scispace - formally typeset
Search or ask a question
Author

Jean-Marie Le Bars

Bio: Jean-Marie Le Bars is an academic researcher from University of Caen Lower Normandy. The author has contributed to research in topics: Biometrics & Boolean function. The author has an hindex of 5, co-authored 26 publications receiving 113 citations. Previous affiliations of Jean-Marie Le Bars include Centre national de la recherche scientifique.

Papers
More filters
Journal ArticleDOI
TL;DR: An extended evaluation framework based on the enrolment selection, which offers repeatable and statistically convincing measures for evaluating quality metrics, is added, which demonstrates the usability of the proposed evaluation framework via offline trials.
Abstract: Fingerprint quality assessment (FQA) has been a challenging issue due to a variety of noisy information contained in the samples, such as physical defect and distortions caused by sensing devices. Existing studies have made efforts to find out more suitable techniques for assessing fingerprint quality but it is difficult to achieve a common solution because of, for example, different image settings. This study is two-fold, related to FQA, including a literature review of the prior work in assessing fingerprint image quality and the associated evaluation approaches. First, the authors categorised some representative studies proposed in last few decades to show how this problem has been solved so far. Second, this study gives a brief introduction of the associated evaluation approaches, and then contributes an extended evaluation framework based on the enrolment selection, which offers repeatable and statistically convincing measures for evaluating quality metrics. Experimental results demonstrate the usability of the proposed evaluation framework via offline trials.

38 citations

Journal ArticleDOI
TL;DR: The failure of the 0 – 1 law for monadic existential second-order logic on undirected graphs is established by giving a sentence in this logic which has no asymptotic probability, and the result is optimal with respect to the vocabulary.

17 citations

Proceedings ArticleDOI
20 Mar 2007
TL;DR: The aim of this paper is to propose an efficient digital water-marking algorithm on geographical data that is fast, blind and robust, and the watermark is resiliant against many transformations applied on the document.
Abstract: The aim of this paper is to propose an efficient digital water-marking algorithm on geographical data. Our algorithm is fast, blind and robust. Thus, the original data is not needed in order to prove the authorship of the document and the watermark is resiliant against many transformations applied on the document.The method we propose is based on a modification of parts of the data selected upon local criterias and a secret key. The local criterias use topological properties of a Delaunay mesh build on the original map. The local modifications of parts of the document introduce a statistical slant inside the document. The detection algorithm is a simple detection of this slant.Experimental results illustrate the resiliance of the algorithm against different tranformations such as rotation, translation, data shuffling and cropping.

14 citations

Journal ArticleDOI
01 Dec 2020
TL;DR: A method for deploying security services within an IoT network according to devices capabilities as a weighted graph using device capabilities is proposed to identify the most suitable location for a security service using dominating sets and the graph weights.
Abstract: The rise of edge computing enables local network management. Services are no longer clustered inside the cloud but rather spread all over the whole network. In this paper, we propose a method for deploying security services within an IoT network according to devices capabilities. Our method models an IoT network as a weighted graph using device capabilities. Using the latter, we propose to identify the most suitable location for a security service using dominating sets and the graph weights. We present results obtained by the proposed method on an example of a smart city based on real data using network security functions such as an IPsec service. Results indicate an overall increase in the network security with minimal impact on the information flow while retaining reduced deployment costs.

8 citations

Proceedings ArticleDOI
29 Oct 2019
TL;DR: This approach uses dominating sets and centrality metrics to propose an IoT security framework where security functions are optimally deployed among devices, and reveals overall increased security within the network with minimal impact on the traffic.
Abstract: In this paper, we propose a new method for optimizing the deployment of security solutions within an IoT network. Our approach uses dominating sets and centrality metrics to propose an IoT security framework where security functions are optimally deployed among devices. An example of such a solution is presented based on EndToEnd like encryption. The results reveal overall increased security within the network with minimal impact on the traffic.

7 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: A comprehensive survey of more than 120 techniques suggested by various researchers from time to time for Cancelable Biometrics is presented and a novel taxonomy for the same is developed.
Abstract: Biometric recognition is a challenging research field but suffers from privacy and security concerns. To address this concern, Cancelable Biometrics is suggested in literature in which a Biometric image of a sample is distorted or transformed in such a manner that it becomes difficult to obtain the original Biometric image from the distorted one. Another important characteristic of Cancelable Biometrics is that it can be reissued if compromised. In this research paper, we present a comprehensive survey of more than 120 techniques suggested by various researchers from time to time for Cancelable Biometrics and a novel taxonomy for the same is developed. Further, various performance measures used in Cancelable Biometrics are reviewed and their mathematical formulations are given. Cancelable Biometrics also suffer from various security attacks as given in literature. A review of these security attacks is carried out. We have also performed a review of databases used in literature for nine different Cancelable Biometrics viz. Face, Iris, Speech, Fingerprint, Signature, Palmprint, ECG, Palmvein and Fingervein. Lastly, we have also given future research directions in this field. This study shall be useful for the researchers and practitioners working in this fascinating research area.

80 citations

Journal ArticleDOI
TL;DR: Experimental results show that the proposed algorithm has a good robustness against geometrical attacks, simplification, interpolation and noise addition attacks, and preserves shape of the watermarked geographical objects.
Abstract: Geographical data is of great value for data producers. How to protect copyright of geographical data effectively using digital watermarking is a hot research issue. In this paper, spatial topological relation existing between polygons is chosen as cover data, and watermark is embedded by slightly modifying the metric measure of spatial topological relation, and some geographical objects are scaled to derive the watermarked data. Global Main Scaling Distance is introduced to measure the distortions caused by watermark embedding. Experimental results show that the proposed algorithm has a good robustness against geometrical attacks, simplification, interpolation and noise addition attacks, and preserves shape of the watermarked geographical objects. Furthermore, a good tradeoff between robustness and fidelity is acquired in the proposed algorithm.

38 citations

Journal ArticleDOI
TL;DR: Based on the development history of EI, the authors introduces regional energy internet (REI) from two aspects of research scope and main characteristics, and summarizes the particularity of coupling interconnection between transportation network and social network in REI.

32 citations

Journal ArticleDOI
TL;DR: A multipurpose watermarking scheme is proposed for the scenarios when the two requirements are needed simultaneously, and the robustness and the fragility of the proposed scheme are analyzed theoretically and verified by a set comprehensive experiments.
Abstract: The rapid flourishing of GIS applications has made the copyright protection and content authentication of vector maps two important issues in the digital world. In this paper, a multipurpose watermarking scheme is proposed for the scenarios when the two requirements are needed simultaneously. In the scheme, robust watermark and fragile watermarks are embedded into the host map simultaneously. To avoid the interference between the two kinds of watermarks, robust watermark is embedded into the feature points of the objects in the map, while fragile watermarks are embedded into the nonfeature points. Due to the independence of the feature points and non-feature points, the robust watermark and fragile watermarks can be detected independently. After watermark detection, the robust watermark can be used for copyright protection, and the fragile watermarks can be used for tamper localization and characterization. The fragility of the proposed scheme is analyzed theoretically, and both the robustness and the fragility are verified by a set comprehensive experiments.

31 citations