Security analysis of an image encryption algorithm based on a DNA addition combining with chaotic maps H Houcemeddine, B Akram, R Rhouma, belghith Safya Multimedia Tools and Applications, 2013 | 90* | 2013 |
A new adaptive image steganography scheme based on DCT and chaotic map M Saidi, H Hermassi, R Rhouma, S Belghith Multimedia Tools and Applications 76, 13493-13510, 2017 | 82 | 2017 |
Chaotic watermark for blind forgery detection in images SB Oussama Benrhouma, Houcemeddine Hermassi, Ahmed A. Abd El-Latif Multimedia Tools and Applications, 2015 | 76* | 2015 |
Improvement of an image encryption algorithm based on hyper-chaos H Hermassi, R Rhouma, S Belghith Telecommunication Systems 52, 539-549, 2013 | 69 | 2013 |
Breaking an image encryption scheme based on a spatiotemporal chaotic system R Bechikh, H Hermassi, AA Abd El-Latif, R Rhouma, S Belghith Signal Processing: Image Communication 39, 151-158, 2015 | 68 | 2015 |
Joint compression and encryption using chaotically mutated Huffman trees H Hermassi, R Rhouma, S Belghith Communications in nonlinear science and numerical simulation 15 (10), 2987-2999, 2010 | 57 | 2010 |
Algebraic analysis of a RGB image encryption algorithm based on DNA encoding and chaotic map A Belazi, H Hermassi, R Rhouma, S Belghith Nonlinear Dynamics 76, 1989-2004, 2014 | 53 | 2014 |
Tamper detection and self-recovery scheme by DWT watermarking O Benrhouma, H Hermassi, S Belghith Nonlinear Dynamics 79, 1817-1833, 2015 | 49 | 2015 |
Security analysis of image cryptosystems only or partially based on a chaotic permutation H Hermassi, R Rhouma, S Belghith Journal of Systems and Software 85 (9), 2133-2144, 2012 | 39 | 2012 |
A new image encryption scheme based on a simple first-order time-delay system with appropriate nonlinearity O Mannai, R Bechikh, H Hermassi, R Rhouma, S Belghith Nonlinear Dynamics 82 (1), 107-117, 2015 | 33 | 2015 |
Cryptanalysis of a video encryption method based on mixing and permutation operations in the DCT domain O Benrhouma, H Hermassi, AAA El-Latif, S Belghith Signal, Image and Video Processing 9, 1281-1286, 2015 | 21 | 2015 |
Security analysis and improvement of an active watermarking system for image tampering detection using a self-recovery scheme O Benrhouma, H Hermassi, S Belghith Multimedia Tools and Applications 76, 21133-21156, 2017 | 19 | 2017 |
A joint encryption-compression codec for speech signals using the ITU-T G. 711 standard and chaotic map H Hermassi, M Hamdi, R Rhouma, SM Belghith Multimedia Tools and Applications 76 (1), 1177-1200, 2017 | 15 | 2017 |
Security analysis and improvement of a partial encryption scheme O Benrhouma, H Hermassi, S Belghith Multimedia Tools and Applications 74, 3617-3634, 2015 | 13 | 2015 |
Digital images watermarking and partial encryption based on DWT transformation and chaotic maps O Benrhouma, O Mannai, H Hermassi 2015 IEEE 12th International Multi-Conference on Systems, Signals & Devices …, 2015 | 13 | 2015 |
An improved CNN steganalysis architecture based on “catalyst kernels” and transfer learning R El Beji, M Saidi, H Hermassi, R Rhouma Digital Economy. Emerging Technologies and Business Innovation: Third …, 2018 | 10 | 2018 |
USAD: undetectable steganographic approach in DCT domain M Saidi, O Mannai, H Hermassi, R Rhouma, S Belghith The Imaging Science Journal 67 (5), 237-253, 2019 | 5 | 2019 |
A modified hyperchaos based image cryptosystem H Hermassi, R Rhouma, S Belghith 2009 6th International Multi-Conference on Systems, Signals and Devices, 1-6, 2009 | 5 | 2009 |
LSB-hamming based chaotic steganography (LH-Steg) M Saidi, H Hermassi, R Rhouma, S Belghith 2017 12th International Conference for Internet Technology and Secured …, 2017 | 4 | 2017 |
A new secure and efficient scheme of ADPCM encoder based on chaotic encryption M Hamdi, H Hermassi, R Rhouma, S Belghith 2014 1st International Conference on Advanced Technologies for Signal and …, 2014 | 4 | 2014 |