Graduate School and Research Center In communication systems


Eurecom - Digital Security 
04 93 00 81 41
04 93 00 82 00


  • He is currently with the EURECOM, Digital Security dept. as a Professor
  • He teaches Image and Video Processing and Coding, and Imaging for Security Applications (Watermarking, Steganography, Biometrics, Video surveillance and Forensics)

My courses

  • ImCod / Fall 2016 - Image Coding

    Because multimedia data (in particular image and video) require efficient compression techniques in order to be stored and delivered, image and video compression is a crucial element of an effective communication system.

    This course covers the most popular lossless and lossy formats, introduces the key techniques used in source coding, as well as appropriate objective/subjective metrics for visual quality evaluation. 

    Teaching and Learning Methods:

    Each class includes a problem session for students to practice the material learned.

    This course includes a limited number of lab session hours.

    Course Policies: It is mandatory to attend lab. sessions.

  • ImProc / Fall 2016 - Digital Image Processing

    The course aims at providing students with a basic knowledge and practice about the use of computer algorithms to perform image processing on digital images. The two main objectives attached to Digital Image Processing (DIP) are to improve the visual quality of images and to automatically extract semantic information from visual data (e.g. object recognition). 

    Teaching and Learning Methods: Each session is split into two parts: 1.5-hour lecture and 1.5-hour lab.

     Course Policies:  It is mandatory to attend lab. sessions.

  • ImSecu / Spring 2017 - Imaging for security applications watermarking & biometrics

    • Watermarking : Watermarking allows owners or providers to hide an invisible and robust message inside a digital Multimedia document, mainly for security purposes such as owner or content authentication. There is a complex trade-off between the different parameters : capacity, visibility and robustness.
    • Biometrics : The security fields uses three different types of authentication : something you know, something you have, ore something you are : a biometric. Common physical biometrics includes fingerprints, hand geometry ; and retina, iris or facial characteristics. Behavioural characters include signature, voice. Ultimately, the technologies could find their strongest role as intertwined and complementary pieces of a multifactor authentication system. In the future biometrics is seen playing a key role in enhancing security, residing in smart cards and supporting personalized Web e-commerce services. Personalization through person authentication is also very appealing in the consumer product area.
    • This course will focus on enabling technologies for Biometrics, with a particular emphasis on person verification and authentication based on or widely using image/video processing.



  • In June 2016, he has received with his PhD student Grégory Antipov, a double Award (Best Paper Award and 1st Place Award) for their paper "Apparent Age Estimation from Face Images Combining General and Children-Specialized Deep Learning Models" (IEEE CVPR).
  • In November 2013, he has received with his co-authors Xuran Zhao and Nicholas Evans, a Best Student Paper Award for the article "Unsupervised multi-view dimensionality reduction with application to audio-visual speaker retrieval".
  • He received the Fellow Distinction from IEEE in 2012.
  • In July 2011, he was awarded a Best Presentation Award (with Antitza Dantcheva) for the article "Female facial aesthetics based on soft biometrics and photo-quality"
  • He was awarded the SEE 2010 Blondel Medal for his outstanding work in biometrics and digital watermarking.