Publications by Author: Behloul, Ali

2023
Hattab A, Behloul A. A Robust Iris Recognition Approach Based on Transfer Learning. International Journal of Computing and Digital Systems [Internet]. 2023;137 (1). Publisher's VersionAbstract

Iris texture is one of the most secure biometric characteristics used for person recognition, where the most significant step in the iris identification process is effective features extraction. Deep Convolutional Neural network models have been achieved massive success in the features extraction field in recent years, but several of these models have tens to hundreds of millions of parameters, which affect the computational time and resources. A lot of systems proposed in the iris recognition field extract features from normalized iris images after applying many pre-processing steps. These steps affect the quality and computational efficiency of these systems; also, occlusion, reflections, blur, and illumination variation affect the quality of features extracted. This paper proposed a new robust approach for iris recognition that locates the iris region based on the YOLOv4-tiny, then it extracts features without using iris images’ pre-processing, which is a delicate task. In addition, we have proposed an effective model that accelerated the feature extraction process by reducing the architecture of the Inception-v3 model. The obtained results on four benchmark datasets validate the robustness of our approach, where we achieved average accuracy rates of 99.91%, 99.60%, 99.91%, and 99.19% on the IITD, CASIA-Iris-V1, CASIA-Iris-Interval, and CASIA-Iris-Thousand datasets, respectively.

2022
Boudra S, Yahiaoui I, Behloul A. Tree trunk texture classification using multi-scale statistical macro binary patterns and CNN. Applied Soft Computing [Internet]. 2022;118 :108473. Publisher's VersionAbstract

Automated plant classification using tree trunk has attracted increasing interest in the computer vision community as a contributed solution for the management of biodiversity. It is based on the description of the texture information of the bark surface. The multi-scale variants of the local binary patterns have achieved prominent performance in bark texture description. However, these approaches encode the scale levels of the macrostructure separately from each other. In this paper, a novel handcrafted texture descriptor termed multi-scale Statistical Macro Binary Patterns (ms-SMBP) is proposed to encode the characterizing macro pattern of different bark species. The proposed approach consists of defining a sampling scheme at high scale levels and summarizing the intensity distribution using statistical measures. The characterizing macro pattern is encoded by an in-depth gradient that describes the relationship between the scale levels and their adaptive statistical prototype. Besides this handcrafted feature descriptor, a learning-based description is performed with the ResNet34 model for bark classification. Extensive and comprehensive experiments on challenging and large-scale bark datasets demonstrate the effectiveness of ms-SMBP to identify bark species and outperforming different multi-scale LBP approaches. The tree trunk classification with ResNet34 shows interesting results on a very large-scale dataset.

