Naima Hadj-Said

According to our database1, Naima Hadj-Said authored at least 21 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Encryption by block based on rekeying and inter-intra pixel permutation.
Int. J. Inf. Comput. Secur., 2024

2023
A new image compression-encryption scheme based on compressive sensing & classical AES algorithm.
Multim. Tools Appl., November, 2023

A new fast image compression-encryption scheme based on compressive sensing and parallel blocks.
J. Supercomput., May, 2023

A new image encryption scheme based on a hyperchaotic system & multi specific S-boxes.
Inf. Secur. J. A Glob. Perspect., March, 2023

2022
A secure hash function based on sponge construction and chaos-maps.
Int. J. Comput. Sci. Eng., 2022

McEliece cryptosystem based on Plotkin construction with QC-MDPC and QC-LDPC codes.
CoRR, 2022

Enhancing QoS in Privacy Based Vehicular Communication.
Ad Hoc Sens. Wirel. Networks, 2022

2021
Proposition of new secure data communication technique based on Huffman coding, chaos and LSB.
Int. J. Biom., 2021

A New Image Scrambling Technique Only With A Specific Permutation.
Proceedings of the 2021 International Conference on Artificial Intelligence for Cyber Security Systems and Privacy (AI-CSP), 2021

Impact of Silent Periods on Pseudonym Schemes.
Proceedings of the 18th International Multi-Conference on Systems, Signals & Devices, 2021

2020
Data security based on homographic function.
Pattern Recognit. Lett., 2020

A new chaotic encrypted image based on the trigonometric circle.
Inf. Secur. J. A Glob. Perspect., 2020

New chaotic cryptosystem for the image encryption.
Int. J. Inf. Comput. Secur., 2020

New method for identification of persons using geometry foot outline.
Int. J. Biom., 2020

2019
Proposition of a dynamic steganography system based on the chaos properties and image registration for distributing an encryption key.
Int. J. Inf. Priv. Secur. Integr., 2019

2017
Secure Authentication Approach Based New Mobility Management Schemes for Mobile Communication.
J. Inf. Process. Syst., 2017

2012
Joint trellis-coded quantization watermarking for JPEG2000 images.
Ann. des Télécommunications, 2012

2011
A joint JPEG2000 compression and watermarking system using a TCQ-based quantization scheme.
Proceedings of the Visual Information Processing and Communication II, 2011

A Joint Trellis Coded Quantization (TCQ) data hiding scheme in the JPEG2000 part 2 coding framework.
Proceedings of the 19th European Signal Processing Conference, 2011

2009
Sécurité des Données en se basant sur le Chiffre de Hill.
Proceedings of the 2nd Conférence Internationale sur l'Informatique et ses Applications (CIIA'09), 2009

Chaos Crypto-Système basé sur l'Attracteur de Hénon-Lozi.
Proceedings of the 2nd Conférence Internationale sur l'Informatique et ses Applications (CIIA'09), 2009


  Loading...