A Review on Anaglyph 3D Image and Video Watermarking View Full Text


Ontology type: schema:ScholarlyArticle     


Article Info

DATE

2019-06

AUTHORS

Dorra Dhaou, Saoussen Ben Jabra, Ezzeddine Zagrouba

ABSTRACT

Thanks to the rapid growth of internet and the advanced development of 3D technology, 3D images and videos are proliferated over the networks. However, this causes several insecurity problems, and protecting this type of media has become a main challenge for many researchers. 3D watermarking is considered as an efficient solution for 3D data protection. In fact, it consists in embedding a secret key into a 3D content to protect it and in trying to extract it after any attack applied on marked 3D data. Anaglyph is the most popular and economical method among different 3D visualization methods. For this reason, it has become used for many 3D applications. Hence, 3D anaglyph watermarking presents an important research area, and several techniques have been proposed in order to protect this type of media. In this survey paper, the existing anaglyph 3D images and videos watermarking techniques are discussed. This discussion shows that the anaglyph video watermarking field is still not mature and new techniques should be proposed to improve the invisibility/robustness trade-off. In addition, based on the study of anaglyph generation methods, it is concluded that signature can be embedded during the generation stage. More... »

PAGES

13

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/s13319-019-0223-1

DOI

http://dx.doi.org/10.1007/s13319-019-0223-1

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1112944071


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0801", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Artificial Intelligence and Image Processing", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Tunis El Manar University", 
          "id": "https://www.grid.ac/institutes/grid.12574.35", 
          "name": [
            "LR16ES06 Research Laboratory of Computer Science, Modeling and Information and Knowledge Processing (LIMTIC), Higher Institute of Computer Science, University Tunis El Manar, 2 Street Abou Raihane Bayrouni, 2080, Ariana, Tunisia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Dhaou", 
        "givenName": "Dorra", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Sousse", 
          "id": "https://www.grid.ac/institutes/grid.7900.e", 
          "name": [
            "LR16ES06 Research Laboratory of Computer Science, Modeling and Information and Knowledge Processing (LIMTIC), National Engineering School of Sousse (ENISo), University of Sousse, BP 264 Sousse Erriadh, 4023, Sousse, Tunisia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Ben Jabra", 
        "givenName": "Saoussen", 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Tunis El Manar University", 
          "id": "https://www.grid.ac/institutes/grid.12574.35", 
          "name": [
            "LR16ES06 Research Laboratory of Computer Science, Modeling and Information and Knowledge Processing (LIMTIC), Higher Institute of Computer Science, University Tunis El Manar, 2 Street Abou Raihane Bayrouni, 2080, Ariana, Tunisia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Zagrouba", 
        "givenName": "Ezzeddine", 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "https://doi.org/10.1080/18756891.2014.889843", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1001701040"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s11042-013-1435-7", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1003836735", 
          "https://doi.org/10.1007/s11042-013-1435-7"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1117/12.837163", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1004292582"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.aeue.2012.11.009", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1006706551"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.dsp.2015.09.007", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1012220457"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s00530-015-0475-4", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1020542962", 
          "https://doi.org/10.1007/s00530-015-0475-4"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/2344436.2344440", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1025792342"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s12243-013-0384-5", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1028132542", 
          "https://doi.org/10.1007/s12243-013-0384-5"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1111/j.1467-8659.2011.01984.x", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1029244931"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/bf03181917", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1032379730", 
          "https://doi.org/10.1007/bf03181917"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/bf03181917", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1032379730", 
          "https://doi.org/10.1007/bf03181917"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.compeleceng.2013.11.005", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1037614608"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.aeue.2015.09.015", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1039413027"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1016/j.image.2013.03.004", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1052257782"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1088/1464-4258/7/12/008", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1059140305"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tcsvt.2003.815963", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061574469"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/tmm.2016.2589208", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061698718"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.12988/ces.2016.69156", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1064855387"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.14257/ijast.2015.82.02", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1067230855"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.14257/ijast.2015.82.02", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1067230855"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.14445/22312803/ijctt-v41p113", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1084315586"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s13369-017-2531-1", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1085380128", 
          "https://doi.org/10.1007/s13369-017-2531-1"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/s13369-017-2531-1", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1085380128", 
          "https://doi.org/10.1007/s13369-017-2531-1"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icassp.2001.941256", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093191063"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icip.2011.6116242", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093726894"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icacci.2013.6637219", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1093862103"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/icvrv.2013.59", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094495860"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/eusipco.2015.7362342", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095202357"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/iceee.2015.7357955", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095786316"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.5220/0006619305010510", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1100788411"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2019-06", 
    "datePublishedReg": "2019-06-01", 
    "description": "Thanks to the rapid growth of internet and the advanced development of 3D technology, 3D images and videos are proliferated over the networks. However, this causes several insecurity problems, and protecting this type of media has become a main challenge for many researchers. 3D watermarking is considered as an efficient solution for 3D data protection. In fact, it consists in embedding a secret key into a 3D content to protect it and in trying to extract it after any attack applied on marked 3D data. Anaglyph is the most popular and economical method among different 3D visualization methods. For this reason, it has become used for many 3D applications. Hence, 3D anaglyph watermarking presents an important research area, and several techniques have been proposed in order to protect this type of media. In this survey paper, the existing anaglyph 3D images and videos watermarking techniques are discussed. This discussion shows that the anaglyph video watermarking field is still not mature and new techniques should be proposed to improve the invisibility/robustness trade-off. In addition, based on the study of anaglyph generation methods, it is concluded that signature can be embedded during the generation stage. ", 
    "genre": "research_article", 
    "id": "sg:pub.10.1007/s13319-019-0223-1", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": [
      {
        "id": "sg:journal.1136468", 
        "issn": [
          "2092-6731"
        ], 
        "name": "3D Research", 
        "type": "Periodical"
      }, 
      {
        "issueNumber": "2", 
        "type": "PublicationIssue"
      }, 
      {
        "type": "PublicationVolume", 
        "volumeNumber": "10"
      }
    ], 
    "name": "A Review on Anaglyph 3D Image and Video Watermarking", 
    "pagination": "13", 
    "productId": [
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "4fa9692aea8bb0da78a660a7f7244eddb134c72b99ed0a7659c4b7bcb8f0bc0e"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/s13319-019-0223-1"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1112944071"
        ]
      }
    ], 
    "sameAs": [
      "https://doi.org/10.1007/s13319-019-0223-1", 
      "https://app.dimensions.ai/details/publication/pub.1112944071"
    ], 
    "sdDataset": "articles", 
    "sdDatePublished": "2019-04-11T12:55", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000364_0000000364/records_72869_00000001.jsonl", 
    "type": "ScholarlyArticle", 
    "url": "https://link.springer.com/10.1007%2Fs13319-019-0223-1"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/s13319-019-0223-1'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/s13319-019-0223-1'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/s13319-019-0223-1'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/s13319-019-0223-1'


