Houcemeddine Hermassi
Orcid: 0000-0002-4681-4312
According to our database1,
Houcemeddine Hermassi
authored at least 18 papers
between 2012 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2021
Proceedings of the 18th International Multi-Conference on Systems, Signals & Devices, 2021
2018
An Improved CNN Steganalysis Architecture Based on "Catalyst Kernels" and Transfer Learning.
Proceedings of the Digital Economy. Emerging Technologies and Business Innovation, 2018
2017
Multim. Tools Appl., 2017
A joint encryption-compression codec for speech signals using the ITU-T G.711 standard and chaotic map.
Multim. Tools Appl., 2017
Security analysis and improvement of an active watermarking system for image tampering detection using a self-recovery scheme.
Multim. Tools Appl., 2017
Proceedings of the 12th International Conference for Internet Technology and Secured Transactions, 2017
Proceedings of the Digital Economy. Emerging Technologies and Business Innovation, 2017
2016
2015
Signal Process. Image Commun., 2015
Cryptanalysis of a video encryption method based on mixing and permutation operations in the DCT domain.
Signal Image Video Process., 2015
Multim. Tools Appl., 2015
Statistical performance analysis of a cryptosystem based on the discretized Ikeda system.
Proceedings of the 12th IEEE International Multi-Conference on Systems, Signals & Devices, 2015
Digital images watermarking and partial encryption based on DWT transformation and chaotic maps.
Proceedings of the 12th IEEE International Multi-Conference on Systems, Signals & Devices, 2015
2014
Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps.
Multim. Tools Appl., 2014
Proceedings of the 2014 1st International Conference on Advanced Technologies for Signal and Image Processing (ATSIP), 2014
2013
Telecommun. Syst., 2013
J. Multim. Process. Technol., 2013
2012
Security analysis of image cryptosystems only or partially based on a chaotic permutation.
J. Syst. Softw., 2012