Kafi Mohamed Redouane

Kafi Mohamed Redouane
University of Ouargla · Department of Electrical Engineering

Phd

About

64
Publications
7,995
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,040
Citations
Introduction
Kafi Mohamed Redouane currently works at the Department of Electrical Engineering, Université Kasdi Merbah Ouargla. Kafi does research in Aeronautical Engineering, Control Systems Engineering and Electronic Engineering.

Publications

Publications (64)
Article
Full-text available
Medical image security is a critical concern in the healthcare domain, and various watermarking techniques have been explored to embed imperceptible and secure data within medical images. This paper introduces an innovative frequency-based watermarking technique for medical images, utilizing the Fractional Discrete Cosine Transform (FDCT) and Schur...
Article
Full-text available
How to guarantee the confidentiality of sensitive data communicated over the Internet and restrict access to designated information is today’s key security and protection concern in telemedicine. In this work, we suggest a reliable and blind medical image watermarking method that combines integer wavelet transform (IWT) and singular value decomposi...
Article
Full-text available
Robustness, imperceptibility and embedding capacity are the preliminary requirements of any digital audio watermarking technique. However, research has concluded that these requirements are difficult to achieve at the same time. Thus, the watermarking technique is closely dependent on the solution that manages the robustness / imperceptibility trad...
Article
In modern aerospace engineering, fault-tolerant control (FTC) has become increasingly vital for maintaining spacecraft functionalities, including attitude control. The attitude determination module incorporates data from different sensors. Star trackers and gyroscopes provide attitude and angular rate measurements affected by noise. To minimize the...
Article
Full-text available
Routing protocol plays a vital role in FANETs (Flying Ad-Hoc Networks) by facilitating communication between nodes and enabling the establishment of efficient routes. In a FANET, where the nodes can be drones, airplanes or other unmanned aerial vehicles, mobility is a key aspect that requires proper route management. Among the most well-known and w...
Article
Full-text available
The rapid progression of Cloud Computing (CC) technology has ushered in innovative ecosystem concepts such as Mobile Cloud Computing (MCC). In this context, the incorporation of Unmanned Aerial Vehicles (UAVs) into these cloud ecosystems has unlocked new avenues for use cases such as delivery services, disaster response, and surveillance. However,...
Article
Full-text available
Maintaining the secrecy of sensitive data transferred over the Internet while restricting access to approved information is a significant security and protection challenge in telemedicine today. In this work, we present a trustworthy and blind watermarking approach for medical photographs using the Integer Wavelet Transform (IWT) and Singular Value...
Article
Full-text available
By incorporating a signature into multimedia files, notably pictures, watermarking is a technique for preventing destructive attacks. Inversely, traditional watermarking techniques have limitations when it comes to sensitive images like those used in the medical field. In fact, the additional mark frequently alters the image permanently and may hid...
Article
A significant security and protection concern in telemedicine at the moment is how to secure the confidentiality of sensitive data delivered over the Internet and limit access to designated information. In this paper, we propose medical ECG data privacy protection using secure and blind watermarking. The proposed method converts the ECG signal into...
Article
Full-text available
Predicting the Remaining Useful Life (RUL) or the Time of Failure (ToF) is the main concern of predictive maintenance. Accurately predicting the RUL for systems with small datasets is challenging. To solve the problem of low RUL prediction accuracy in such cases, a novel approach based on machine learning is proposed to accurately predict the RUL o...
Article
Full-text available
Convolutional Neural Network (CNN) has shown remarkable success in the area of machine vision. The purpose of this research is to enhance the classification for the few-shot learning datasets by developing a robust feature extraction system using an optimized CNN model. The aforementioned goal is attained in the following way by developing two clas...
Article
A crucial security and protection challenge today in telemedicine is how to ensure the confidentiality of sensitive data sent over the internet and limit access to specified designated information. To keep such details private, we propose in this work a robust and blind medical image watermarking approach that combines integer wavelet transform (IW...
Article
Full-text available
One method for securing multimedia data, and images in particular, from malicious attacks is watermarking, which involves adding a signature to the images. Traditional watermarking techniques, however, have drawbacks when used on sensitive images like those used in medicine. A reliable and blind watermarking method is suggested in this work to secu...
Article
Purpose Watermarking is one of the techniques used to protect multimedia data, and images in particular, from malicious attacks by inserting a signature into these images. However, traditional watermarking schemes encounter limitations for sensitive images such as medical images. Methods In this work, a robust and blind watermarking approach is p...
Article
Watermarking is a technique for protecting multimedia data, mainly images, from malicious attacks by adding a signature into these images. Traditional watermarking techniques, unfortunately, have drawbacks when used on sensitive images like those used in medicine. A reliable and blind watermarking method is suggested in this work to protect medical...
Article
Full-text available
