9 research outputs found

    Tatouage robuste d’images imprimĂ©es

    Get PDF
    Invisible watermarking for ID images printed on plastic card support is a challenging problem that interests the industrial world. In this study, we developed a watermarking algorithm robust to various attacks present in this case. These attacks are mainly related to the print/scan process on the plastic support and the degradations that an ID card can encounter along its lifetime. The watermarking scheme operates in the Fourier domain as this transform has invariance properties against global geometrical transformations. A preventive method consists of pre-processing the host image before the embedding process that reduces the variance of the embeddable vector. A curative method comprises two counterattacks dealing with blurring and color variations. For a false alarm probability of 10⁻⁎, we obtained an average improvement of 22% over the reference method when only preventative method is used. The combination of the preventive and curative methods leads to a detection rate greater than 99%. The detection algorithm takes less than 1 second for a 512×512 image with a conventional computer, which is compatible with the industrial application in question.Le tatouage invisible d’images d’identitĂ© imprimĂ©es sur un support en plastique est un problĂšme difficile qui intĂ©resse le monde industriel. Dans cette Ă©tude, nous avons dĂ©veloppĂ© un algorithme de tatouage robuste aux diverses attaques prĂ©sentes dans ce cas. Ces attaques sont liĂ©es aux processus d’impression/numĂ©risation sur le support plastique ainsi qu’aux dĂ©gradations qu’une carte plastique peut rencontrer le long de sa durĂ©e de vie. La mĂ©thode de tatouage opĂšre dans le domaine de Fourier car cette transformĂ©e prĂ©sente des propriĂ©tĂ©s d’invariances aux attaques gĂ©omĂ©triques globales. Une mĂ©thode prĂ©ventive consiste en un prĂ©traitement de l’image originale avant le processus d’insertion qui rĂ©duit la variance du vecteur support de la marque. Une mĂ©thode corrective comporte deux contre-attaques corrigeant le flou et les variations colorimĂ©triques. Pour une probabilitĂ© de fausse alarme de 10⁻⁎, nous avons obtenu une amĂ©lioration moyenne de 22% par rapport Ă  la mĂ©thode de rĂ©fĂ©rence lorsque seule la mĂ©thode prĂ©ventive est utilisĂ©e. La combinaison de la mĂ©thode prĂ©ventive avec la mĂ©thode corrective correspond Ă  un taux de dĂ©tection supĂ©rieur Ă  99%. L’algorithme de dĂ©tection prends moins de 1 seconde pour Ă  une image de 512×512 pixels avec un ordinateur classique ce qui est compatible avec l’application industrielle visĂ©e

    Preparation, Characterization, and Catalytic Activity of Tin (Antimony) Substituted and Lacunar Dawson Phosphotungstomolybdates for Synthesis of Adipic Acid

    Get PDF
    Tin (antimony) substituted and lacunar Dawson phosphotungstomolybdates (a1-K10P2W12Mo5ĂżO61, a1-K8P2W12Mo5SnO61 and a-Cs4SnP2W12Mo6O62,and a-Cs3SbP2W12Mo6O62) were synthesized and characterized by Fourier Transform Infra Red (FTIR), nuclear magnetic resonance (31P NMR), Visible Ultra Violet (UV-Vis) spectroscopy, and X-ray diffraction (XRD). Their catalytic properties were examined in the oxidation reaction of cyclohexanone at 90 °C and that of cyclohexene at 70 °C to adipic acid (AA), in presence of hydrogen peroxide and in free solvent. The effects of catalyst/substrate molar ratios, hydrogene peroxide flow rate, heteropolysalt composition, and cyclohexanol addition on AA yields were studied. The Cs4SnP2W12Mo6O62 (the most efficient) led to 61 % of AA yield from the cyclohexanone oxidation using a catalyst/substrate molar ratio of 13.3×10-4, H2O2 flow rate of 0.5 mL/h, and a reaction time of 20 h. Copyright © 2019 BCREC Group. All rights reserve

    The evolving SARS-CoV-2 epidemic in Africa: Insights from rapidly expanding genomic surveillance

