Asma Ounzar

We don’t have enough information about this author to calculate their statistics. If you think this is an error let us know.
Learn More
This paper presents a permutation technique based on a sinusoid whose complexity is O(N) but providing a very acceptable security. It considers an image as a set of vertical and horizontal bits that shift under the effect of a sinusoidal wave. This results in the permutation of the image content at the level of bits. As a result, for only one round of the(More)
Hardware resources require efficient scaling because the future of computing technology seems to be intensive multithreaded. One of the main challenges in the scalability of computers hardware is the hierarchy of the memory. Chip-multiprocessors (CMPs) rely on large and multi-level hierarchies of caches to reduce cost of resources and improve systems(More)
Most of papers on image encryption provide some measures to attest that the presented works satisfy the required criteria in the field. Some others propose a comparative study and decide on whether one work is better than another one always using these measures. These last are of different types where the correlation coefficient is one among them. It is a(More)
  • 1