Kamel Mohamed Faraoun

Affiliations:
  • Djilalli Liabbes University, Computer Science Department, Sidi Bel Abbes, Algeria


According to our database1, Kamel Mohamed Faraoun authored at least 28 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A SPARQL-based framework to preserve privacy of sensitive data on the semantic web.
Serv. Oriented Comput. Appl., September, 2023

Lightweight anonymous and mutual authentication scheme for wireless body area networks.
Comput. Networks, April, 2023

2021
Protecting Sensitive Data in Web of Data.
Proceedings of the Advances in Model and Data Engineering in the Digitalization Era, 2021

2019
A novel verifiable and unconditionally secure (m, t, n)-threshold multi-secret sharing scheme using overdetermined systems of linear equations over finite Galois fields.
Int. J. Inf. Comput. Secur., 2019

2018
A Mixed Chaotic-cellular Automata Based Encryption Scheme for Compressed Jpeg Images.
J. Multim. Process. Technol., 2018

An efficient and secure chaotic cipher algorithm for image content preservation.
Commun. Nonlinear Sci. Numer. Simul., 2018

2017
Design of a new efficient and secure multi-secret images sharing scheme.
Multim. Tools Appl., 2017

2016
Detection and Ignoring of Blackhole Attack in Vanets Networks.
Int. J. Cloud Appl. Comput., 2016

Adaptive colorization-based compression for stereoscopic images.
Proceedings of the True Vision - Capture, Transmission and Display of 3D Video, 2016

2015
On the semantic security of cellular automata based pseudo-random permutation using results from the Luby-Rackoff construction.
Ann. UMCS Informatica, 2015

Designing A Novel Selective, Fast and Efficient Encryption Scheme For HEVC Video Sequences.
J. Multim. Process. Technol., 2015

Robust and Reversible Image Watermarking Scheme Using Combined DCT-DWT-SVD Transforms.
J. Inf. Process. Syst., 2015

Building Secure and Fast Cryptographic Hash Functions Using Programmable Cellular Automata.
J. Comput. Inf. Technol., 2015

2014
Feature-Based Color Correction of Multiview Video for Coding and Rendering Enhancement.
IEEE Trans. Circuits Syst. Video Technol., 2014

A novel fast and provably secure (t, n)-threshold secret sharing construction for digital images.
J. Inf. Secur. Appl., 2014

A novel fast hybrid GCD computation algorithm.
Int. J. Comput. Sci. Math., 2014

A genetic strategy to design cellular automata based block ciphers.
Expert Syst. Appl., 2014

Design of fast one-pass authenticated and randomized encryption schema using reversible cellular automata.
Commun. Nonlinear Sci. Numer. Simul., 2014

Asymmetric coding of stereoscopic 3D based on perceptual significance.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Stereoscopic image quality metric based on local entropy and binocular just noticeable difference.
Proceedings of the 2014 IEEE International Conference on Image Processing, 2014

Asymmetric coding using Binocular Just Noticeable Difference and depth information for stereoscopic 3D.
Proceedings of the IEEE International Conference on Acoustics, 2014

2013
Link Quality and MAC-Overhead aware Predictive Preemptive Multipath Routing Protocol for Mobile Ad hoc Networks.
Int. J. Commun. Networks Inf. Secur., 2013

Link Quality and MAC-Overhead aware Predictive Preemptive Routing Protocol for Mobile Ad hoc Network.
CoRR, 2013

Coding and rendering enhancement of multi-view video by color correction.
Proceedings of the European Workshop on Visual Information Processing, 2013

2011
New Prediction Structure for Stereoscopic Video Coding Based on the H.264/AVC Standard.
Proceedings of the Digital Information and Communication Technology and Its Applications, 2011

2010
Chaos-Based Key Stream Generator Based on Multiple Maps Combinations and its Application to Images Encryption.
Int. Arab J. Inf. Technol., 2010

2007
Genetic Programming Approach for Multi-Category Pattern Classification Applied to Network Intrusions Detection.
Int. Arab J. Inf. Technol., 2007

2005
Speeding Up Fractal Image Compression by Genetic Algorithms.
Multidimens. Syst. Signal Process., 2005


  Loading...