DSpace Repository

Browsing Scientific Published Papers by Author "Farajallah, Mousa"

Browsing Scientific Published Papers by Author "Farajallah, Mousa"

Sort by: Order: Results:

  • El Assad, Safwan; Farajallah, Mousa; Vladeanu, Calin (The 10th International Conference on Communications (COMM), 2014-05-29)
    A variety of chaos-based cryptosystems have been investigated during the last decade. Most of them are based on the structure of Fridrich, which is based on the traditional confusion-diffusion architecture proposed by ...
  • Farajallah, Mousa (UNIVERSITE DE NANTES, 2015-06-30)
    The security of image and video data is important for many applications which require in real-time a high security level. In the first part of this work, four chaos-based cryptosystems, flexible, efficient, and more robust ...
  • AbuTaha, Mohammed; El Assad, Safwan; Farajallah, Mousa; Queudet, Audrey; Deforge, Olivier (2015 10th International Conference for Internet Technology and Secured Transactions (ICITST), 2015-12-14)
    Based on some important properties of chaos, such as ergodicity, quasi-randomness, and high sensitivity to the secret key, chaos is a hot research field in secured communication, and recently a variety of chaos-based ...
  • Hamamreh, Rushdi; Farajallah, Mousa (International Journal of Computer Science and Network Security, 2009-05-29)
    Information security is an important issue. Hill Cipher is one of the most famous symmetric cryptosystem that can be used to protect information from unauthorized access.Hill cipher is a polygraph substitution cipher based ...
  • Farajallah, Mousa; El Assad, Safwan; Chetto, Maryline (2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing, 2013-08-20)
    Wireless Sensor Networks (WSNs) are a growing field of research since they are used in many applications. Nevertheless, they are subject to many requirements such as real-time constraints, energy limitations, and security ...
  • Farajallah, Mousa; Fawaz, Zeinab; El Assad, Safwan; Deforges, Olivier (The 7th International Conference on Emerging Security Information, Systems and Technologies, 2013-08-25)
    Many image encryption algorithms based on chaos have been proposed since 1989. Most of them are slow and use a secret key of encryption/decryption independent of the plain image. We introduce a new fast and secure image ...
  • Farajallah, Mousa; Deforges, Olivier; El Assad, Safwan (International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, 2016-02-01)
    Nonlinear dynamic cryptosystems or chaos-based cryptosystems have been attracting a large amount of research since 1990. The critical aspect of cryptography is to face the growth of communication and to achieve the design ...
  • Chetto, Maryline; Noura, Hassan; El Assad, Safwan; Farajallah, Mousa (2012 International Conference for Internet Technology and Secured Transactions, 2012-12-20)
    Abstract: A growing number of systems are highly connected and distributed over the internet. These systems require innovative software services and infrastructures in order to guarantee security and reliability. This ...
  • Chetto, Maryline; El Assad, Safwan; Farajallah, Mousa (International Journal of Internet Technology and Secured Transactions, 2014-01-01)
    A growing number of systems are highly connected and distributed over the internet. These systems require innovative software services and infrastructures in order to guarantee security and reliability. This issue has a ...
  • Fawaz, Zeinab; El Assad, Safwan; Farajallah, Mousa; Ayman, Khalil; Lozi, René; Déforges, Olivier (8th International Conference for Internet Technology and Secured Transactions (ICITST-2013), 2013-12-09)
    In the last two decades, several chaos-based cryptosystems have been proposed. Some of them have architecture comprising a layer of permutation and a layer of diffusion and these layers are simultaneously executed in a ...
  • El Assad, Safwan; Farajallah, Mousa (Signal Processing: Image Communication-Elsevier, 2016-02-29)
    During the last decade, a variety of chaos-based cryptosystems has been introduced to protect the content of the transmitted images. In this paper, we propose a new fast, simple, and robust chaos-based cryptosystem ...
  • AbuTaha, Mohammed; Farajallah, Mousa; Tahboub, Radwan (International Journal of Computer Applications, 2011-06-01)
    It is well known that Hash algorithm works in one way, and it cannot be reversed. We can build a new algorithm by using Hill cipher technique .Since its invention in 1929, Hill cipher algorithm which is one of the most ...
  • Farajallah, Mousa; Hamidouche, Wassim; Deforges, Olivier; El Assad, Safwan (2015 IEEE International Conference on Image Processing (ICIP), 2015-09-27)
    In this paper we investigate privacy protection for the HEVC standard based on the tile concept. Tiles in HEVC enable the video to be split into independent rectangular regions. Two solutions are proposed to encrypt the ...
  • Farajallah, Mousa; Qumsieh, Rawan; Isayed, Samer (The Tenth International Conference on Emerging Security Information, Systems and Technologies--SECURWARE 2016, 2016-07-24)
    Confusion and diffusion are the two main principles in encryption. Confusion is a process that drastically changes data from the input to the output. In order to make it right, we have to make the relation between the ...
  • Hamidouche, Wassim; Farajallah, Mousa; Raulet, Mickael; Deforges, Olivier; El Assad, Safwan (2015 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2015-04-19)
    In this paper we investigate a selective video encryption in the scalable HEVC extension (SHVC). The SHVC extension encodes the video in several layers corresponding to different spatial and quality representations of the ...
  • Farajallah, Mousa; Hamamreh, Rushdi (Proceedings of the 2009 International Conference on Security Management, SAM 2009, 2009-07-13)
    Many cryptosystems were designed to prevent data from unauthorized access, and some are relatively secure but slow. Others are fast but relatively not secure enough. One of the most efficient cryptosystems is Hill ...
  • AbuTaha, Mohammed; Farajallah, Mousa; Tahboub, Radwan; Odeh, Mohammad (International Journal of Computer Science and Security (IJCSS), 2011-06-02)
    Cryptography in the past was used in keeping military information, diplomatic correspondence secure and in protecting the national security. However, the use was limited. Nowadays, the range of cryptography applications ...

Search DSpace


Browse

My Account