Today, solar energy systems based on photovoltaic (PV) panels associated with power converters are increasingly used to supply isolated sites. This structure has attracted several studies as a cost-effective, freely available, efficient source of clean and low-cost energy. However, the faults in power converters can affect the stability of the cont...
Article
Full-text available
The production of Oil & Gas from underground reservoirs involves chemical and mechanical processes that affect well drilling and operation. Many of these processes may eventually cause a problem with the well, resulting in a decrease in production or in equipment failure. This paper deals with fault prognosis during the practical operation of Oil &...
Conference Paper
Full-text available
In spacecraft attitude control, maintaining an accurate estimate of attitude readings is crucial. Due to aging factors of sensors like gyroscopes, emerged drift or bias from the correct rate values lead to decreased pointing accuracy. This paper proposes unsupervised data-driven approach in order to diagnose in early stage abnormal drifts in spacec...
Article
Full-text available
Medical data is transferred between hospitals and healthcare providers via telemedicine to improve patient care. This transfer exposes medical data to a number of security risks. While most existing security solutions, such as cryptographic techniques , protect data from unauthorized access, this protection is only effective when the data is encryp...
Article
Full-text available
In this work, a range image watermarking approach is proposed. First, the image is segmented using active contours; the watermark is then integrated into the resulting contour coordinates. Three active contour methods are used to segment the range image, the obtained segmentation results allow to define the algorithm offering a good compro�mise bet...
Article
Full-text available
Watermarking is a method of protecting multimedia material, especially images, from malicious attacks by embedding a fingerprint. Whenever it comes to sensitive pictures, such as medical images, traditional watermarking methods, on the other hand, show their limitations. Indeed, the additional mark typically alters the picture in an irreversible ma...
Article
Full-text available
Medical data is transferred between hospitals and healthcare providers via telemedicine to improve patient care. This transfer exposes medical data to a number of security risks, and while most existing security solutions, such as cryptographic approaches, protect data from unauthorized access, this protection is only effective when the data is enc...
Article
Full-text available
The increased cost of fuel and maintenance in aircraft system lead to the concept of more electric aircraft, moreover this concept increase the use of power electronic converters in aircraft power system. Since in this application, the reliability is a crucial feature. Therefore, the use of more efficient, reliable and robust power converter with h...
Article
Full-text available
In telemedicine, medical data are exchanged between hospitals and healthcare professionals to facilitate patient care. This transmission will expose the medical data to several security threats and most existing security mechanisms such as cryptographic techniques secure data from unauthorized access but this protection is only valid when the data...
Article
Full-text available
Medical images became a very important information tool for health professionals. Currently , the medical image acquired in a hospital or an imaging center can be shared among several health professionals to facilitate patient management and improve medical information management. In this work, we proposed a robust and blind watermarking approach t...
Article
Patient information is currently maintained separately from the physiological signals received in telemedicine. Furthermore, in recent years, the usage of portable devices to obtain such medical information has become more common. This form of storing can lead to several other authentication issues and compromise the accuracy of diagnostics. To add...
Article
Broken rotor bars of a Squirrel Cage Induction Generator (SCIG) impact significantly the quality and quantity of produced electrical energy from Wind Energy Conversion Systems (WECS) because: (1) they change the characteristics of SCIG entailing the invalidity of the designed Maximum Power Point Trucking (MPPT) control and pitch angle control, (2)...
Article
Watermarking is one of the techniques used to protect multimedia data, and images in particular, from malicious attacks by inserting a signature into these images. However, traditional watermarking schemes encounter limitations for sensitive images such as medical images. Indeed, the inserted mark often alters the image in an irreversible way and c...
Article
To secure the heartbeat sound exchanged in telemedicine, we propose in this work a blind watermarking approach combining a Non-Subsampled Shearlet Transform and Singular Value Decomposition. This approach allows guaranteeing the patients' successful authentication by integrating a watermark containing the patient's specific information as well as h...
Article
In this work, we proposed a robust and blind watermarking approach to adequately secure medical images exchanged in telemedicine. This approach ensures the traceability and integrity of the medical and essential image for data security in the field of telemedicine. In this paper, a blind watermarking method is proposed to adequately secure the elec...
Article
Full-text available
In order to increase the security of medical image sharing and transfer, we present in this work a watermarking approach to protect medical images. This approach consists of inserting hospital signature information and patient data into the medical image. The goal of our work is to integrate the watermark with as little distortion as possible to re...
Article
Full-text available
In order to enhance the security of exchanged medical images in telemedicine, we propose in this paper a blind and robust approach for medical image protection. This approach consists in embedding patient information and image acquisition data in the image. This imperceptible integration must generate the least possible distortion. The watermarked...
Article
Full-text available
