


default search action
Kamel Mohamed Faraoun
Person information
- affiliation: Djilalli Liabbes University, Computer Science Department, Sidi Bel Abbes, Algeria
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j21]Azeddine Attir, Farid Naït-Abdesselam, Kamel Mohamed Faraoun:
Lightweight anonymous and mutual authentication scheme for wireless body area networks. Comput. Networks 224: 109625 (2023) - [j20]Fethi Imad Benaribi
, Mimoun Malki
, Kamel Mohamed Faraoun, Samir Ouchani
:
A SPARQL-based framework to preserve privacy of sensitive data on the semantic web. Serv. Oriented Comput. Appl. 17(3): 183-199 (2023) - 2021
- [c7]Fethi Imad Benaribi, Mimoun Malki
, Kamel Mohamed Faraoun:
Protecting Sensitive Data in Web of Data. MEDI Workshops 2021: 152-165
2010 – 2019
- 2019
- [j19]Kamel Mohamed Faraoun:
A novel verifiable and unconditionally secure (m, t, n)-threshold multi-secret sharing scheme using overdetermined systems of linear equations over finite Galois fields. Int. J. Inf. Comput. Secur. 11(1): 61-82 (2019) - 2018
- [j18]Amina Souyah, Kamel Mohamed Faraoun:
An efficient and secure chaotic cipher algorithm for image content preservation. Commun. Nonlinear Sci. Numer. Simul. 60: 12-32 (2018) - [j17]Rabab Beniani, Kamel Mohamed Faraoun:
A Mixed Chaotic-cellular Automata Based Encryption Scheme for Compressed Jpeg Images. J. Multim. Process. Technol. 9(3): 88-101 (2018) - 2017
- [j16]Kamel Mohamed Faraoun:
Design of a new efficient and secure multi-secret images sharing scheme. Multim. Tools Appl. 76(5): 6247-6261 (2017) - 2016
- [j15]Chaima Bensaid, Sofiane Boukli Hacene
, Kamel Mohamed Faraoun:
Detection and Ignoring of Blackhole Attack in Vanets Networks. Int. J. Cloud Appl. Comput. 6(2): 1-10 (2016) - [c6]Samira Ouddane, Kamel Mohamed Faraoun, Sid Ahmed Fezza
, Mohamed-Chaker Larabi:
Adaptive colorization-based compression for stereoscopic images. 3DTV-Conference 2016: 1-4 - 2015
- [j14]Alaa Eddine Belfedhal, Kamel Mohamed Faraoun:
Building Secure and Fast Cryptographic Hash Functions Using Programmable Cellular Automata. J. Comput. Inf. Technol. 23(4): 317-328 (2015) - [j13]Souad Bekkouch, Kamel Mohamed Faraoun:
Robust and Reversible Image Watermarking Scheme Using Combined DCT-DWT-SVD Transforms. J. Inf. Process. Syst. 11(3): 406-420 (2015) - [j12]Mokhtar Ouamri, Kamel Mohamed Faraoun:
Designing A Novel Selective, Fast and Efficient Encryption Scheme For HEVC Video Sequences. J. Multim. Process. Technol. 6(1): 7-19 (2015) - [j11]Kamel Mohamed Faraoun:
On the semantic security of cellular automata based pseudo-random permutation using results from the Luby-Rackoff construction. Ann. UMCS Informatica 15(1): 21-31 (2015) - 2014
- [j10]Kamel Mohamed Faraoun:
Design of fast one-pass authenticated and randomized encryption schema using reversible cellular automata. Commun. Nonlinear Sci. Numer. Simul. 19(9): 3136-3148 (2014) - [j9]Kamel Mohamed Faraoun:
A genetic strategy to design cellular automata based block ciphers. Expert Syst. Appl. 41(17): 7958-7967 (2014) - [j8]Kamel Mohamed Faraoun:
A novel fast hybrid GCD computation algorithm. Int. J. Comput. Sci. Math. 5(1): 37-47 (2014) - [j7]Kamel Mohamed Faraoun:
A novel fast and provably secure (t, n)-threshold secret sharing construction for digital images. J. Inf. Secur. Appl. 19(6): 331-340 (2014) - [j6]Sid Ahmed Fezza
, Mohamed-Chaker Larabi, Kamel Mohamed Faraoun:
Feature-Based Color Correction of Multiview Video for Coding and Rendering Enhancement. IEEE Trans. Circuits Syst. Video Technol. 24(9): 1486-1498 (2014) - [c5]Sid Ahmed Fezza
, Mohamed-Chaker Larabi, Kamel Mohamed Faraoun:
Asymmetric coding using Binocular Just Noticeable Difference and depth information for stereoscopic 3D. ICASSP 2014: 880-884 - [c4]Sid Ahmed Fezza
, Mohamed-Chaker Larabi, Kamel Mohamed Faraoun:
Stereoscopic image quality metric based on local entropy and binocular just noticeable difference. ICIP 2014: 2002-2006 - [c3]Sid Ahmed Fezza
, Mohamed-Chaker Larabi, Kamel Mohamed Faraoun:
Asymmetric coding of stereoscopic 3D based on perceptual significance. ICIP 2014: 5656-5660 - 2013
- [j5]Ali Cherif Moussa, Kamel Mohamed Faraoun, Sofiane Boukli Hacene:
Link Quality and MAC-Overhead aware Predictive Preemptive Multipath Routing Protocol for Mobile Ad hoc Networks. Int. J. Commun. Networks Inf. Secur. 5(3) (2013) - [c2]Sid Ahmed Fezza, Mohamed-Chaker Larabi, Kamel Mohamed Faraoun:
Coding and rendering enhancement of multi-view video by color correction. EUVIP 2013: 166-171 - [i1]Ali Cherif Moussa, Kamel Mohamed Faraoun:
Link Quality and MAC-Overhead aware Predictive Preemptive Routing Protocol for Mobile Ad hoc Network. CoRR abs/1312.7126 (2013) - 2011
- [c1]Sid Ahmed Fezza
, Kamel Mohamed Faraoun:
New Prediction Structure for Stereoscopic Video Coding Based on the H.264/AVC Standard. DICTAP (1) 2011: 762-769 - 2010
- [j4]Kamel Faraoun:
Chaos-Based Key Stream Generator Based on Multiple Maps Combinations and its Application to Images Encryption. Int. Arab J. Inf. Technol. 7(3): 231-240 (2010)
2000 – 2009
- 2007
- [j3]Kamel Faraoun, Aoued Boukelif:
Genetic Programming Approach for Multi-Category Pattern Classification Applied to Network Intrusions Detection. Int. Arab J. Inf. Technol. 4(3): 237-246 (2007) - 2006
- [j2]Kamel Faraoun, Aoued Boukelif:
Genetic Programming Approach for Multi-Category Pattern Classification Applied to Network Intrusions Detection. Int. J. Comput. Intell. Appl. 6(1): 77-99 (2006) - 2005
- [j1]Kamel Faraoun, Aoued Boukelif:
Speeding Up Fractal Image Compression by Genetic Algorithms. Multidimens. Syst. Signal Process. 16(2): 217-236 (2005)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:25 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint