default search action
Mohamed S. Azzaz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j15]Mohamed Salah Azzaz, Redouane Kaibou, Bachir Madani:
Co-design based FPGA implementation of an efficient new speech hyperchaotic cryptosystem in the transform domain. Integr. 97: 102197 (2024) - 2023
- [j14]Mohamed Saad, Abdelmadjid Maali, Mohamed Salah Azzaz, Mustapha Benssalah:
An efficient FPGA-based implementation of UWB radar system for through-wall imaging. Int. J. Commun. Syst. 36(11) (2023) - [c13]Noureddine Aissaoui, Fethi Demim, Abdenebi Rouigueb, Hadjira Belaidi, Ali Zakaria Messaoui, Kahina Louadj, Abdelkrim Nemra, Ahmed Allam, Yasmine Saidi, Said Sadoudi, Mohamed Salah Azzaz:
Secured Communication of Speech Signal Using the Discrete Cosine Transform Based on Hyperchaos-System. ICINCO (2) 2023: 69-76 - [c12]Mohamed Salah Azzaz, Redouane Kaibou, Hamdane Kamelia, Abdenour Kifouche, Djamel Teguig:
Design of a New Hardware IP-HLS for Real-Time Image Chaos-Based Encryption. SECRYPT 2023: 478-485 - 2022
- [j13]Hocine Hamil, Zahia Zidelmal, Mohamed Salah Azzaz, Samir Sakhi, Redouane Kaibou, Salem Djilali, Djaffar Ould Abdeslam:
Design of a secured telehealth system based on multiple biosignals diagnosis and classification for IoT application. Expert Syst. J. Knowl. Eng. 39(4) (2022) - [j12]Abdenour Kifouche, Mohamed Salah Azzaz, Rédha Hamouche, Rémy Kocik:
Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications. Int. J. Inf. Sec. 21(6): 1247-1262 (2022) - [j11]Abderrezzaq Bouhdjeur, Mohamed Salah Azzaz, Djamel Teguig, Camel Tanougast, Abdelmadjid Maali:
An optimised hardware architecture of the angular-domain cyclostationary detector for cognitive radio communications. Integr. 87: 111-121 (2022) - [j10]Mahieddine Anouar Hadjadj, Said Sadoudi, Mohamed Salah Azzaz, Hichem Bendecheche, Redouane Kaibou:
A new hardware architecture of lightweight and efficient real-time video chaos-based encryption algorithm. J. Real Time Image Process. 19(6): 1049-1062 (2022) - [j9]Mohamed Lamine Benseddik, Khalil Zebbiche, Mohamed Salah Azzaz, Said Sadoudi:
Interpolation-based reversible data hiding in the transform domain for fingerprint images. Multim. Tools Appl. 81(14): 20329-20356 (2022) - 2021
- [j8]Redouane Kaibou, Mohamed Salah Azzaz, Mustapha Benssalah, Djamel Teguig, Hocine Hamil, Amira Merah, Meriam Tinhinane Akrour:
Real-time FPGA implementation of a secure chaos-based digital crypto-watermarking system in the DWT domain using co-design approach. J. Real Time Image Process. 18(6): 2009-2025 (2021) - 2020
- [j7]Djamel Teguig, Mohamed Salah Azzaz, Said Sadoudi:
Analysis study and SDR implementation of GoF-based spectrum sensing for cognitive radio. IET Commun. 14(5): 857-864 (2020) - [j6]Mohamed Salah Azzaz, Camel Tanougast, Abdelmadjid Maali, Mustapha Benssalah:
An efficient and lightweight multi-scroll chaos-based hardware solution for protecting fingerprint biometric templates. Int. J. Commun. Syst. 33(10) (2020) - [c11]Mohamed Lamine Benseddik, Khalil Zebbiche, Mohamed Salah Azzaz, Said Sadoudi:
Perceptual Masking Model Using Lifting Wavelet Transform for Fingerprint Images. CSA 2020: 175-184
2010 – 2019
- 2019
- [j5]Wahiba Menasri, Abdellah Skoudarli, Aichouche Belhadj, Mohamed Salah Azzaz:
Field programmable gate array implementation of variable-bins high efficiency video coding CABAC decoder with path delay optimisation. IET Image Process. 13(6): 954-963 (2019) - 2018
- [c10]Mohamed Salah Azzaz, Noureddine Aissaoui, Camel Tanougast:
A Novel Fingerprint Protection Approach based on SoPC Chaotic Encryption. ISNCC 2018: 1-6 - [c9]Djamel Teguig, Mohamed S. Azzaz:
FPGA implementation of Spectrum Sensing methods for Cognitive Radio. ISNCC 2018: 1-5 - 2015
- [c8]Mohamed Salah Azzaz, Tarek Hadjem, Camel Tanougast:
A novel parametric discrete chaos-based switching system for image encryption. CITS 2015: 1-4 - 2014
- [c7]Said Sadoudi, Mohamed Salah Azzaz, Camel Tanougast:
Novel experimental synchronization technique for embedded chaotic communications. CoDIT 2014: 669-672 - [c6]Tarek Hadjem, Mohamed Salah Azzaz, Camel Tanougast, Said Sadoudi:
A new image crypto-compression system SPIHT-PSCS. CoDIT 2014: 706-711 - 2013
- [j4]Mohamed Salah Azzaz, Camel Tanougast, Said Sadoudi, Rabiai Fellah, Abbas Dandache:
A new auto-switched chaotic system and its FPGA implementation. Commun. Nonlinear Sci. Numer. Simul. 18(7): 1792-1804 (2013) - [j3]Mohamed Salah Azzaz, Camel Tanougast, Said Sadoudi, Ahmed Bouridane:
Synchronized hybrid chaotic generators: Application to real-time wireless speech encryption. Commun. Nonlinear Sci. Numer. Simul. 18(8): 2035-2047 (2013) - [j2]Said Sadoudi, Camel Tanougast, Mohamed S. Azzaz, Abbas Dandache:
Design and FPGA implementation of a wireless hyperchaotic communication system for secure real-time image transmission. EURASIP J. Image Video Process. 2013: 43 (2013) - [j1]Mohamed S. Azzaz, Camel Tanougast, Said Sadoudi, Abbas Dandache:
Robust chaotic key stream generator for real-time images encryption. J. Real Time Image Process. 8(3): 297-306 (2013) - [c5]Said Sadoudi, Camel Tanougast, Mohamed S. Azzaz, Abbas Dandache:
Embedded hyperchaotic Lorenz generator for secure communications. NEWCAS 2013: 1-4 - 2011
- [c4]Mohamed S. Azzaz, Camel Tanougast, Said Sadoudi, Abbas Dandache:
New hardware Cryptosystem based chaos for the secure real-time of embedded applications. SiPS 2011: 251-254 - 2010
- [c3]Said Sadoudi, Camel Tanougast, Mohamed S. Azzaz, Abbas Dandache, Ahmed Bouridane:
Embedded Genesio-Tesi chaotic generator for ciphering communications. CSNDSP 2010: 234-238 - [c2]Mohamed S. Azzaz, Camel Tanougast, Said Sadoudi, Ahmed Bouridane, Abbas Dandache:
An FPGA implementation of a Feed-Back Chaotic Synchronization for secure communications. CSNDSP 2010: 239-243
2000 – 2009
- 2009
- [c1]Said Sadoudi, Mohamed S. Azzaz, Camel Tanougast, Abbas Dandache:
Real time hardware implementation of a new Duffing's chaotic attractor. ICECS 2009: 559-562
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint