Page Personnelle du Pr. E. M. SOUIDI -- Université Mohammed V de Rabat

Domaines de recherche : Algèbre, Théorie des codes correcteurs d'erreurs et applications à la cryptographie et à la stéganographie.
Articles scientifiques dans des revues spécialisées
  1. Rabiî Dariti; El Mamoun Souidi, New families of perfect linear error-block codes , International Journal of Information and Coding Theory (IJICOT), Vol. 2, No. 2/3, 2013. Indexé par DBLP voir http://dblp.uni-trier.de/pers/hd/s/Souidi:El _Mamoun
  2. Sidi Mohamed Douiri, Mohamed Boy Ould Medeni, Souad Elbernoussi, El Mamoun Souidi, A New Steganographic Method For Grayscale Image Using Graph Coloring Problem , Applied Mathematics and Information Sciences, Vol 7. No. 2, pp : 521-527 Année 2013. Indexé par Scopus
  3. Garcia-Planas, M.I.; Souidi, E.; Um, L. E. Convolutional codes under linear systems point of view. Analysis of output-controllability , WSEAS transactions on mathematics, Vol. 11, num. 4, p. 324-333 Date of publication: 2012 Journal article. Indexé par Scopus
  4. Houda JOUHARI, and El Mamoun SOUIDI, Application of Cyclic Codes over $ Z_4$ in Steganography , Applied Mathematical Sciences, Vol. 6, 2012, no. 139, 6911 - 6925. Indexé par Scopus.
  5. HOUDA JOUHARI, EL MAMOUN SOUIDI, A Novel Embedding Scheme Based On Walsh Hadamard Transform , Journal of Theoretical and Applied Information Technology, 2011. Vol. 32 No.1 pp55-60. Indexé par Scopus
  6. RABII DARITI, EL MAMOUN SOUIDI, Cyclicity And Decoding Of Linear Error-Block Codes Journal of Theoretical and Applied Information Technology 2011. Vol. 25 No.1 pp 39-42. Indexé par Scopus.
  7. M.B. Ould MEDENI, El Mamoun SOUIDI, Construction and Bound on the Performance of Matrix-Product Codes , Applied Mathematical Sciences, Vol. 5, 2011, no. 19, 929 - 934. Indexé par Scopus
  8. M.B. Ould MEDENI, El Mamoun SOUIDI, A Novel Steganographic Protocol from Error-correcting Codes , Journal of Information Hiding and Multimedia Signal Processing, Volume 1, Number 4, October 2010.
  9. M. B. OULD MEDENI, EL MAMOUN SOUIDI, A Steganography Schema And Error-Correcting Codes , Journal of Theoretical and Applied Information Technology, Vol. 18 No. 1 2010 pp42-47. Indexé par Scopus
  10. Rabii DARITI and El Mamoun SOUIDI, Packing and Covering Radii of Linear Error-Block Codes , International Journal of Mathematical, Computational, Physical, Electrical and Computer Engineering, Vol:7, No:4, 2013 pp 653-657
  11. Garcia-Planas, M.I.; Souidi, E.; Um, L. Analysis of control properties of concatenated convolutional codes . CYBERNETICS AND PHYSICS, 2012, vol. 1, n. 4, p. 252-257.
  12. Houda JOUHARI and EL Mamoun SOUIDI, Reducing the Complexity of Embedding by Applying the Reed-Muller Codes , International Journal of Computer Science Issues, Vol. 9, Issue 6, No 3, 2012, pp 384-388.
  13. Jouhari, H., Souidi, E.M. Improving embedding capacity by using the $ Z_4$-linearity of Preparata codes . International Journal of Computer Applications 53 (18), 1-6 (2012).
  14. Rabi DARITI and El Mamoun SOUIDI, An Application of Linear Error-Block Codes in Steganography , International Journal of Digital Information and Wireless Communications (IJDIWC), 1(2): 426-433, 2011.
  15. M.B. Ould MEDENI and El Mamoun SOUIDI, A Novel Steganographic Protocol from Error-correcting Codes , Journal of Information Hiding and Multimedia Signal Processing, Vol. 1, No. 4, pp. 337-343, October 2010.
  16. M. B. Ould MEDENI, El Mamoun SOUIDI A Generalization of the PVD Steganographic Method International Journal of Computer Science and Information Security. 2010;8(8)156-159.
  17. Publications dans des actes de congrès avec comité de lecture
  18. Rabiî Dariti and El Mamoun Souidi, A Steganographic Protocol Based on Linear Error-Block Codes, DOI: 10.5220/0005014501780183 In Proceedings of the 11th International Conference on Security and Cryptography (SECRYPT-2014), pages 178-183, Vienna. ISBN: 978-989-758-045-1 Indexé par DBLP. http://dblp.uni-trier.de/pers/hd/s/Souidi:El _Mamoun
  19. Hind IDRISSI, Arnaud REVEL, and EL Mamoun SOUIDI, A New Approach based on Cryptography and XML Serialization for Mobile Agent Security , In Proceedings of the 6th International Conference on Agents and Artificial Intelligence, 403-411, 2014, ESEO, Angers, Loire Valley, France
  20. Idrissi, H., Ennahbaoui, M., Souidi, E.-M., Revel, A., and Elhajji, S (2014). Access control using mobile agents . In 2014 International Conference on Multimedia Computing and Systems, (ICMCS 2014) (pp. 1216-1221). Marrakech, Morocco 14 - 16 April 2014 IEEE Catalog Number: CFP14050-POD ISBN: 978-1-4799-3825-4 http://toc.proceedings.com/23773webtoc.pdf Pages: 1216 - 1221, DOI: 10.1109/ICMCS.2014.6911154 IEEE Conference Publications. Indexé par Scopus
  21. M. I. GARCIA-PLANAS, Souidi, E.; Um, L. E. Decoding algorithm for convolutional codes under linear systems point of view . Wseas International Conference on Circuits, Systems, Signal and Telecommunications. "Recent Advances in Circuits, Systems, Signal Processing and Communications". Arona, Tenerife: WSEAS Press, 2014, p. 17-24. URIhttp://hdl.handle.net/2117/21238, ISBN 978-960-474-359-9
  22. Garcia-Planas, M.I.; Souidi, E.; Um, L. Convolutional codes under control theory point of view. Analysis of output-observability . "Recent advances in circuits, communications and signal processing". Atenas: WSEAS Press, 2013, p. 131-137. URIhttp://hdl.handle.net/2117/18256 ISBN 978-1-61804-164-7
  23. Houda Jouhari, EL Mamoun Souidi Steganographic Scheme Using the $ Z_4$ Linear Goethals Codes , The Third International Conference on Digital Information Processing and Communications (ICDIPC2013) - United Arab Emirates, 2013 pp 114-121 http://sdiwc.net/digital-library/steganographic-scheme-using-the-z4linear-goethals-codes.html
  24. Garcia-Planas, M.I.; Souidi, E.; Um, L. Error Correcting Codes Under Linear Systems Point Of View , PHYSCON 2011, Léon, Spain, September, 5 - September, 8 2011. http://hdl.handle.net/2117/15250 http://hdl.handle.net/2117/15250
  25. Rabiî Dariti, El Mamoun Souidi, Improving Code-Based Steganography with Linear Error-Block Codes , Digital Information Processing and Communications, Springer, Volume 189 of the series Communications in Computer and Information Science CCIS pp 310-321, 2011.
  26. Jouhari H. and Souidi E.. A New Steganographic Scheme Based On First Order Reed Muller Codes , In Proceedings of the International Conference on Security and Cryptography (SECRYPT-2011), pages 351-356 DOI: 10.5220/0003512703510356 ISBN: 978-989-8425-71-3 . Indexé par Scopus.
  27. Garcia-Planas, M.I.; Um, L. E.; Souidi, E. Analysis of control properties of convolutional concatenated codes under linear systems point of view . National Security Days. "Conference Proceedings". Rabat: 2013, p. 1-6. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6595475
  28. Medeni, M.B.O.; Souidi, E.-M. A novel steganographic method for gray-level images with four-pixel differencing and LSB substitution , International Conference on Multimedia Computing and Systems (ICMCS) Proceedings, 2011 Pages: 1 - 4, DOI: 10.1109/ICMCS.2011.5945688 Cited by: Papers (2) IEEE Conference Publications
  29. Medeni, M.B.O.; Souidi, E.M. Steganographic algorithm based on error-correcting codes for gray scale images , 5th International Symposium on Communications and Mobile Network (ISVC), 2010, Pages: 1 - 4, DOI: 10.1109/ISVC.2010.5654877 Cited by: Papers (1) IEEE Conference Publications