 

This table displays all metadata directly associated to this object as RDF triples.

160 TRIPLES      21 PREDICATES      54 URIs      19 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/s13319-019-0223-1 schema:about anzsrc-for:08
2 anzsrc-for:0801
3 schema:author Nae287335654446af834a82e5c3423b1e
4 schema:citation sg:pub.10.1007/bf03181917
5 sg:pub.10.1007/s00530-015-0475-4
6 sg:pub.10.1007/s11042-013-1435-7
7 sg:pub.10.1007/s12243-013-0384-5
8 sg:pub.10.1007/s13369-017-2531-1
9 https://doi.org/10.1016/j.aeue.2012.11.009
10 https://doi.org/10.1016/j.aeue.2015.09.015
11 https://doi.org/10.1016/j.compeleceng.2013.11.005
12 https://doi.org/10.1016/j.dsp.2015.09.007
13 https://doi.org/10.1016/j.image.2013.03.004
14 https://doi.org/10.1080/18756891.2014.889843
15 https://doi.org/10.1088/1464-4258/7/12/008
16 https://doi.org/10.1109/eusipco.2015.7362342
17 https://doi.org/10.1109/icacci.2013.6637219
18 https://doi.org/10.1109/icassp.2001.941256
19 https://doi.org/10.1109/iceee.2015.7357955
20 https://doi.org/10.1109/icip.2011.6116242
21 https://doi.org/10.1109/icvrv.2013.59
22 https://doi.org/10.1109/tcsvt.2003.815963
23 https://doi.org/10.1109/tmm.2016.2589208
24 https://doi.org/10.1111/j.1467-8659.2011.01984.x
25 https://doi.org/10.1117/12.837163
26 https://doi.org/10.1145/2344436.2344440
27 https://doi.org/10.12988/ces.2016.69156
28 https://doi.org/10.14257/ijast.2015.82.02
29 https://doi.org/10.14445/22312803/ijctt-v41p113
30 https://doi.org/10.5220/0006619305010510
31 schema:datePublished 2019-06
32 schema:datePublishedReg 2019-06-01
33 schema:description Thanks to the rapid growth of internet and the advanced development of 3D technology, 3D images and videos are proliferated over the networks. However, this causes several insecurity problems, and protecting this type of media has become a main challenge for many researchers. 3D watermarking is considered as an efficient solution for 3D data protection. In fact, it consists in embedding a secret key into a 3D content to protect it and in trying to extract it after any attack applied on marked 3D data. Anaglyph is the most popular and economical method among different 3D visualization methods. For this reason, it has become used for many 3D applications. Hence, 3D anaglyph watermarking presents an important research area, and several techniques have been proposed in order to protect this type of media. In this survey paper, the existing anaglyph 3D images and videos watermarking techniques are discussed. This discussion shows that the anaglyph video watermarking field is still not mature and new techniques should be proposed to improve the invisibility/robustness trade-off. In addition, based on the study of anaglyph generation methods, it is concluded that signature can be embedded during the generation stage.
34 schema:genre research_article
35 schema:inLanguage en
36 schema:isAccessibleForFree false
37 schema:isPartOf N01eef573b58442eda9e9c360b3ea4268
38 N77b4eabdf1384038adf9c6a66eff49c6
39 sg:journal.1136468
40 schema:name A Review on Anaglyph 3D Image and Video Watermarking
41 schema:pagination 13
42 schema:productId Nc04b759790f1423f9f7ec147ad2433c4
43 Ncf2b2464263f4b3c81ebe0f101862900
44 Nf190ffc12125464e81a73e0c6ad57e43
45 schema:sameAs https://app.dimensions.ai/details/publication/pub.1112944071
46 https://doi.org/10.1007/s13319-019-0223-1
47 schema:sdDatePublished 2019-04-11T12:55
48 schema:sdLicense https://scigraph.springernature.com/explorer/license/
49 schema:sdPublisher Nd8a7a7ad53244488a9722623e1e62226