    Get PDF
    INTRODUCTION Investment in Africa over the past year with regard to severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) sequencing has led to a massive increase in the number of sequences, which, to date, exceeds 100,000 sequences generated to track the pandemic on the continent. These sequences have profoundly affected how public health officials in Africa have navigated the COVID-19 pandemic. RATIONALE We demonstrate how the first 100,000 SARS-CoV-2 sequences from Africa have helped monitor the epidemic on the continent, how genomic surveillance expanded over the course of the pandemic, and how we adapted our sequencing methods to deal with an evolving virus. Finally, we also examine how viral lineages have spread across the continent in a phylogeographic framework to gain insights into the underlying temporal and spatial transmission dynamics for several variants of concern (VOCs). RESULTS Our results indicate that the number of countries in Africa that can sequence the virus within their own borders is growing and that this is coupled with a shorter turnaround time from the time of sampling to sequence submission. Ongoing evolution necessitated the continual updating of primer sets, and, as a result, eight primer sets were designed in tandem with viral evolution and used to ensure effective sequencing of the virus. The pandemic unfolded through multiple waves of infection that were each driven by distinct genetic lineages, with B.1-like ancestral strains associated with the first pandemic wave of infections in 2020. Successive waves on the continent were fueled by different VOCs, with Alpha and Beta cocirculating in distinct spatial patterns during the second wave and Delta and Omicron affecting the whole continent during the third and fourth waves, respectively. Phylogeographic reconstruction points toward distinct differences in viral importation and exportation patterns associated with the Alpha, Beta, Delta, and Omicron variants and subvariants, when considering both Africa versus the rest of the world and viral dissemination within the continent. Our epidemiological and phylogenetic inferences therefore underscore the heterogeneous nature of the pandemic on the continent and highlight key insights and challenges, for instance, recognizing the limitations of low testing proportions. We also highlight the early warning capacity that genomic surveillance in Africa has had for the rest of the world with the detection of new lineages and variants, the most recent being the characterization of various Omicron subvariants. CONCLUSION Sustained investment for diagnostics and genomic surveillance in Africa is needed as the virus continues to evolve. This is important not only to help combat SARS-CoV-2 on the continent but also because it can be used as a platform to help address the many emerging and reemerging infectious disease threats in Africa. In particular, capacity building for local sequencing within countries or within the continent should be prioritized because this is generally associated with shorter turnaround times, providing the most benefit to local public health authorities tasked with pandemic response and mitigation and allowing for the fastest reaction to localized outbreaks. These investments are crucial for pandemic preparedness and response and will serve the health of the continent well into the 21st century

    Tatouage robuste d’images imprimĂ©es

    No full text
    Invisible watermarking for ID images printed on plastic card support is a challenging problem that interests the industrial world. In this study, we developed a watermarking algorithm robust to various attacks present in this case. These attacks are mainly related to the print/scan process on the plastic support and the degradations that an ID card can encounter along its lifetime. The watermarking scheme operates in the Fourier domain as this transform has invariance properties against global geometrical transformations. A preventive method consists of pre-processing the host image before the embedding process that reduces the variance of the embeddable vector. A curative method comprises two counterattacks dealing with blurring and color variations. For a false alarm probability of 10⁻⁎, we obtained an average improvement of 22% over the reference method when only preventative method is used. The combination of the preventive and curative methods leads to a detection rate greater than 99%. The detection algorithm takes less than 1 second for a 512×512 image with a conventional computer, which is compatible with the industrial application in question.Le tatouage invisible d’images d’identitĂ© imprimĂ©es sur un support en plastique est un problĂšme difficile qui intĂ©resse le monde industriel. Dans cette Ă©tude, nous avons dĂ©veloppĂ© un algorithme de tatouage robuste aux diverses attaques prĂ©sentes dans ce cas. Ces attaques sont liĂ©es aux processus d’impression/numĂ©risation sur le support plastique ainsi qu’aux dĂ©gradations qu’une carte plastique peut rencontrer le long de sa durĂ©e de vie. La mĂ©thode de tatouage opĂšre dans le domaine de Fourier car cette transformĂ©e prĂ©sente des propriĂ©tĂ©s d’invariances aux attaques gĂ©omĂ©triques globales. Une mĂ©thode prĂ©ventive consiste en un prĂ©traitement de l’image originale avant le processus d’insertion qui rĂ©duit la variance du vecteur support de la marque. Une mĂ©thode corrective comporte deux contre-attaques corrigeant le flou et les variations colorimĂ©triques. Pour une probabilitĂ© de fausse alarme de 10⁻⁎, nous avons obtenu une amĂ©lioration moyenne de 22% par rapport Ă  la mĂ©thode de rĂ©fĂ©rence lorsque seule la mĂ©thode prĂ©ventive est utilisĂ©e. La combinaison de la mĂ©thode prĂ©ventive avec la mĂ©thode corrective correspond Ă  un taux de dĂ©tection supĂ©rieur Ă  99%. L’algorithme de dĂ©tection prends moins de 1 seconde pour Ă  une image de 512×512 pixels avec un ordinateur classique ce qui est compatible avec l’application industrielle visĂ©e

