Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New method for identification of persons using geometry foot outline., , and . Int. J. Biom., 12 (2): 179-192 (2020)A new fast image compression-encryption scheme based on compressive sensing and parallel blocks., , and . J. Supercomput., 79 (8): 8843-8889 (May 2023)Enhancing QoS in Privacy Based Vehicular Communication., , , , and . Ad Hoc Sens. Wirel. Networks, 52 (3-4): 273-295 (2022)Generalized Iterative Dichotomy PAPR Reduction Method for Multicarrier Waveforms., , , , and . IEEE Access, (2021)Proposition of new secure data communication technique based on Huffman coding, chaos and LSB., , and . Int. J. Biom., 13 (2/3): 343-365 (2021)A secure hash function based on sponge construction and chaos-maps., , and . Int. J. Comput. Sci. Eng., 25 (3): 285-297 (2022)A New Image Scrambling Technique Only With A Specific Permutation., , and . AI-CSP, page 1-14. IEEE, (2021)Hyperspectral Data Preprocessing of the Northwestern Algeria Region., , , and . NISS (Springer), volume 237 of Smart Innovation, Systems and Technologies, page 635-652. Springer, (2021)RPL rank based-attack mitigation scheme in IoT environment., , , , and . Int. J. Commun. Syst., (2021)Data security based on homographic function., , and . Pattern Recognit. Lett., (2020)