Mohammed Ouanan
Moulay Ismail University

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search
Journal : Indonesian Journal of Electrical Engineering and Computer Science

Gabor-HOG Features based Face Recognition Scheme Hamid Ouanan; Mohammed Ouanan; Brahim Aksasse
Indonesian Journal of Electrical Engineering and Computer Science Vol 15, No 2: August 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v15.i2.pp331-335

Abstract

Extraction of invariant features is the core of Face RecognitionSystems (FRS). This work proposes a novel feature extractor-fusion scheme using two powerful feature descriptor known as Gabor Filters (GFs) and Histogram of Oriented Gradient (HOG), which the face image is filtered with the multiscale multiresolution Gabor filter bank to generate multiple Gabor magnitude images (GMIs), then the down-sampled GMIs and apply Histogram of Oriented Gradient to form the features. The experimental results on the FERET face database show the effectiveness of our methods.
SIP Authentication Protocols Based On Elliptic Curve Cryptography: Survey and comparison Mourade Azrour; Mohammed Ouanan; Yousef Farhaoui
Indonesian Journal of Electrical Engineering and Computer Science Vol 4, No 1: October 2016
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v4.i1.pp231-239

Abstract

Session Initiation Protocol (SIP) is the most popular signaling protocol using in order to establish, modify and terminate the session multimedia between different participants. It was selected by the Third Generation Project Partnership (3GPP) as a multimedia application protocol in 3G mobile networks. SIP is the protocol currently used for signaling ToIP calls.  The security of SIP is becoming more and more important. Authentication is the most important security service required by SIP. To ensure a secured communication, many SIP authentication protocols have been proposed. This work provides an overview of the proposed schemes based on elliptic curve cryptography. Those proposed schemes are analyzed in security consideration and the computational cost.