    Robust watermarking for printed images

    No full text
    Le tatouage invisible d’images d’identitĂ© imprimĂ©es sur un support en plastique est un problĂšme difficile qui intĂ©resse le monde industriel. Dans cette Ă©tude, nous avons dĂ©veloppĂ© un algorithme de tatouage robuste aux diverses attaques prĂ©sentes dans ce cas. Ces attaques sont liĂ©es aux processus d’impression/numĂ©risation sur le support plastique ainsi qu’aux dĂ©gradations qu’une carte plastique peut rencontrer le long de sa durĂ©e de vie. La mĂ©thode de tatouage opĂšre dans le domaine de Fourier car cette transformĂ©e prĂ©sente des propriĂ©tĂ©s d’invariances aux attaques gĂ©omĂ©triques globales. Une mĂ©thode prĂ©ventive consiste en un prĂ©traitement de l’image originale avant le processus d’insertion qui rĂ©duit la variance du vecteur support de la marque. Une mĂ©thode corrective comporte deux contre-attaques corrigeant le flou et les variations colorimĂ©triques. Pour une probabilitĂ© de fausse alarme de 10⁻⁎, nous avons obtenu une amĂ©lioration moyenne de 22% par rapport Ă  la mĂ©thode de rĂ©fĂ©rence lorsque seule la mĂ©thode prĂ©ventive est utilisĂ©e. La combinaison de la mĂ©thode prĂ©ventive avec la mĂ©thode corrective correspond Ă  un taux de dĂ©tection supĂ©rieur Ă  99%. L’algorithme de dĂ©tection prends moins de 1 seconde pour Ă  une image de 512×512 pixels avec un ordinateur classique ce qui est compatible avec l’application industrielle visĂ©e.Invisible watermarking for ID images printed on plastic card support is a challenging problem that interests the industrial world. In this study, we developed a watermarking algorithm robust to various attacks present in this case. These attacks are mainly related to the print/scan process on the plastic support and the degradations that an ID card can encounter along its lifetime. The watermarking scheme operates in the Fourier domain as this transform has invariance properties against global geometrical transformations. A preventive method consists of pre-processing the host image before the embedding process that reduces the variance of the embeddable vector. A curative method comprises two counterattacks dealing with blurring and color variations. For a false alarm probability of 10⁻⁎, we obtained an average improvement of 22% over the reference method when only preventative method is used. The combination of the preventive and curative methods leads to a detection rate greater than 99%. The detection algorithm takes less than 1 second for a 512×512 image with a conventional computer, which is compatible with the industrial application in question

    Image Watermarking between Conventional and Learning-Based Techniques: A Literature Review

    No full text
    Currently, most transactions and exchanges are conducted through the Internet thanks to technological tools, running the risk of the falsification and distortion of information. This is due to the massive demand for the virtual world and its easy access to anyone. Image watermarking has recently emerged as one of the most important areas for protecting content and enhancing durability and resistance to these kinds of attacks. However, there is currently no integrated technology able to repel all possible kinds of attacks; the main objective of each technology remains limited to specific types of applications, meaning there are multiple opportunities to contribute to the development of this field. Recently, the image watermarking field has gained significant benefits from the sudden popularity of deep learning and its outstanding success in the field of information security. Thus, in this article, we will describe the bridge by which the watermarking field has evolved from traditional technology to intelligent technologies based on deep learning

    Fourier Image Watermarking: Print-Cam Application

    No full text
    Digital image watermarking is an active research field since it provides protection, security, and authenticity of data. This paper presents development and implementation of a blind and robust watermarking application for ID images under a print-cam system. In the present case, the images are watermarked and printed on ID cards and then detected freehandedly with a smartphone camera. In order to design an efficient and robust image watermarking application, the attacks produced in print-cam processes, such as geometric distortions, must be resolved. Accordingly, the proposed watermarking approach is applied in the Fourier domain. Then, a frame-based projective rectification is integrated to deal with geometric distortions by using detection of Hough lines. Moreover, better robustness against print-cam watermarking attacks was achieved compared with the existing methods, and an Android application was designed and implemented based on the proposed scheme

    Measurement and three-dimensional calculation of induced electromotive force in permanent magnets heater cylinders

    No full text
    In this work, the electromotive force (EMF) near a permanent magnet heating cylinder was determined using a practical test bench. The aim is to elaborate three-dimensional analytical calculation capable of predicting accurately the same electromagnetic quantities by calculating the induced EMF in the presence of an inductive sensor. The analytical approach is obtained from developing mathematical integrals using the Coulombian approach to permanent magnets. In this approach, rotations are considered by Euler’s transformations matrices permitting the calculation of all permanent magnets flux densities contributions at the same points in the surrounding free space. These points, part of a uniform rectangular grid of the active EMF sensor surface, are used to compute the EMF by Faraday’s law. The validation results between experimental and simulated ones confirm the robustness and the efficiency of the proposed analytical approach
    corecore