Sanaa Ghouzali

Orcid: 0000-0001-9381-4246

According to our database1, Sanaa Ghouzali authored at least 38 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2022
Context-Aware Pending Interest Table Management Scheme for NDN-Based VANETs.
Sensors, 2022

Medical Image Authentication using Watermarking and Blockchain.
Proceedings of the IEEE International Conference on E-health Networking, 2022

2021
Unraveling robustness of deep face anti-spoofing models against pixel attacks.
Multim. Tools Appl., 2021

Metaheuristic Algorithms in Optimizing Deep Neural Network Model for Software Effort Estimation.
IEEE Access, 2021

Covid-19 in Saudi Arabia: A Pandemic Data Descriptive Analysis and Visualization.
Proceedings of the ArabWIC 2021: The 7th Annual International Conference on Arab Women in Computing in Conjunction with the 2nd Forum of Women in Research, 2021

2020
Android data storage security: A review.
J. King Saud Univ. Comput. Inf. Sci., 2020

Face identification based bio-inspired algorithms.
Int. Arab J. Inf. Technol., 2020

Combining Watermarking and Hyper-Chaotic Map to Enhance the Security of Stored Biometric Templates.
Comput. J., 2020

2019
Arabic Natural Language Processing and Machine Learning-Based Systems.
IEEE Access, 2019

DTCWT-DCT watermarking method for multimodal biometric authentication.
Proceedings of the 2nd International Conference on Networking, 2019

Evaluation of the Impact of Noise on Biometric Authentication Systems.
Proceedings of the 3rd International Conference on Advances in Artificial Intelligence, 2019

2018
Trust and Reputation Management in Healthcare Systems: Taxonomy, Requirements and Open Issues.
IEEE Access, 2018

2017
Balanced Transmissions Based Trajectories of Mobile Sink in Homogeneous Wireless Sensor Networks.
J. Sensors, 2017

Monitoring square and circular fields with sensors using energy-efficient cluster-based routing for underwater wireless sensor networks.
Int. J. Distributed Sens. Networks, 2017

Enhanced Architecture for Privacy Preserving Data Integration in a Medical Research Environment.
IEEE Access, 2017

Biometric Security Through Visual Encryption for Fog Edge Computing.
IEEE Access, 2017

2016
An Improved Forwarding of Diverse Events with Mobile Sinks in Underwater Wireless Sensor Networks.
Sensors, 2016

From Mobile to Wearable System: A Wearable RFID System to Enhance Teaching and Learning Conditions.
Mob. Inf. Syst., 2016

Trace Attack against Biometric Mobile Applications.
Mob. Inf. Syst., 2016

Biometric Template Protection Using Spiral Cube: Performance and Security Analysis.
Int. J. Artif. Intell. Tools, 2016

Biometric cryptosystems based fuzzy commitment scheme: a security evaluation.
Int. Arab J. Inf. Technol., 2016

Hybrid Multi-Biometric Template Protection Using Watermarking.
Comput. J., 2016

Watermarking for protected fingerprint authentication.
Proceedings of the 2016 12th International Conference on Innovations in Information Technology (IIT), 2016

2015
Challenges and Solutions for Internet of Things Driven by IPv6.
KSII Trans. Internet Inf. Syst., 2015

Vulnerabilities of fuzzy vault schemes using biometric data with traces.
Proceedings of the International Wireless Communications and Mobile Computing Conference, 2015

Watermarking Based Multi-biometric Fusion Approach.
Proceedings of the Codes, Cryptology, and Information Security, 2015

2014
Fingerprint shell: Secure representation of fingerprint template.
Pattern Recognit. Lett., 2014

Chaos based Zero-steganography algorithm.
Multim. Tools Appl., 2014

Inter-communication classification for multi-view face recognition.
Int. Arab J. Inf. Technol., 2014

2013
Zero-steganography using DCT and spatial domain.
Proceedings of the ACS International Conference on Computer Systems and Applications, 2013

2012
Spiral Cube for Biometric Template Protection.
Proceedings of the Image and Signal Processing - 5th International Conference, 2012

Security Analysis of Key Binding Biometric Cryptosystems.
Proceedings of the Image and Signal Processing - 5th International Conference, 2012

2011
Local appearance based face recognition method using block based steerable pyramid transform.
Signal Process., 2011

2009
Face Recognition Using Enhanced Fisher Linear Discriminant.
Proceedings of the Fifth International Conference on Signal-Image Technology & Internet-Based Systems, 2009

Novel face recognition approach based on steerable pyramid feature extraction.
Proceedings of the International Conference on Image Processing, 2009

Curvelet-based feature extraction with B-LDA for face recognition.
Proceedings of the 7th IEEE/ACS International Conference on Computer Systems and Applications, 2009

2008
Investigation of feature dimension reduction based DCT/SVM for face recognition.
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008

A skin detection algorithm based on discrete Cosine transform and generalized Gaussian density.
Proceedings of the International Conference on Image Processing, 2008


  Loading...