hough Transform are main algorithms used deal with lighting problem, extract boundaries monitor vehicle's position respect...
Several applications including access control, system security need a robust and real-time face identification systems. The last is almost performed by two processes: the detection of then recognition. In literature, it can be found that some techniques are used exclusively for process others dedicated this paper, we propose to test evaluate common technique both processes. More particularly, consider in paper only process. order do that, have investigated three descriptors: Local Binary...
Because of the increasing number population vehicles, road traffic accidents are becoming more and serious in recent years. Hence, improving driver assistance systems for security has become an important area research. This paper presents a robust lane detection tracking system based on monocular vision. We use Lane Departure Warning (LDW) to detect position vehicle with respect boundary. An algorithm marking control direction is proposed. Our work consists establishing Region Of Interest...
In the last two decades, developing Driving Assistance Systems for security has been one of most active research fields in order to minimize traffic accidents.Vehicle detection is a vital operation these applications.In this paper, we present high reliable and real-time lighting-invariant lane collision warning system.We implement novel vehicles using Histogram Oriented Gradient Support Vector Machine which could be used prediction.Thus, meet conditions systems reduce searching region,...
Face detection and recognition system (FDRS) is widely used in modern biometric security systems. In this paper, we implement a new model of FDRS to identify human faces under different poses. Particularly, propose the Viola-Jones detector locate detect VanderLugt correlator (VLC) technique for identification. We two implementations based on Zync SOC. A set experiments has been considered using PHPID database where ranging from -30° +30°. For more details, see [4].
Face recognition systems have become one of the most important and interesting research fields in recent years. These are widely used various disciplines, despite existence different surveillance such as hand geometry, iris scan, well fingerprints. Following their simplicity non-intrusive nature, they will be next generation solution expected to support security applications. Various approaches being developed including local, holistic, hybrid approaches. The main contribution this survey is...
A single RFID (Radio Frequency Identification) is a technology for the remote identification of objects or people. It integrates reader that receives information contained in an tag through authentication protocol. provides several security services to protect data transmitted between and reader. However, these advantages do not prevent attacker access this communication remaining various privacy issues systems. Furthermore, with rapid growth IoT, there urgent need confidential protection....
In recent years, driver fatigue and drowsiness have been presented as the main factors of road accidents with a high rate passenger deaths, injuries property losses. this paper, we developed monitoring system for vehicle drivers that detects warns presence through computer vision or machine vision. Our consists four steps: training classifier to perform detection module, image acquisition processing, alarm activation. Firstly, was performed using Haar technique locate face features....
ECC (Elliptic Curves Cryptosystems) are the most popular and efficient encryption systems used since 1985. They being increasingly integrated in high security applications such as RFID devices, smart cards, bank-cards, etc. To be suitable for these applications, a lightweight implementation of scalar multiplication operation is required. achieve this goal, it necessary to choose parameters responsible cost reduction elliptic curve implementation. In paper, we will first specify that...