The goal of this work is to protect as much as possible the images exchanged in telemedicine, to avoid any confusion between the patient’s radiographs, these images are watermarked with the patient’s information as well as the acquisition data. Thus, during the extraction, the doctor will be able to affirm with certainty that the images belong to t...
Conference Paper
In order to enhance the security of data exchanged in telemedicine, we propose in this work a blind watermarking scheme for audio sounds protection. A blind watermark method is proposed; the successful watermark integration will be typically done by combining three successive values parity; each variant will adequately represent a different combina...
Article
Full-text available
In order to contribute to the security of medical image, we present in this paper a blind and robust watermarking technique that allows the integration of the electronic patient’s record into retinal images. In our work, we present an approach developed to find a compromise between capacity and imperceptibility. The proposed blind watermarking appr...
Conference Paper
Full-text available
The Dual Stator Induction Motor (DSIM) machine is the most common multiphase machine, undoubtedly because it constitutes a good compromise between sufficient power segmentation and a converter-machine assembly that is not too complicated and of acceptable price. The PI regulator has good dynamic performance but it is sensitive to the variation of t...
Article
In order to secure the exchanged medical images in telemedicine, we propose in this work two blind watermarking approaches for the medical images protection. In the first scheme a combination of DCT and Schur decomposition is performed. In order to obtain a good compromise between robustness and imperceptibility, the integration is performed in the...
Article
Full-text available
In order to improve the security of images exchanged in telemedicine, we propose in this paper, 2 watermarking schemes for retinal image protection; each scheme will be declined into 2 variants. The integration of the watermark will be performed by combining the parity of the successive values; each variant will represent a different combination. T...
Article
Nowadays, several information security issues can compromise the medical images administration. The source and origin of the medical image must be authenticated to verify that it corresponds to the right patient. A second issue is to avoid detachment between an electronic medical record and the corresponding images. One possible solution is the use...
Article
In order to protect audio files, we propose in this paper a new integration scheme for blind audio file watermarking. The goal is to find a compromise between capacity and imperceptibility in order to hide as much data as possible while minimizing file degradation. This integration scheme is implemented in the three insertion domains: spatial, freq...
Article
Full-text available
In order to contribute to the security of medical image, we present in this paper a blind and robust watermarking technique that allows the integration of the electronic patient’s record into a computerized tomography scan. In this approach, a discrete wavelet transform is applied to the image before the integration process, then, a topological reo...
Article
In this paper; we propose two new substitution schemes for digital audio watermarking based on the Fourier transform. The integration of the watermark will be performed by combining the parity of the successive coefficients values; each variant will represent a different combination. In our experiments several variants of the Fourier transform are...
Article
In this work, we propose a blind watermarking approach for medical image protection. In this approach, the watermark will be constituted of the Electronic Patient Record and the image acquisition data. In order to enhance the security and guarantee the data integrity, the Electronic Patient Record hash will be added to the watermark. The integratio...
Conference Paper
Full-text available
Spacecrafts are known to be very complex engineering systems where many technological devices enter in interaction to guarantee the overall mission objectives. Regardless of those sophisticated manufacturing systems, faults/failures are inevitable during the satellite lifetime. This paper aims at discussing the state-of-the-art approaches proposed...
Article
Full-text available
The aim of this study is to propose a self-sensing control of internal permanent-magnet synchronous machines (IPMSMs) based on new high order sliding mode approaches. The high order sliding mode control will be combined with the backstepping strategy to achieve global or semi global attraction and ensure finite time convergence. The proposed contro...
Article
This article explores the design of a generalized feedback control operator coupled with state estimation for a twin-rotor MIMO system (TRMS) intended to regulate its predefined configurations (i.e., pitch and yaw) or follow time-varying reference configurations in a unified manner. Designing a generalized controller subject to the process and meas...
Article
In this paper, a local model network H-infinity control is proposed for CE-150 helicopter stabilization. The proposed strategy capitalizes on recent developments on H-infinity control and its promising results in robust stabilization of plants under unstructured uncertainties. CE-150 helicopters are known for their varying operating conditions alon...
Conference Paper
This paper introduces a custom real-time control platform design for a quadrotor. The control framework is designed to be universal but yet, flexible for implementation of various control and navigation algorithms. The developed platform is modular and is presented in three categories: hardware, software and communication. System identification is...
Conference Paper
Full-text available
In this paper, a balance control scheme is introduced for hopping robots using neural networks. The control strategy uses a trade-off strategy to achieve both hip and body angle control simultaneously with a single controller, which yields reduced complexity. Hence, the proposed controller allows the hopping robot to track a pre-defined state traje...

Network

Cited By