Open Access
Issue
E3S Web Conf.
Volume 601, 2025
The 3rd International Conference on Energy and Green Computing (ICEGC’2024)
Article Number 00092
Number of page(s) 11
DOI https://doi.org/10.1051/e3sconf/202560100092
Published online 16 January 2025
  1. Li, S., Zhang, X. Toward construction-based data hiding: From secrets to fingerprint images (2019) IEEE Transactions on Image Processing, 28 (3), art. no. 8510853, pp. 1482–1497 [CrossRef] [Google Scholar]
  2. Tang, Z., Chen, L., Zhang, X., Zhang, S. Robust Image Hashing with Tensor Decomposition (Open Access) (2019) IEEE Transactions on Knowledge and Data Engineering, 31 (3), art. no. 8360464, pp. 549–560. [CrossRef] [Google Scholar]
  3. Celik, M.U., Sharma, G., Tekalp, A.M., Saber, E. Lossless generalized-LSB data embedding (2005) IEEE Transactions on Image Processing, 14 (2), pp. 253–266. [CrossRef] [PubMed] [Google Scholar]
  4. Tian, J. Reversible Data Embedding Using a Difference Expansion (2003) IEEE Transactions on Circuits and Systems for Video Technology, 13 (8), pp. 890–896. [CrossRef] [Google Scholar]
  5. Alattar, A.M. Reversible watermark using the difference expansion of a generalized integer transform (2004) IEEE Transactions on Image Processing, 13 (8), pp. 1147–1156. [CrossRef] [PubMed] [Google Scholar]
  6. Ou, B., Li, X., Zhao, Y., Ni, R., Shi, Y.-Q. Pairwise prediction-error expansion for efficient reversible data hiding (2013) IEEE Transactions on Image Processing, 22 (12), art. no. 6595594, pp. 5010–5021. [CrossRef] [PubMed] [Google Scholar]
  7. Chen, X., Sun, X., Sun, H., Zhou, Z., Zhang, J. Reversible watermarking method based on asymmetric-histogram shifting of prediction errors (Open Access) (2013) Journal of Systems and Software, 86 (10), pp. 2620–2626. [CrossRef] [Google Scholar]
  8. Ou, B., Li, X., Zhao, Y., Ni, R. Reversible data hiding using invariant pixel-valueordering and prediction-error expansion (2014) Signal Processing: Image Communication, 29 (7), pp. 760–772. [CrossRef] [Google Scholar]
  9. Peng, F., Li, X., Yang, B. Improved PVO-based reversible data hiding (2014) Digital Signal Processing: A Review Journal, 25 (1), pp. 255–265. [CrossRef] [Google Scholar]
  10. Tao, J., Li, S., Zhang, X., Wang, Z. Towards Robust Image Steganography (2019) IEEE Transactions on Circuits and Systems for Video Technology, 29 (2), art. no. 8533349, pp. 594–600. [CrossRef] [Google Scholar]
  11. Wang, D., Zhang, X., Yu, C., Tang, Z. Reversible Data Hiding by Using Adaptive Pixel Value Prediction and Adaptive Embedding Bin Selection (2019) IEEE Signal Processing Letters, 26 (11), art. no. 8831397, pp. 1713–1717. [CrossRef] [Google Scholar]
  12. Qin, J., Huang, F. Reversible Data Hiding Based on Multiple Two-Dimensional Histograms Modification (2019) IEEE Signal Processing Letters, 26 (6), art. no. 8681095, pp. 843–847. [CrossRef] [Google Scholar]
  13. Qi, W., Li, X., Zhang, T., Guo, Z. Optimal Reversible Data Hiding Scheme Based on Multiple Histograms Modification (2020) IEEE Transactions on Circuits and Systems for Video Technology, 30 (8), art. no. 8844778, pp. 2300–2312. [CrossRef] [Google Scholar]
  14. Touil, H., El Akkad, N., & Satori, K. 2020. Text Encryption: Hybrid cryptographic method using Vigenere and Hill Ciphers. In Proceedings of the International Conference on Intelligent Systems and Computer Vision (ISCV) 2020, 1–6. [Google Scholar]
  15. Es-Sabry, M., El Akkad, N., Merras, M., Saaidi, A., Satori, K. 2018. A novel text encryption algorithm based on the two-square cipher and Caesar cipher. Communication in Computer and Information Science 872 (2018), 78–88. [CrossRef] [Google Scholar]
  16. Elazzaby, F., El Akkad, N., Kabbaj, S. 2020. A new encryption approach based on four-square and zigzag encryption (C4CZ). Advances in Intelligent Systems and Computing 1076 (2020), 589–597. [CrossRef] [Google Scholar]
  17. Touil, H., El Akkad, N., & Satori, K. 2021. Securing the Storage of Passwords Based on the MD5 HASH Transformation. International Conference on Digital Technologies and Applications 2021. [Google Scholar]
  18. Touil, H., El Akkad, N., & Satori, K. 2020. H-Rotation: Secure storage and retrieval of passphrases on the authentication process. International Journal of Safety and Security Engineering 10, 6 (2020), 785–796. [CrossRef] [Google Scholar]
  19. Ennaji, S., Akkad, N. E., Haddouch, K. 2023. i-2NIDS: A Novel Intelligent Intrusion Detection Approach for a Strong Network Security. International Journal of Information Security and Privacy, 2023. [Google Scholar]
