About
32
Publications
2,995
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
352
Citations
Introduction
Faten Chaabane currently works at the Computer Engineering and Applied Mathematics Department, Ecole Nationale d'Ingénieurs de Sfax.
Publications
Publications (32)
Because of the availability of more than an actor and a wireless component in an e-health application, providing more security and safety to users of this type of applications is expected. Moreover, ensuring protection of data user available or shared within different services from any security attack becomes an important requirement. In this paper...
Industry has undergone, during this decade, significant technological changes and improvements. The industrial sector is further moving towards IIoT (Industrial IoT) and Industry 4.0. Security and data reliability are IoT limitations that can be overcome using the Blockchain technology. In this work, the integration of blockchain in Industry 4.0 is...
There has been an outstanding use of memory storage of processors as current applications: Artificial Intelligence-based applications, 3D-reconstruction or Blockchain ones, take advantage of their large computing effort, as well as their ability to support greedy treatments, and it grows the concern about providing reasonable resources for an effic...
The 3D video traitor tracing approach is an effective technique for securing 3D content. This approach involves the protection of the multimedia content and the prevention of each malicious manipulation by embedding the Collusion-Secure Fingerprinting (CSF) codes. Traitor tracing aims also at retrieving back the actors who contributed to the constr...
In Tunisia, one of the major problems of the olive oil industry is marketing. Several factors have an impact, such as quality, originality, lobbying, subsidies and the certification of extra virgin olive oil. The major problem remains the traceability of the production process to guarantee the origin of the food at all times. This fine-grained trac...
With the onset of the COVID-19 pandemic and the succession of its waves, the transmission of this disease and the number of deaths caused by it have been increasing. Despite the various vaccines, the COVID-19 virus is still contagious and dangerous for affected people. One of the remedies to this is precaution, and particularly social distancing. I...
Securing multimedia content and preventing it from being maliciously manipulated has developed at a rapid pace, and researchers have been studying the traitor tracing as an appropriate solution. This approach consists in retrieving back the actors who contributed to the construction of an illegal release of a multimedia product. It includes two maj...
To bridge the current gap between the Blockchain expectancies and their intensive computation constraints, the present paper advances a lightweight processing solution, based on a load-balancing architecture, compatible with the lightweight/embedding processing paradigms. In this way, the execution of complex operations is securely delegated to an...
Because of the availability of more than an actor and a wireless component among e-health applications, providing more security and safety is expected. Moreover, ensuring data confidentiality within different services becomes a key requirement. In this paper, we propose to collect data from health and fitness smart devices deployed in connection wi...
A Brain-Computer Interface (BCI) is a system used to communicate with an external world through the brain activity. The brain activity is measured by electroencephalography (EEG) signal and then processed by a BCI system. EEG source reconstruction could be a way to improve the accuracy of EEG classification in EEG based brain-computer interface (BC...
The adoption of Internet of Things (IoT) technology across many applications, such as autonomous systems, communication, and healthcare, is driving the market’s growth at a positive rate. The emergence of advanced data analytics techniques such as blockchain for connected IoT devices has the potential to reduce the cost and increase in cloud platfo...
Advancement in information and communication technology in health sector has been developed at a rapid pace, and has consequently improved its different services. Securing patients’s health documents becomes crucial and researchers have investigated more than one privacy measures involving the access control, the security and the integrity of these...
The watermarking layer has a crucial role in a collusion-secure fingerprinting framework since the hidden information, or the identifier, directly attached to user identification, is implanted in the media as a watermark. In this paper, we propose a new zero watermarking technique for 3D videos based on Support Vector Machine (SVM) classifier. Henc...
The easiness of using and manipulating digital media content has a volte face. In fact, although average users can simply be familiar with some manipulations such as a simple duplication, these manipulations can be dangerous with dishonest users whose target is illegal. Manipulating and duplicating digital media content via the Internet and Peer to...
The multimedia traitor tracing field involves the embedding of a collusion secure fingerprint in the host signal to retrieve and prevent any multimedia content fraud. Trendy work aims at providing a tracing system which offers a good protection of the digital content and an efficient tracing process. These challenges depend on reducing the length o...
The research work of this thesis concerns the traitor tracing context in multimedia distribution platform. This type of applications which involves a great number of connected users need to include a tracing process to prevent media content from copyright infringement and fraud operations. Tracing traitors, or retrieving fraudulous actor in a pirac...
One of the key challenges of a traitor tracing scheme is to deal with the real scenarios. In this context, the tracing operation is usually constrained by the lack of information about the number of colluders and even the collusion channel. Indeed, the Tardos decoding is invariant regardless the type of collusion, which can be considered as a subop...
Handling a great number of users and surviving different types of attacks present fundamental challenges of the majority fingerprinting systems in the tracing traitor field. In this paper, the proposed technique consists in embedding a fingerprint, a QR code in the audio stream extracted from the media release. Using the QR-code provides several ad...
The encroachment of Internet and Peer to Peer networks has really facilitated our daily lives and works but it contributes to another dangerous phenomenon which is copying a digital content without having authorization, called piracy. To handle this phenomenon, several techniques of tracing traitors were proposed, by combining in the same time a fi...
One of the most important issues of the digital watermarking is the watermark's robustness. That's why the error correcting codes (ECC) techniques were proposed. In this article, the performance of ECC in audio watermarking system is researched. The conclusion is that BCH encoders and turbo codes are the most important encoders. They have the best...