[1] | http://www.ircam.ma/fr/index.php?soc=telec. |
[2] | B.EL KESSAB and M.FAKIR, using neural networks and Markov model for reconnisance of characaters Tifinagh manuscripts, SITACAM’09, 2010. |
[3] | R.EL AYACHI M.FAKIR, Fourier transform and time invariant applied to the recognition of characters Tifinaghe , SITACAM’09, 2010. |
[4] | A.Ouguengay, Integration of the Amazigh in OCR Open Source as a model Ocropus, SITACAM’09, 2010. |
[5] | O.BENDCHAREF and N.IDRISSI, Riemannian geometry to the recognition of Tifinagh characters. SITACAM’09, 2010. |
[6] | http://upload.wikimedia.org/wikipedia/commons/thumb/5/58/ArtificialNeuronModel_francais.png/420px-ArtificialNeuronModel_francais.png |
[7] | http://upload.wikimedia.org/wikipedia/commons/thumb/9/9d/Sigmoide.PNG/220px-Sigmoide.PNG |
[8] | https://encrypted-tbn0.gstatic.com/images?q=tbn:ANd9GcS_dosVDqdK7WZI4aNFSaDNZxjQJhVirSOFdMQIzFK1Rk1kxNsg. |
[9] | Desai (2010), Gujarati handwritten numeral Optical Character Reorganization through neural network pattern recognition 43-2010. |
[10] | H.TARIK, J. EL MILOUD, Tifinagh characters recognition by artificial neural network, SITACAM’13, 2012. |
[11] | R. EL Yachi, K. Moro, Mr. Fakir, B. Bouikhalene (2010), Evaluation Methods SKeletonization for the recognition of printed Tifinaghe Characters, Sitacam'09. |
[12] | http://www.ircam.ma/fr/index.php?soc=ircam&rd=2. |
[13] | Mr. Banoumi, A. Lazrek and K.Sami (2002), an Arabic transliteration / novel for e-paper, Proceeding of the 5th International Symposium on Electronic Document, Federal Conference on the document, Hammamet, Tunisia. |
[14] | C. Rey & J.-L. Dugelay. Blind Detection of Malicious Alterations On Still Images Using Robust Watermarks. IEE Secure Images and Image Authentication colloquium, London, UK, Apr. 2000. |
[15] | M. Kutter, S. Voloshynocskiy and A. Herrigel. The Watermark Copy Attack. In Proceedings of SPIE Security and Watermarking of Multimedia Content II , vol. 3971, San Jose, USA, Jan. 2000. |
[16] | J. Fridrich, M. Goljan & N. Memon. Further Attacks on Yeung-Minzer Fragile Watermarking Scheme. SPIE International Conf. on Security and Watermarking of Multimedia Contents II , vol. 3971, No13, San Jose, USA, Jan. 2000. |
[17] | Julien Chable. Emmanuel Robles Programmation Android, de la conception au déploiement avec le SDK Google Android, New York, France, 2009. |
[18] | UML Infrastructure Final Adopted Speci_cations, version 2.0, Sebtembre 2003.http://www.omg.org/cgi-bin/doc ?ptc/03-09-15.pdf. |
[19] | UML Infrastructure Final Adopted Speci_cations, version 2.0, Sebtembre 2003.http://www.omg.org/cgi-bin/doc ?ptc/03-09-15.pdf. |
[20] | S. Bhattacharjee and M. Kutter. Compression Tolerant Image Authentication. IEEE International Conf. on Image Processing (ICIP’98), Chicago, USA, Oct. 1998. |
[21] | J.-L. Dugelay & S. Roche. Introduction au tatouage d’images. Annales des Télécommunications, 54, no 9-10, pp. 427-437, 1999. |
[22] | J.-L. Dugelay. Procédé de dissimulation d'informations dans une image numérique. Brevet INPI FR 98-04083 (EURECOM 09-FR), March 1998. |
[23] | J.-L. Dugelay & S. Roche. Process for marking a multimedia document, such an image, by generating a mark. Pending patent EP 99480075.3 (EURECOM 11/12 EP), July 1999. |
[24] | J. Fridrich. Robust Bit Extraction From Images. ICMCS’99, Florence, Italy, june 1999. |
[25] | J. Fridrich. Methods for detecting changes in digital images. Proceedings IEEE Int. Conf. on Image Processing (ICIP’98), Chicago, USA, Oct. 1998. |
[26] | Kodak. Understanding and Intergrating KODAK Picture Authentication Cameras.http://www.kodak.com/US/en/digital/software/imageAuthentication/ |
[27] | D. Kundur and D. Hatzinakos. Towards a Telltale Watermarking Technique for Tamper-Proofing. IEEE International Conf. on Image Processing (ICIP’98) , Chicago, USA, Oct. 1998. |
[28] | C.-Y. Lin and S.-F. Chang. A Watermark-Based Robust Image Authentication Using Wavelets. ADVENT Project Report, Columbia University, Apr. 1998. |