The security of image and video data is important formany applications which require in real-time a highsecurity level. In the first part of this work, fourchaos-based cryptosystems, flexible, efficient, andmore robust against cryptanalysis, are designed andrealized. The first two cryptosystems are based on thesubstitution-permutation network. The substitution isachieved by a proposed modified Finite Skew TentMap (FSTM) to overcome various problems: fixedpoint, key space restriction, and limitation of mappingbetween plaintext and ciphertext. The thirdcryptosystem is a new and efficient structure. It isbased on a binary diffusion layer of pixels, followed bya bit-permutation layer. The permutation is achievedby an efficient proposed formulat...
The objective of this thesis was to elaborate high performance control strategies and their real-tim...
This thesis comes within the scope of the emerging 3D systems and their issues of multi-view-plus-de...
This thesis investigates the major factors affecting teleoperation transparency in medical context.A...
Our approach in this thesis was to identify where FHE could be used in computer science and to build...
The Internet of Things (loT) is now a reality. Forthcoming applications will boost mobile video dema...
Efficient video compression is nowadays a critical issue, and is expected to be more and more crucia...
This PhD project takes place in List MAPS, a Horizon 2020-funded Marie Curie Actions InnovativeTrain...
Keeping the fast evolving pace of embedded systems of portable devices require ameliorations of powe...
With the advent of Location-Based-Systems, positioning systems must face new security requirements: ...
Systems-on-chips in the field of digital communications are becoming extremely diversified and compl...
In this manuscript we address data-hiding in images and videos. Specifically we address robust water...
In the recent time, the field of image steganalysis and steganography became more important due to t...
Iterative processing is widely adopted nowadays in modern wireless receivers for the decoding of adv...
The work done during this Ph.D. lies at the crossroads of symmetric cryptography and constraints env...
Machine Learning (ML) algorithms have proven themselves very powerful. Especially classification, en...
The objective of this thesis was to elaborate high performance control strategies and their real-tim...
This thesis comes within the scope of the emerging 3D systems and their issues of multi-view-plus-de...
This thesis investigates the major factors affecting teleoperation transparency in medical context.A...
Our approach in this thesis was to identify where FHE could be used in computer science and to build...
The Internet of Things (loT) is now a reality. Forthcoming applications will boost mobile video dema...
Efficient video compression is nowadays a critical issue, and is expected to be more and more crucia...
This PhD project takes place in List MAPS, a Horizon 2020-funded Marie Curie Actions InnovativeTrain...
Keeping the fast evolving pace of embedded systems of portable devices require ameliorations of powe...
With the advent of Location-Based-Systems, positioning systems must face new security requirements: ...
Systems-on-chips in the field of digital communications are becoming extremely diversified and compl...
In this manuscript we address data-hiding in images and videos. Specifically we address robust water...
In the recent time, the field of image steganalysis and steganography became more important due to t...
Iterative processing is widely adopted nowadays in modern wireless receivers for the decoding of adv...
The work done during this Ph.D. lies at the crossroads of symmetric cryptography and constraints env...
Machine Learning (ML) algorithms have proven themselves very powerful. Especially classification, en...
The objective of this thesis was to elaborate high performance control strategies and their real-tim...
This thesis comes within the scope of the emerging 3D systems and their issues of multi-view-plus-de...
This thesis investigates the major factors affecting teleoperation transparency in medical context.A...