Skip to main content

Showing 1–5 of 5 results for author: Haziti, M E

Searching in archive cs. Search in all archives.
.
  1. M-Centrality: identifying key nodes based on global position and local degree variation

    Authors: Ahmed Ibnoulouafi, Mohamed El Haziti, Hocine Cherifi

    Abstract: Identifying influential nodes in a network is a major issue due to the great deal of applications concerned, such as disease spreading and rumor dynamics. That is why, a plethora of centrality measures has emerged over the years in order to rank nodes according to their topological importance in the network. Local metrics such as degree centrality make use of a very limited information and are eas… ▽ More

    Submitted 3 January, 2023; originally announced January 2023.

    Journal ref: Journal of Statistical Mechanics: Theory and Experiment, Volume 2018, July 2018

  2. A Robust Blind 3-D Mesh Watermarking based on Wavelet Transform for Copyright Protection

    Authors: Mohamed Hamidi, Mohamed El Haziti, Hocine Cherifi, Driss Aboutajdine

    Abstract: Nowadays, three-dimensional meshes have been extensively used in several applications such as, industrial, medical, computer-aided design (CAD) and entertainment due to the processing capability improvement of computers and the development of the network infrastructure. Unfortunately, like digital images and videos, 3-D meshes can be easily modified, duplicated and redistributed by unauthorized us… ▽ More

    Submitted 9 November, 2019; originally announced November 2019.

    Comments: 6 pages, 3 figures, International Conference on Advanced Technologies for Signal and Image Processing (ATSIP'2017)

  3. Hybrid blind robust image watermarking technique based on DFT-DCT and Arnold transform

    Authors: Mohamed Hamidi, Mohamed El Haziti, Hocine Cherifi, Mohammed El Hassouni

    Abstract: In this paper, a robust blind image watermarking method is proposed for copyright protection of digital images. This hybrid method relies on combining two well-known transforms that are the discrete Fourier transform (DFT) and the discrete cosine transform (DCT). The motivation behind this combination is to enhance the imperceptibility and the robustness. The imperceptibility requirement is achiev… ▽ More

    Submitted 2 November, 2019; originally announced November 2019.

    Comments: 34 page, 17 figures, published in Multimedia Tools and Applications Springer, 2018

    Journal ref: Multimedia Tools and Applications, 77(20), 27181-27214 (2018)

  4. Blind Robust 3-D Mesh Watermarking based on Mesh Saliency and QIM quantization for Copyright Protection

    Authors: Mohamed Hamidi, Aladine Chetouani, Mohamed El Haziti, Mohammed El Hassouni, and Hocine Cherifi

    Abstract: Due to the recent demand of 3-D models in several applications like medical imaging, video games, among others, the necessity of implementing 3-D mesh watermarking schemes aiming to protect copyright has increased considerably. The majority of robust 3-D watermarking techniques have essentially focused on the robustness against attacks while the imperceptibility of these techniques is still a real… ▽ More

    Submitted 28 October, 2019; originally announced October 2019.

    Comments: 11 pages, 5 figures, published in IbPRIA 2019: 9th Iberian Conference on Pattern Recognition and Image Analysis. arXiv admin note: substantial text overlap with arXiv:1910.11211

  5. A blind Robust Image Watermarking Approach exploiting the DFT Magnitude

    Authors: Mohamed Hamidi, Mohamed El Haziti, Hocine Cherifi, Driss Aboutajdine

    Abstract: Due to the current progress in Internet, digital contents (video, audio and images) are widely used. Distribution of multimedia contents is now faster and it allows for easy unauthorized reproduction of information. Digital watermarking came up while trying to solve this problem. Its main idea is to embed a watermark into a host digital content without affecting its quality. Moreover, watermarking… ▽ More

    Submitted 21 October, 2019; originally announced October 2019.

    Comments: 6 pages, 4 Figures, published in : (2015) IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA)