PDF Engineering Profession Ethics |
1–2–3–4 |
Logic Design |
1–2–3–4 |
البحوث المنشورة
A Second order Derivatives based Approach for Steganography Conference SECRYPT 2016.
|
On the usefulness of information hiding techniques for wireless sensor networks security Conference on Ad Hoc – Springer 2014
|
Performance Study of Steganalysis Techniques Conference Applied Research in Computer Science and Engineering (ICAR), 2015 International Conference 2015
|
Steganalyzer performances in operational contexts Conference Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP),International Conference (IEEE) 2015
|
Rola Al-Sharif, Christophe Guyeux, Yousra Ahmed Fadil, Abdallah Makhoul,Ali Jaber,On the Usefulness of Information Hiding Techniques for Wireless Sensor Networks Security,Ad Hoc Networks,Vol 140,PP.51-62, 2014 |
|
Yousra Ahmed Fadil, Jean Francois Couchot, Rapheal Couturier, Christophe Guyeu,Performance Study of Steganalysis Techniques,International Conference, Applied Research in Computer Science and Engineering (ICAR),PP. 1-7, 2015 |
|
Jean Francois Couchot, Rapheal Couturier, Christophe Guyeu,Steganalyzer Performances in operational context,International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP),PP.429-432, 2015 |
|
|