50 schema:url https://link.springer.com/10.1007%2Fs13319-019-0223-1
51 sgo:license sg:explorer/license/
52 sgo:sdDataset articles
53 rdf:type schema:ScholarlyArticle
54 N01eef573b58442eda9e9c360b3ea4268 schema:issueNumber 2
55 rdf:type schema:PublicationIssue
56 N11610870ebe14f5db7a6dd90e77ac98c schema:affiliation https://www.grid.ac/institutes/grid.7900.e
57 schema:familyName Ben Jabra
58 schema:givenName Saoussen
59 rdf:type schema:Person
60 N23a20ef290724e18a541593dd44a06a6 rdf:first N11610870ebe14f5db7a6dd90e77ac98c
61 rdf:rest N9ec5bbcea5a04414b25227ba95c16bad
62 N6de0a94f0ebd43dfa3b71c24edff959e schema:affiliation https://www.grid.ac/institutes/grid.12574.35
63 schema:familyName Dhaou
64 schema:givenName Dorra
65 rdf:type schema:Person
66 N77b4eabdf1384038adf9c6a66eff49c6 schema:volumeNumber 10
67 rdf:type schema:PublicationVolume
68 N9ec5bbcea5a04414b25227ba95c16bad rdf:first Na1a4080d4055447eb17db74a79db1781
69 rdf:rest rdf:nil
70 Na1a4080d4055447eb17db74a79db1781 schema:affiliation https://www.grid.ac/institutes/grid.12574.35
71 schema:familyName Zagrouba
72 schema:givenName Ezzeddine
73 rdf:type schema:Person
74 Nae287335654446af834a82e5c3423b1e rdf:first N6de0a94f0ebd43dfa3b71c24edff959e
75 rdf:rest N23a20ef290724e18a541593dd44a06a6
76 Nc04b759790f1423f9f7ec147ad2433c4 schema:name doi
77 schema:value 10.1007/s13319-019-0223-1
78 rdf:type schema:PropertyValue
79 Ncf2b2464263f4b3c81ebe0f101862900 schema:name dimensions_id
80 schema:value pub.1112944071
81 rdf:type schema:PropertyValue
82 Nd8a7a7ad53244488a9722623e1e62226 schema:name Springer Nature - SN SciGraph project
83 rdf:type schema:Organization
84 Nf190ffc12125464e81a73e0c6ad57e43 schema:name readcube_id
85 schema:value 4fa9692aea8bb0da78a660a7f7244eddb134c72b99ed0a7659c4b7bcb8f0bc0e
86 rdf:type schema:PropertyValue
87 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
88 schema:name Information and Computing Sciences
89 rdf:type schema:DefinedTerm
90 anzsrc-for:0801 schema:inDefinedTermSet anzsrc-for:
91 schema:name Artificial Intelligence and Image Processing
92 rdf:type schema:DefinedTerm
93 sg:journal.1136468 schema:issn 2092-6731
94 schema:name 3D Research
95 rdf:type schema:Periodical
96 sg:pub.10.1007/bf03181917 schema:sameAs https://app.dimensions.ai/details/publication/pub.1032379730
97 https://doi.org/10.1007/bf03181917
98 rdf:type schema:CreativeWork
99 sg:pub.10.1007/s00530-015-0475-4 schema:sameAs https://app.dimensions.ai/details/publication/pub.1020542962
100 https://doi.org/10.1007/s00530-015-0475-4
101 rdf:type schema:CreativeWork
102 sg:pub.10.1007/s11042-013-1435-7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003836735
103 https://doi.org/10.1007/s11042-013-1435-7
104 rdf:type schema:CreativeWork
105 sg:pub.10.1007/s12243-013-0384-5 schema:sameAs https://app.dimensions.ai/details/publication/pub.1028132542
106 https://doi.org/10.1007/s12243-013-0384-5
107 rdf:type schema:CreativeWork
108 sg:pub.10.1007/s13369-017-2531-1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1085380128
109 https://doi.org/10.1007/s13369-017-2531-1
110 rdf:type schema:CreativeWork
111 https://doi.org/10.1016/j.aeue.2012.11.009 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006706551
112 rdf:type schema:CreativeWork
113 https://doi.org/10.1016/j.aeue.2015.09.015 schema:sameAs https://app.dimensions.ai/details/publication/pub.1039413027
114 rdf:type schema:CreativeWork
115 https://doi.org/10.1016/j.compeleceng.2013.11.005 schema:sameAs https://app.dimensions.ai/details/publication/pub.1037614608
116 rdf:type schema:CreativeWork
