Redouane Kaibou

ORCID: 0000-0003-1749-4417
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Chaos control and synchronization
  • Video Coding and Compression Technologies
  • Cellular Automata and Applications
  • Mathematical Dynamics and Fractals
  • Advanced Algorithms and Applications
  • EEG and Brain-Computer Interfaces
  • CCD and CMOS Imaging Sensors
  • Cryptography and Residue Arithmetic
  • ECG Monitoring and Analysis
  • Cryptographic Implementations and Security
  • Digital Media Forensic Detection
  • Computational Physics and Python Applications
  • Machine Fault Diagnosis Techniques
  • Non-Invasive Vital Sign Monitoring
  • Sensor Technology and Measurement Systems
  • Radio Frequency Integrated Circuit Design
  • Image and Video Stabilization
  • Embedded Systems and FPGA Applications
  • Neural Networks and Applications
  • Embedded Systems and FPGA Design
  • Ultra-Wideband Communications Technology
  • Image Processing Techniques and Applications
  • Low-power high-performance VLSI design

Polytechnic School of Algiers
2020-2025

École Polytechnique
2022-2024

Abstract The aim of this article is to design a new telehealth system with secured wireless transmission and classification multiple biosignals using e‐Health sensors platform Xbee modules Arduino Uno Raspberry Pi as acquisition processing units, respectively. collected data, such temperature, airflow, position, Galvanic skin response oxygen in the blood can be evaluated order monitor patient health state threshold detection. prediction cardiac based on automatic identification arrhythmias...

10.1111/exsy.12765 article EN Expert Systems 2021-07-12

Real-time constraint is one of the most common challenges found in many critical embedded applications, namely image and video processing. However, software tools such as Matlab general purpose microprocessor are not suitable for deals with a problem. Recently, FPGA reconfigurable circuit its HLS become very promising technology to be widely used applications encompassing all aspects requirements system. This paper presents implementation morphological operation including dilation, erosion...

10.1109/ccssp49278.2020.9151686 article EN 2020-05-01

This paper presents a two Nexys FPGAs implementation of Least Significant Bit (LSB) watermarking applied on real-time speech signals over serial communication system. The technique has been strengthened by means chaos-based encryption scheme for the used watermark image. acquisition is performed using FPGA inbuilt microphone while recovery realized through loudspeaker as output device watermarked signal and VGA monitor image respectively. transmission implemented Universal Asynchronous...

10.1109/icaeccs56710.2023.10104859 article EN 2023-03-06

This paper presents a new approach for designing real-time video network communication and its securing using chaos-based cryptosystem. The proposed design is based on Hardware/Software co-design that has implemented TCP-IP protocol transmission. synchronization been realized by making use of the FPGA PL-PS implementing customized algorithm both hardware software parts between transmitting receiving ends an OV7670 camera input video. obtained results have proven feasibility means...

10.1109/icaeccs56710.2023.10104907 article EN 2023-03-06

Because of the growing number attacks on existing systems, it is crucial to design new cryptographic techniques ensure confidentiality. Although, chaotic systems and deep learning methods have been proven be effective in cryptography because nonlinearity high degree randomness [1] due this, we combined them produce keys. This paper presents time series forecasting models order encryption keys applied applications. Our artificial neural network (ANN) trained by Unified system samples using...

10.1109/icaeccs56710.2023.10105105 article EN 2023-03-06

In recent years, developing new methods for designing Pseudo-Random Number Generators (PRNGs) has attracted the attention of researchers their efficiency in many crypto-graphic applications such as communication and data security. this work, an innovative hybrid design a PRNG based on Artificial Neural Networks (ANNs) chaos theory is proposed. The training fitting proposed ANN model was generated from numerical solution system differential equations driving dynamics Lorenz system. After...

10.1109/icaee53772.2022.9962090 article EN 2022 2nd International Conference on Advanced Electrical Engineering (ICAEE) 2022-10-29

This paper contrasts the implementation of several chaos-based digital image watermarking techniques in terms imperceptibility, robustness, security and complexity. Most spatial transform domains methods have been used namely Least Significant Bit (LSB), Discrete Cosine Transform (DCT), Wavelet (DWT) Redundant (RDWT) with Singular Value Decomposition (SVD) mathematical tool which has enhanced embedding capability. Both continuous discrete chaotic maps Arnold's Chaotic Map (ACM), Logistic map...

10.1109/icaee47123.2019.9015114 article EN 2019 International Conference on Advanced Electrical Engineering (ICAEE) 2019-11-01

This paper reports the design of real-time acquisition and temperature control system using LabVIEW (Laboratory Virtual Instrument Engineering Workbench) which communicate with PC through USB interface. The solution is particularly suitable for educators students interested in developing lab experiments to evaluate variation portable low-cost system. proposed validated an experimental prototype PIC 18F4550 microcontroller. effect on power BJT (Bipolar Junction Transistor) demonstrated by...

10.1109/icaeccs56710.2023.10104863 article EN 2023-03-06

This paper implements on FPGA a point-to-point video transmission prototype between an board and PC as first step using Petalinux based system over embedded processor in hardware/software codesign approach, generalized later to the two ZedBoard plat-forms TCP/IP ethernet protocol. The hardware implementation is exploited implement spatial watermarking for both visible invisible techniques additive Least Significant Bit (LSB) methods respectively. Prototype performances are evaluated terms of...

10.1109/icnas59892.2023.10330489 article EN 2023-10-21

This paper presents a Genesys-2 FPGA implementation of three video watermarking techniques in both spatial and frequency domains followed by comparative analysis. The acquisition is realized using OV7670 camera used for real-time with each technique visible invisible schemes Video Graphics Adapter (VGA) display validations. implemented are based on Least Significant bit (LSB), additive watermarking. All implementations have been Software/Hardware (SW/HW) co-design Vivado-HLS tool achieving...

10.1109/ispa54004.2022.9786311 article EN 2022-05-08

In this work, a hardware implementation of an image watermarking technique is presented, the scheme based on Discrete Wavelet Transform (DWT). The embedding process made in transform domain, using one-level DWT coefficients we insert watermark into host and return to spatial domain transmit data. detection stage adopt non-blind extract from after image. A co-design developed, FPGA, accelerate authentication. Comparing with other achievements, our proposed schemes shows some improvement term...

10.1109/icaee53772.2022.9962026 article EN 2022 2nd International Conference on Advanced Electrical Engineering (ICAEE) 2022-10-29

This paper presents a research study leading to robust chaos-based scheme for digital image watermarking applications in the transform domain. The steps undergone include combining, repeating process, three performant conventional mathematical transforms of Direct Cosine Transform (DCT), Discrete Wavelet (DWT) and variants with different state-of-the-art advanced techniques namely Curvelet (DCuT), Radon (DRaT) Finite Ridgelet (FRT). Results have shown neat improvements imperceptibility...

10.1109/ispa48434.2019.8966894 article EN 2019-11-01
Coming Soon ...