Zobrazeno 1 - 10
of 48
pro vyhledávání: '"Faraoun Kamel Mohamed"'
Publikováno v:
In Computer Networks April 2023 224
Autor:
Faraoun, Kamel Mohamed
Publikováno v:
In Journal of Information Security and Applications December 2014 19(6):331-340
Autor:
Faraoun, Kamel Mohamed
Publikováno v:
In Expert Systems With Applications 1 December 2014 41(17):7958-7967
Autor:
Faraoun, Kamel Mohamed
Publikováno v:
In Optics and Laser Technology December 2014 64:145-155
Autor:
Faraoun, Kamel Mohamed
Publikováno v:
In Communications in Nonlinear Science and Numerical Simulation September 2014 19(9):3136-3148
Autor:
Faraoun Kamel Mohamed
Publikováno v:
Engineering Science and Technology, an International Journal, Vol 17, Iss 2, Pp 85-94 (2014)
We propose a novel images encryption schema based on reversible one-dimensional cellular automata. Contrasting to the sequential operating mode of several existing approaches, the proposed one is fully parallelizable since the encryption/decryption t
Externí odkaz:
https://doaj.org/article/2afa893c95d54ec1b50f2ac22e3a226b
Autor:
Faraoun Kamel Mohamed, Souyah Amina
Publikováno v:
Communications in Nonlinear Science and Numerical Simulation. 60:12-32
This paper proposes a new chaotic cipher algorithm for efficient and secure image content preservation, this method is specialized for both standard and medical images, and it consists of two modules which are iteratively performed: chaotic confusion
Publikováno v:
International Journal of Computer Network and Information Security. 7:42-49
MANET Mobile Ad hoc Network are evolved through various characteristics such as shared media, this property make a routing protocols vulnerable. AODV is a reactive routing where each intermediate node cooperates in the process of route discovery. In
Autor:
Faraoun Kamel Mohamed, Bekkouche Souad
Publikováno v:
International Journal of Computing and Digital Systems. 3:237-245
This paper presents a secure and robust image watermarking scheme based on the reversible DWT-DCT-SVD transformations to increase both integrity authentication and confidentiality. The proposed approach uses two types of watermarks image: a reversibl
Autor:
Rabhi Abbes, Faraoun Kamel Mohamed
Publikováno v:
Malaysian Journal of Computer Science. 20:77-90
Geometric distortions are generally simple and effective attack to many existing watermarking methods which can make detection of the embedded watermark difficult or even impossible. A robust watermarking system must be able to encounter such attacks