Publications by Author: TITOUNA, Faiza

2022
Benoughidene A, TITOUNA F. A novel method for video shot boundary detection using CNN-LSTM approach. International Journal of Multimedia Information Retrieval [Internet]. 2022;11. Publisher's VersionAbstract

Due to the rapid growth of digital videos and the massive increase in video content, there is an urgent need to develop efficient automatic video content analysis mechanisms for different tasks, namely summarization, retrieval, and classification. In all these applications, one needs to identify shot boundary detection. This paper proposes a novel dual-stage approach for cut transition detection that can withstand certain illumination and motion effects. Firstly, we present a deep neural network model using the pre-trained model combined with long short-term memory LSTM network and the euclidean distance metric. Two parallel pre-trained models sharing the same weights extract the spatial features. Then, these features are fed to the LSTM and the euclidean distance metric to classify the frames into specific categories (similar or not similar). To train the model, we generated a new database containing 5000 frame pairs with two labels (similar, dissimilar) for training and 1000 frame pairs for testing from online videos. Secondly, we adopt the segment selection process to predict the shot boundaries. This preprocessing method can help improve the accuracy and speed of the VSBD algorithm. Then, cut transition detection based on the similarity model is conducted to identify the shot boundaries in the candidate segments. Experimental results on standard databases TRECVid 2001, 2007, and RAI show that the proposed approach achieves better detection rates over the state-of-the-art SBD methods in terms of the F1 score criterion.

2020
Hamza R, Yan Z, Muhammad K, Bellavista P, TITOUNA F. A privacy-preserving cryptosystem for IoT E-healthcare. Information SciencesInformation Sciences. 2020;527 :493-510.
2019
Titouna C, TITOUNA F, Ari AAA. Outlier detection algorithm based on mahalanobis distance for wireless sensor networks. 2019 International Conference on Computer Communication and Informatics (ICCCI). 2019 :1-6.
2018
Hamza R, Hewage C, TITOUNA F. INVESTIGATION OF THREE-DIMENSIONAL IMAGE SECURITY BASED ON IMPROVED IMAGE RANDOMISED ENCRYPTION METHOD. NED University Journal of ResearchNED University Journal of Research. 2018.
2017
Hamza R, Muhammad K, Lv Z, TITOUNA F. Secure video summarization framework for personalized wireless capsule endoscopy. Pervasive and Mobile ComputingPervasive and Mobile Computing. 2017;41 :436-450.Abstract
Wireless capsule endoscopy (WCE) has several benefits over traditional endoscopy such as its portability and ease of usage, particularly for remote internet of things (IoT)-assisted healthcare services. During the WCE procedure, a significant amount of redundant video data is generated, the transmission of which to healthcare centers and gastroenterologists securely for analysis is challenging as well as wastage of several resources including energy, memory, computation, and bandwidth. In addition to this, it is inherently difficult and time consuming for gastroenterologists to analyze this huge volume of gastrointestinal video data for desired contents. To surmount these issues, we propose a secure video summarization framework for outdoor patients going through WCE procedure. In the proposed system, keyframes are extracted using a light-weighted video summarization scheme, making it more suitable for WCE. Next, a cryptosystem is presented for security of extracted keyframes based on 2D Zaslavsky chaotic map. Experimental results validate the performance of the proposed cryptosystem in terms of robustness and high-level security compared to other recent image encryption schemes during dissemination of important keyframes to healthcare centers and gastroenterologists for personalized WCE.
AKSA K, TITOUNA F, BENALI B, DJETTAOU B. Gestion Dynamique des Carrefours à Feux. IJMS - The International Journal of Multi-disciplinary Sciences [Internet]. 2017;1 (17). Publisher's VersionAbstract

Les technologies utilisées dans les systèmes de transport intelligents varient, allant

de systèmes de gestion basiques

comme les systèmes de gestion des carrefours à

feux, les systèmes de gestion des conteneurs, les panneaux à messages variables,

radars automatiques ou la vidéosurveillance aux applications plus avancées qui

intègrent des données en temps

-

réel avec ret

ours d'informations de nombreuses

sources, comme les informations météorologiques, ...etc.

Cet article donne un

bref

aperçu sur

une

gestion intelligente des carrefours à feux

utilisant des capteurs sans fils

2016
Hamza R, TITOUNA F. A novel sensitive image encryption algorithm based on the Zaslavsky chaotic map. Information Security Journal: A Global PerspectiveInformation Security Journal: A Global Perspective. 2016;25 :6.Abstract
In this article, a novel sensitive encryption scheme to secure the digital images based on the Zaslavsky chaotic map is proposed. We employ the Zaslavsky chaotic map as a pseudo-random generator to produce the key encryption of the proposed image cryptosystem. The cipher structure has been chosen based on permutation-diffusion processes, where we adopt the classic permutation substitution network, which ensures both confusion and diffusion properties for the encrypted image. Our proposed algorithm has high sensitivity in plain image and the secret key. Moreover, the results show that the characteristics of our approach have excellent performance, with high scores (NPRC = 99.61%, UACI = 33.47%, entropy (CipherImage)  8, and correlation coefficient  0). Experimental results have been studied and analyzed in detail with various types of security analysis. These results demonstrate that our proposed cryptosystem has highly satisfactory security performance and can withstand various attacks compared to state-of-the-art methods.
2014
TITOUNA F, Benferhat S. Lukasiewicz-based merging possibilistic networks. International journal of approximate reasoningInternational journal of approximate reasoning. 2014;55 :1747-1763.
TITOUNA F, Benferhat S. Merging possibilistic networks through a disjunctive mode. International Conference on Belief Functions. 2014 :265-274.
2013
TITOUNA F, Benferhat S. Qualitative fusion-based traffic signal preemption. Proceedings of the 16th International Conference on Information Fusion. 2013 :1926-1933.
2012
TITOUNA F, Titouna C, Benferhat S. Probabilistic Checkpointing Protocol to Sensor Network Fault-Tolerant. International Journal of Computer Science Issues (IJCSI)International Journal of Computer Science Issues (IJCSI). 2012;9 :112.
2011
Benferhat S, TITOUNA F. On the fusion of probabilistic networks. International Conference on Industrial, Engineering and Other Applications of Applied Intelligent Systems. 2011 :49-58.
2009
Benferhat S, TITOUNA F. Fusion and normalization of quantitative possibilistic networks. Applied IntelligenceApplied Intelligence. 2009;31 :135-160.
TITOUNA F. Fusion de réseaux causaux possibilistes. 2009.
2006
Benferhat S, TITOUNA F. Agregating Quantitative Possibilistic Networks. FLAIRS Conference. 2006 :800-805.
2005
Benferhat S, TITOUNA F. Min-based fusion of possibilistic networks. EUSFLAT Conf. [Internet]. 2005 :553-558. Publisher's Version