  20. Ennaji, S., Akkad, N. E., Haddouch, K. 2021. A Powerful Ensemble Learning Approach for Improving Network Intrusion Detection System (NIDS). In Proceedings of the 5 th International Conference on Intelligent Computing in Data Sciences (ICDS 2021). [Google Scholar]
  21. Touil, H., El Akkad, N., & Satori, K. 2021. Secure and guarantee QoS in a video sequence: A new approach based on TLS protocol to secure data and RTP to ensure real-time exchanges. International Journal of Safety and Security Engineering 11, 1 (2021), 59–68. [CrossRef] [Google Scholar]
  22. F. ElAzzaby, K.H. Sabour, N. ELakkad, W. El-Shafai, A. Torki, S.R. Rajkumar, Color image encryption using a Zigzag Transformation and sine-cosine maps, Scientific African, Volume 22, 2023. [Google Scholar]
  23. M. Es-Sabry et al., “Securing Images Using High Dimensional Chaotic Maps and DNA Encoding Techniques,” in IEEE Access, vol. 11, pp. 100856–100878, 2023. [CrossRef] [Google Scholar]
  24. C. Fouzia Elazzaby, Nabil Elakkad; Khalid Sabour; Samir Kabbaj; A NEW CONTRIBUTION OF IMAGE ENCRYPTION BASED ON CHAOTIC MAPS and THE Z/nZ GROUP; Journal of Theoretical and Applied Information Technology Volume 101, Issue 1, Pages 37–4715 January 2023. [Google Scholar]
  25. H. Touil, N. E. Akkad, K. Satori, N. F. Soliman and W. El-Shafai, “Efficient Braille Transformation for Secure Password Hashing,” in IEEE Access, vol. 12, pp. 5212–5221, 2024, DOI: 10.1109/ACCESS.2024.3349487. [CrossRef] [Google Scholar]
  26. Azzaby, F.E., Akkad, N.E., Sabour, K. et al. A new encryption scheme for RGB color images by coupling 4D chaotic laser systems and the Heisenberg group. Multimed Tools Appl (2023). [Google Scholar]
  27. Touil, H., El Akkad, N., & Satori, K. 2022. Homomorphic Method Additive Using Pailler and Multiplicative Based on RSA in Integers Numbers. Lecture Notes in Networks and Systems 489 LNNS, pp. 153–164 [CrossRef] [Google Scholar]
  28. F. E. Azzaby, N. E. Akkad, K. Sabour, and S. Kabbaj, ‘‘An RGB image encryption algorithm based on Clifford attractors with a bilinear transformation,’’ in Proc. Int. Conf. Big Data Internet Things, in Lecture Notes in Networks and Systems, 2022, pp. 116–127. [Google Scholar]
  29. F. El Azzaby, N. E. Akkad, and S. Kabbaj, ‘‘Advanced encryption of image based on S-box and chaos 2D (LSMCL),’’ in Proc. 1st Int. Conf. Innov. Res. Appl. Sci., Eng. Technol. (IRASET), Apr. 2020, pp. 1–7. [Google Scholar]
  30. M. Es-Sabry, N. E. Akkad, M. Merras, A. Saaidi, and K. Satori, ‘‘Grayscale image encryption using shift bits operations,’’ in Proc. Int. Conf. Intell. Syst. Comput. Vis. (ISCV), 2018, pp. 1–7. [Google Scholar]
  31. M. Es-Sabry, N. E. Akkad, M. Merras, A. Saaidi, and K. Satori, ‘‘A new color image encryption algorithm using random number generation and linear functions,’’ in Embedded Systems and Artificial Intelligence (Advances in Intelligent Systems and Computing), vol. 1076. Singapore: Springer, 2020, pp. 581–588. [Google Scholar]
  32. M. Es-Sabry, N. E. Akkad, M. Merras, A. Saaidi, and K. Satori, ‘‘A new image encryption algorithm using random numbers generation of two matrices and bit-shift operators,’’ Soft Comput., vol. 24, no. 5, pp. 3829–3848, Mar. 2020. [CrossRef] [Google Scholar]
  33. M. Es-Sabry, N. E. Akkad, M. Merras, A. Saaidi, and K. Satori, ‘‘A new color image encryption algorithm using multiple chaotic maps with the intersecting planes method,’’ Sci. Afr., vol. 16, Jul. 2022, Art. no. e01217. [Google Scholar]
  34. H. Touil, N. E. Akkad, and K. Satori, ‘‘Ensure the confidentiality of documents shared within the enterprise in the cloud by using a cryptographic delivery method,’’ in Proc. Int. Conf. Digit. Technol. Appl., in Lecture Notes in Networks and Systems, vol. 455, 2022, pp. 241–250. [Google Scholar]
  35. Es-Sabry, M., El Akkad, N., Khrissi, L., Satori K., El-Shafai, W., Altameem, T., Singh Rathore, R. An efficient 32-bit color image encryption technique using multiple chaotic maps and advanced ciphers. Egyptian Informatics Journal, 2024, 25, 100449 [CrossRef] [Google Scholar]
  36. Es-Sabry, M., EL Akkad, N., Merras, M., Satori, K., El-Shafai, W., Altameem, T., Fouda, M.M. Securing Images Using High Dimensional Chaotic Maps and DNA Encoding Techniques. IEEE Access, 2023, 11, pp. 100856–100878 cs and Physics (2020) [CrossRef] [Google Scholar]

Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.

Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.

Initial download of the metrics may take a while.