2021
Benbrahim H, Behloul A. Fine-tuned Xception for Image Classification on Tiny ImageNet. 2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP) [Internet]. 2021 :1-4. Publisher's VersionAbstract
Image classification has been one of the most widely topic in artificial intelligence, deep models need larger datasets and powerful hardware to improve the highperformance classification. ImageNet Challenge was started in 2010 to classify 100,000 test images into 1000 different classes. Tiny ImageNet challenge is similar to ImageNet challenge, where images are taken from the standard ImageNet and resized to be 64x64. In this paper a fine-tuned Xception to classify images into the 200 classes is presented using the standard Tiny ImageNet dataset, the down-sampling (64x64) of images and the low similarity inter-class makes feature extraction and classification difficult and more challenging. We used a transfer learning algorithm to fine-tune the Xception architecture using the Extreme version of the Inception module to achieve a high validation accuracy of 65.14%.
Mezzoudj S, Behloul A, Seghir R, Saadna Y. A parallel content-based image retrieval system using spark and tachyon frameworks. Journal of King Saud University - Computer and Information SciencesJournal of King Saud University - Computer and Information Sciences. 2021.Abstract
With the huge increase of large-scale multimedia over Internet, especially images, building Content-Based Image Retrieval (CBIR) systems for large-scale images has become a big challenge. One of the drawbacks associated with CBIR is the very long execution time. In this article, we propose a fast Content-Based Image Retrieval system using Spark (CBIR-S) targeting large-scale images. Our system is composed of two steps. (i) image indexation step, in which we use MapReduce distributed model on Spark in order to speed up the indexation process. We also use a memory-centric distributed storage system, called Tachyon, to enhance the write operation (ii) image retrieving step which we speed up by using a parallel k-Nearest Neighbors (k-NN) search method based on MapReduce model implemented under Apache Spark, in addition to exploiting the cache method of spark framework. We have showed, through a wide set of experiments, the effectiveness of our approach in terms of processing time.
Boudra S, Yahiaoui I, Behloul A. A set of statistical radial binary patterns for tree species identification based on bark images. Multimedia Tools and ApplicationsMultimedia Tools and Applications. 2021;80 :22373-22404.
2020
Zeghina AO, Zoubia O, Behloul A. Face Recognition Based on Harris Detector and Convolutional Neural Networks. International Symposium on Modelling and Implementation of Complex Systems. 2020 :163-171.
2019
Mezzoudj S, Behloul A, Rachid S, Saadna Y. Computer and information sciences. J. King Saud UniversityJ. King Saud University. 2019.
Mezzoudj S, Behloul A, Seghir R, Saadna Y. A parallel content-based image retrieval system using spark and tachyon frameworks. Journal of King Saud University - Computer and Information SciencesJournal of King Saud University - Computer and Information Sciences. 2019.Abstract
With the huge increase of large-scale multimedia over Internet, especially images, building Content-Based Image Retrieval (CBIR) systems for large-scale images has become a big challenge. One of the drawbacks associated with CBIR is the very long execution time. In this article, we propose a fast Content-Based Image Retrieval system using Spark (CBIR-S) targeting large-scale images. Our system is composed of two steps. (i) image indexation step, in which we use MapReduce distributed model on Spark in order to speed up the indexation process. We also use a memory-centric distributed storage system, called Tachyon, to enhance the write operation (ii) image retrieving step which we speed up by using a parallel k-Nearest Neighbors (k-NN) search method based on MapReduce model implemented under Apache Spark, in addition to exploiting the cache method of spark framework. We have showed, through a wide set of experiments, the effectiveness of our approach in terms of processing time.
Saadna Y, Behloul A, Mezzoudj S. Speed limit sign detection and recognition system using SVM and MNIST datasets. Neural Computing and ApplicationsNeural Computing and Applications. 2019;31 :5005–5015.Abstract
This article presents a computer vision system for real-time detection and robust recognition of speed limit signs, specially designed for intelligent vehicles. First, a new segmentation method is proposed to segment the image, and the CHT transformation (circle hog transform) is used to detect circles. Then, a new method based on local binary patterns is proposed to filter segmented images in order to reduce false alarms. In the classification phase, a cascading architecture of two linear support vector machines is proposed. The first is trained on the GTSRB dataset to decide whether the detected region is a speed limit sign or not, and the second is trained on the MNIST dataset to recognize the sign numbers. The system achieves a classification recall of 99.81% with a precision of 99.08% on the GTSRB dataset; in addition, the system is also tested on the BTSD and STS datasets, and it achieves a classification recall of 99.39% and 98.82% with a precision of 99.05% and 98.78%, respectively, within a processing time of 11.22 ms.
Noui L, Belferdi W, Behloul A. A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration . Multidim Syst Sign Process. 2019;30 :1093–1112.
2018
Boudra S, Yahiaoui I, Behloul A. Bark identification using improved statistical radial binary patterns. 2018 International conference on content-based multimedia indexing (CBMI). 2018 :1-6.
Belferdi W, Behloul A, Noui L. A Bayer pattern-based fragile watermarking scheme for color image tamper detection and restoration. Multidimensional Systems and Signal ProcessingMultidimensional Systems and Signal Processing. 2018;30 :1093–1112.Abstract
The security of multimedia documents becomes an urgent need, especially with the increasing image falsifications provided by the easy access and use of image manipulation tools. Hence, usage of image authentication techniques fulfills this need. In this paper, we propose an effective self-embedding fragile watermarking scheme for color images tamper detection and restoration. To decrease the capacity of insertion, a Bayer pattern is used to reduce the color host image into a gray-level watermark, to further improve the security Torus Automorphism permutation is used to scramble the gray-level watermark. In our algorithm, three copies of the watermark are inserted over three components (R, G, and B channels) of the color host image, providing a high probability of detection accuracy and recovery if one copy is destroyed. In the tamper detection process, a majority voting technique is used to determine the legitimacy of the image and recover the tampered regions after interpolating the extracted gray-level watermark. Using our proposed method, tampering rate can achieve 25% with a high visual quality of recovered image and PSNR values greater than 34 (dB). Experimental results demonstrate that the proposed method affords three major properties: the high quality of watermarked image, the sensitive tamper detection and high localization accuracy besides the high-quality of recovered image.
Dilekh T, BENHARZALLAH S, Behloul A. The Impact of Online Indexing in Improving Arabic Information Retrieval Systems. InformaticaInformatica. 2018;42.
Boudra S, Yahiaoui I, Behloul A. Plant identification from bark: A texture description based on Statistical Macro Binary Pattern. 2018 24th International Conference on Pattern Recognition (ICPR). 2018 :1530-1535.
2017
Boudra S, Yahiaoui I, Behloul A. Statistical radial binary patterns (srbp) for bark texture identification. International conference on advanced concepts for intelligent vision systems. 2017 :101-113.
2016
Belferdi W, Noui L, Behloul A. A Novel Cholesky Decomposition-based Scheme for Strict Image Authentication. 2nd international Conference on Pattern Analysis and Intelligent Systems. 2016.
2015
Boudra S, Yahiaoui I, Behloul A. A comparison of multi-scale local binary pattern variants for bark image retrieval. International conference on advanced concepts for intelligent vision systems. 2015 :764-775.
Behloul A, Belkacemi S. Plants leaves images segmentation based on pseudo Zernike moments. International Journal of Image, Graphics and Signal ProcessingInternational Journal of Image, Graphics and Signal Processing. 2015;7 :17.
2014
Belferdi W, Behloul A, Naoui L. A blind dual color images watermarking based on IWT and sub-sampling. 3rd international Conference on Complex Systems CISC’2014. 2014.
Behloul A. A blind robust image watermarking using interest points and IWT. Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems. 2014 :139-145.

Pages