117 https://doi.org/10.1016/j.dsp.2015.09.007 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012220457
118 rdf:type schema:CreativeWork
119 https://doi.org/10.1016/j.image.2013.03.004 schema:sameAs https://app.dimensions.ai/details/publication/pub.1052257782
120 rdf:type schema:CreativeWork
121 https://doi.org/10.1080/18756891.2014.889843 schema:sameAs https://app.dimensions.ai/details/publication/pub.1001701040
122 rdf:type schema:CreativeWork
123 https://doi.org/10.1088/1464-4258/7/12/008 schema:sameAs https://app.dimensions.ai/details/publication/pub.1059140305
124 rdf:type schema:CreativeWork
125 https://doi.org/10.1109/eusipco.2015.7362342 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095202357
126 rdf:type schema:CreativeWork
127 https://doi.org/10.1109/icacci.2013.6637219 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093862103
128 rdf:type schema:CreativeWork
129 https://doi.org/10.1109/icassp.2001.941256 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093191063
130 rdf:type schema:CreativeWork
131 https://doi.org/10.1109/iceee.2015.7357955 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095786316
132 rdf:type schema:CreativeWork
133 https://doi.org/10.1109/icip.2011.6116242 schema:sameAs https://app.dimensions.ai/details/publication/pub.1093726894
134 rdf:type schema:CreativeWork
135 https://doi.org/10.1109/icvrv.2013.59 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094495860
136 rdf:type schema:CreativeWork
137 https://doi.org/10.1109/tcsvt.2003.815963 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061574469
138 rdf:type schema:CreativeWork
139 https://doi.org/10.1109/tmm.2016.2589208 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061698718
140 rdf:type schema:CreativeWork
141 https://doi.org/10.1111/j.1467-8659.2011.01984.x schema:sameAs https://app.dimensions.ai/details/publication/pub.1029244931
142 rdf:type schema:CreativeWork
143 https://doi.org/10.1117/12.837163 schema:sameAs https://app.dimensions.ai/details/publication/pub.1004292582
144 rdf:type schema:CreativeWork
145 https://doi.org/10.1145/2344436.2344440 schema:sameAs https://app.dimensions.ai/details/publication/pub.1025792342
146 rdf:type schema:CreativeWork
147 https://doi.org/10.12988/ces.2016.69156 schema:sameAs https://app.dimensions.ai/details/publication/pub.1064855387
148 rdf:type schema:CreativeWork
149 https://doi.org/10.14257/ijast.2015.82.02 schema:sameAs https://app.dimensions.ai/details/publication/pub.1067230855
150 rdf:type schema:CreativeWork
151 https://doi.org/10.14445/22312803/ijctt-v41p113 schema:sameAs https://app.dimensions.ai/details/publication/pub.1084315586
152 rdf:type schema:CreativeWork
153 https://doi.org/10.5220/0006619305010510 schema:sameAs https://app.dimensions.ai/details/publication/pub.1100788411
154 rdf:type schema:CreativeWork
155 https://www.grid.ac/institutes/grid.12574.35 schema:alternateName Tunis El Manar University
156 schema:name LR16ES06 Research Laboratory of Computer Science, Modeling and Information and Knowledge Processing (LIMTIC), Higher Institute of Computer Science, University Tunis El Manar, 2 Street Abou Raihane Bayrouni, 2080, Ariana, Tunisia
157 rdf:type schema:Organization
158 https://www.grid.ac/institutes/grid.7900.e schema:alternateName University of Sousse
159 schema:name LR16ES06 Research Laboratory of Computer Science, Modeling and Information and Knowledge Processing (LIMTIC), National Engineering School of Sousse (ENISo), University of Sousse, BP 264 Sousse Erriadh, 4023, Sousse, Tunisia
160 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...