scispace - formally typeset
Search or ask a question
Author

Laurent Nana

Bio: Laurent Nana is an academic researcher from University of Western Brittany. The author has contributed to research in topics: Digital watermarking & Watermark. The author has an hindex of 8, co-authored 34 publications receiving 462 citations. Previous affiliations of Laurent Nana include Centre national de la recherche scientifique.

Papers
More filters
Proceedings ArticleDOI
TL;DR: An Ada framework called Cheddar is described which provides tools to check if a real time application meets its temporal constraints and provides a flexible simulation engine which allows the designer to describe and run simulations of specific systems.
Abstract: This paper describes an Ada framework called Cheddar which provides tools to check if a real time application meets its temporal constraints. The framework is based on the real time scheduling theory and is mostly written for educational purposes. With Cheddar, an application is defined by a set of processors, tasks, buffers, shared resources and messages. Cheddar provides feasibility tests in the cases of monoprocessor, multiprocessor and distributed systems. It also provides a flexible simulation engine which allows the designer to describe and run simulations of specific systems. The framework is open and has been designed to be easily connected to CASE tools such as editors, design tools, simulators, ...

253 citations

Proceedings ArticleDOI
TL;DR: An Ada set of packages which allows designers to perform resource requirements analysis of AADL specifications is described, part of Cheddar, an Ada framework that is developing at the University of Brest.
Abstract: This article describes an Ada set of packages which allows designers to perform resource requirements analysis of AADL specifications. This set of Ada packages is part of Cheddar, an Ada framework that we are developing at the University of Brest [22].The framework provides tools to check if AADL threads will meet their deadline at execution time. Some new AADL properties are proposed to model and analyze dependent AADL thread sets. It also provides some tools to perform memory requirements analysis on AADL specifications.

83 citations

Journal ArticleDOI
TL;DR: The imperceptibility and robustness of the watermarking approach are proven and showing perfectly the detection of the tamper zones are proven.

24 citations

Journal ArticleDOI
TL;DR: A blind spatial domain-based image watermarking using texture analysis and association rules mining is proposed in which four gray-scale histogram based-image features are chosen as input data for designing association rules.
Abstract: In aims to ensure images authentication, this paper proposes a blind spatial domain-based image watermarking using texture analysis and association rules mining. The idea is to identify the strongly textured locations in the host image for inserting the watermark. Indeed, texture is correlated with the Human Visual System (HVS). It can therefore be helpful in designing a watermarking approach to enhance the imperceptibility and the robustness. Here a solution is proposed in which four gray-scale histogram based-image features (DC, skewness, kurtosis, and entropy) are chosen as input data for designing association rules. Subsequently, the Apriori algorithm is applied to mine the relationships between the selected features. The higher significant relationships between the selected features are used to identify the strongly textured blocks for watermark embedding. Two strong parameters (lift and confidence) computed using association rules mining were used to design a means of blind watermarking. The experimental results show that interesting ratios of imperceptibility, robustness and embedding rate with low execution time can be obtained by this approach.

16 citations


Cited by
More filters
Book ChapterDOI
20 Sep 2013

229 citations

Proceedings ArticleDOI
01 Oct 2006
TL;DR: The Society of Automotive Engineers (SAE) Architecture Analysis & Design Language, AS5506, provides a means for the formal specification of the hardware and software architecture of embedded computer systems and system of systems.
Abstract: The Society of Automotive Engineers (SAE) Architecture Analysis & Design Language, AS5506, provides a means for the formal specification of the hardware and software architecture of embedded computer systems and system of systems. It was designed to support a full Model Based Development lifecycle including system specification, analysis, system tuning, integration, and upgrade over the lifecycle. It was designed to support the integration of multiple forms of analyses and to be extensible in a standard way for additional analysis approaches. A system can be automatically integrated from AADL models when fully specified and when source code is provided for the software components. Analysis of large complex systems has been demonstrated in the avionics domain.

173 citations

Journal ArticleDOI
TL;DR: This paper consists of two contributions: the primary contribution is a systematic review of the literature over the period 2011–2019 on IIoT Security, focusing on how the relatively new paradigm of Fog computing can be leveraged to address these requirements, and thus improve the security of the IIeT.
Abstract: A key application of the Internet of Things (IoT) paradigm lies within industrial contexts. Indeed, the emerging Industrial Internet of Things (IIoT), commonly referred to as Industry 4.0, promises to revolutionize production and manufacturing through the use of large numbers of networked embedded sensing devices, and the combination of emerging computing technologies, such as Fog/Cloud Computing and Artificial Intelligence. The IIoT is characterized by an increased degree of inter-connectivity, which not only creates opportunities for the industries that adopt it, but also for cyber-criminals. Indeed, IoT security currently represents one of the major obstacles that prevent the widespread adoption of IIoT technology. Unsurprisingly, such concerns led to an exponential growth of published research over the last few years. To get an overview of the field, we deem it important to systematically survey the academic literature so far, and distill from it various security requirements as well as their popularity. This paper consists of two contributions: our primary contribution is a systematic review of the literature over the period 2011–2019 on IIoT Security, focusing in particular on the security requirements of the IIoT. Our secondary contribution is a reflection on how the relatively new paradigm of Fog computing can be leveraged to address these requirements, and thus improve the security of the IIoT.

173 citations

Journal ArticleDOI
TL;DR: A new hybrid chaotic map and a different way of using optimization technique to improve the performance of encryption algorithms are proposed, which establishes an excellent randomness performance and sensitivity.
Abstract: This paper proposes a new hybrid chaotic map and a different way of using optimization technique to improve the performance of encryption algorithms. Compared to other chaotic functions, the proposed chaotic map establishes an excellent randomness performance and sensitivity. Based on its Lyapunov exponents and entropy measure, the characteristics of the new mathematical function are better than those of classical maps. We propose a new image cipher based on confusion/diffusion Shannon properties. The substitution phase of the proposed encryption algorithm, which depends on a new optimized substitution box, was carried out by chaotic Jaya optimization algorithm to generate S-boxes according to their nonlinearity score. The goal of the optimization process is to have a bijective matrix with high nonlinearity score. Furthermore, a dynamic key depending on the output of encrypted image is proposed. Security analysis indicates that the proposed encryption scheme can withstand different crypt analytics attacks.

161 citations

Book ChapterDOI
05 Nov 2012
TL;DR: The development of RobotML is reported on, a Robotic Modeling Language that eases the design of robotic applications, their simulation and their deployment to multiple target execution platforms.
Abstract: A large number of robotic software have been developed but cannot or can hardly interoperate with each other because of their dependencies on specific hardware or software platform is hard-wired into the code. Consequently, robotic software is hard and expensive to develop because there is little opportunity of reuse and because low-level details must be taken into account in early phases. Moreover, robotic experts can hardly develop their application without programming knowledge or the help of programming experts and robotic software is difficult to adapt to hardware or target-platform changes. In this paper we report on the development of RobotML, a Robotic Modeling Language that eases the design of robotic applications, their simulation and their deployment to multiple target execution platforms.

149 citations