[Retracted] Healthcare and Fitness Data Management Using the IoT‐Based Blockchain Platform

T Frikha, A Chaari, F Chaabane… - Journal of …, 2021 - Wiley Online Library
Because of the availability of more than an actor and a wireless component among e‐health
applications, providing more security and safety is expected. Moreover, ensuring data …

Embedded Keccak implementation on FPGA

J Ktari, T Frikha, MA Yousfi… - … on Design & Test of …, 2022 - ieeexplore.ieee.org
The use of Blockchain has evolved over the last decade. It has touched many fields such as
health, industry 4.0, smart cities, agriculture, education etc. Being a guarantee of security …

Audio watermarking for security and non-security applications

M Charfeddine, E Mezghani, S Masmoudi… - IEEE …, 2022 - ieeexplore.ieee.org
The digitization of audiovisual data is significantly increasing. Thus, to guarantee the
protection of the intellectual properties of this digital content, watermarking has appeared as …

A Novel Robust Spread Spectrum Watermarking Scheme for 3D Video Traitor Tracing

K Abdelhedi, F Chaabane, W Puech, CB Amar - IEEE Access, 2023 - ieeexplore.ieee.org
The 3D video traitor tracing approach is an effective technique for securing 3D content. This
approach involves the protection of the multimedia content and the prevention of each …

Robust and secure watermarking technique for E-health applications

H Choura, F Chaabane, T Frikha, M Baklouti - International Conference on …, 2020 - Springer
Advancement in information and communication technology in health sector has been
developed at a rapid pace, and has consequently improved its different services. Securing …

Toward a Novel LSB-based Collusion-Secure Fingerprinting Schema for 3D Video

K Abdelhedi, F Chaabane, W Puech… - … Conference on Computer …, 2021 - Springer
Securing multimedia content and preventing it from being maliciously manipulated has
developed at a rapid pace, and researchers have been studying the traitor tracing as an …

Reversible Multipurpose Watermarking Algorithm Using ResNet and Perceptual Hashing

M Jiang, H Yang - Journal of Information Processing Systems, 2023 - koreascience.kr
To effectively track the illegal use of digital images and maintain the security of digital image
communication on the Internet, this paper proposes a reversible multipurpose image …

Toward a Novel LSB-based Collusion-Secure Fingerprinting Schema for 3D Video

CB Amar - Computer Analysis of Images and Patterns: 19th …, 2021 - books.google.com
Securing multimedia content and preventing it from being maliciously manipulated has
developed at a rapid pace, and researchers have been studying the traitor tracing as an …

[PDF][PDF] Research Article Healthcare and Fitness Data Management Using the IoT-Based Blockchain Platform

T Frikha, A Chaari, F Chaabane, O Cheikhrouhou… - 2021 - academia.edu
Because of the availability of more than an actor and a wireless component among e-health
applications, providing more security and safety is expected. Moreover, ensuring data …