default search action
Sanaa Ghouzali
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j23]Waseeq Ul Islam Zafar, Muhammad Atif Ur Rehman, Farhana Jabeen, Sanaa Ghouzali, Zobia Rehman, Wadood Abdul:
Context-Aware Pending Interest Table Management Scheme for NDN-Based VANETs. Sensors 22(11): 4189 (2022) - [c15]Abrar Alsehli, Wadood Abdul, Saleh Almowuena, Sanaa Ghouzali, Souad Larabi Marie-Sainte:
Medical Image Authentication using Watermarking and Blockchain. HealthCom 2022: 1-6 - 2021
- [j22]Muhammad Sufyan Khan, Farhana Jabeen, Sanaa Ghouzali, Zobia Rehman, Sheneela Naz, Wadood Abdul:
Metaheuristic Algorithms in Optimizing Deep Neural Network Model for Software Effort Estimation. IEEE Access 9: 60309-60327 (2021) - [j21]Naima Bousnina, Lilei Zheng, Mounia Mikram, Sanaa Ghouzali, Khalid Minaoui:
Unraveling robustness of deep face anti-spoofing models against pixel attacks. Multim. Tools Appl. 80(5): 7229-7246 (2021) - [c14]Sanaa Ghouzali, Sahar Bayoumi, Souad Larabi Marie-Sainte, Sara Shaheen:
Covid-19 in Saudi Arabia: A Pandemic Data Descriptive Analysis and Visualization. ArabWIC 2021: 17:1-17:5 - 2020
- [j20]Wadood Abdul, Ohoud Nafea, Sanaa Ghouzali:
Combining Watermarking and Hyper-Chaotic Map to Enhance the Security of Stored Biometric Templates. Comput. J. 63(3): 479-493 (2020) - [j19]Sanaa Ghouzali, Souad Larabi Marie-Sainte:
Face identification based bio-inspired algorithms. Int. Arab J. Inf. Technol. 17(1): 118-127 (2020) - [j18]Haya Al-Tuwaijri, Sanaa Ghouzali:
Android data storage security: A review. J. King Saud Univ. Comput. Inf. Sci. 32(5): 543-552 (2020)
2010 – 2019
- 2019
- [j17]Souad Larabi Marie-Sainte, Nada Alalyani, Sihaam Alotaibi, Sanaa Ghouzali, Ibrahim Abunadi:
Arabic Natural Language Processing and Machine Learning-Based Systems. IEEE Access 7: 7011-7020 (2019) - [c13]Maryam Lafkih, Mounia Mikram, Sanaa Ghouzali, Mohamed El Haziti:
Evaluation of the Impact of Noise on Biometric Authentication Systems. ICAAI 2019: 188-192 - [c12]Naima Bousnina, Sanaa Ghouzali, Mounia Mikram, Wadood Abdul:
DTCWT-DCT watermarking method for multimodal biometric authentication. NISS 2019: 75:1-75:7 - 2018
- [j16]Farhana Jabeen, Zara Hamid, Adnan Akhunzada, Wadood Abdul, Sanaa Ghouzali:
Trust and Reputation Management in Healthcare Systems: Taxonomy, Requirements and Open Issues. IEEE Access 6: 17246-17263 (2018) - 2017
- [j15]Wadood Abdul, Zulfiqar Ali, Sanaa Ghouzali, Budour Alfawaz, Ghulam Muhammad, M. Shamim Hossain:
Biometric Security Through Visual Encryption for Fog Edge Computing. IEEE Access 5: 5531-5538 (2017) - [j14]Farhana Jabeen, Zara Hamid, Wadood Abdul, Sanaa Ghouzali, Saif Ur Rehman Malik, Abid Khan, Sarfraz Nawaz, Hina Ghafoor:
Enhanced Architecture for Privacy Preserving Data Integration in a Medical Research Environment. IEEE Access 5: 13308-13326 (2017) - [j13]Arshad Sher, Nadeem Javaid, Irfan Azam, Hira Ahmad, Wadood Abdul, Sanaa Ghouzali, Iftikhar Azim Niaz, Fakhri Alam Khan:
Monitoring square and circular fields with sensors using energy-efficient cluster-based routing for underwater wireless sensor networks. Int. J. Distributed Sens. Networks 13(7) (2017) - [j12]Mariam Akbar, Nadeem Javaid, Wadood Abdul, Sanaa Ghouzali, Abid Khan, Iftikhar Azim Niaz, Manzoor Ilahi:
Balanced Transmissions Based Trajectories of Mobile Sink in Homogeneous Wireless Sensor Networks. J. Sensors 2017: 4281597:1-4281597:16 (2017) - 2016
- [j11]Ohoud Nafea, Sanaa Ghouzali, Wadood Abdul, Qazi Emad-ul-Haq:
Hybrid Multi-Biometric Template Protection Using Watermarking. Comput. J. 59(9): 1392-1407 (2016) - [j10]Maryam Lafkih, Mounia Mikram, Sanaa Ghouzali, Mohamed El Haziti, Driss Aboutajdine:
Biometric cryptosystems based fuzzy commitment scheme: a security evaluation. Int. Arab J. Inf. Technol. 13(4): 443-449 (2016) - [j9]Chouaib Moujahdi, George Bebis, Sanaa Ghouzali, Mounia Mikram, Mohammed Rziza:
Biometric Template Protection Using Spiral Cube: Performance and Security Analysis. Int. J. Artif. Intell. Tools 25(1): 1550027:1-1550027:30 (2016) - [j8]Sanaa Ghouzali, Maryam Lafkih, Wadood Abdul, Mounia Mikram, Mohamed El Haziti, Driss Aboutajdine:
Trace Attack against Biometric Mobile Applications. Mob. Inf. Syst. 2016: 2065948:1-2065948:15 (2016) - [j7]Souad Larabi Marie-Sainte, Muna S. Al-Razgan, Fatiha Bousbahi, Sanaa Ghouzali, Wadood Abdul:
From Mobile to Wearable System: A Wearable RFID System to Enhance Teaching and Learning Conditions. Mob. Inf. Syst. 2016: 8364909:1-8364909:10 (2016) - [j6]Waseem Raza, Farzana Arshad, Imran Ahmed, Wadood Abdul, Sanaa Ghouzali, Iftikhar Azim Niaz, Nadeem Javaid:
An Improved Forwarding of Diverse Events with Mobile Sinks in Underwater Wireless Sensor Networks. Sensors 16(11): 1850 (2016) - [c11]Naima Bousnina, Sanaa Ghouzali, Maryam Lafkih, Ohoud Nafea, Mounia Mikram, Wadood Abdul, Driss Aboutajdine:
Watermarking for protected fingerprint authentication. IIT 2016: 1-5 - 2015
- [j5]Qazi Emad-ul-Haq, Hatim Aboalsamh, Abdelfettah Belghith, Muhammad Hussain, Wadood Abdul, Mostafa H. Dahshan, Sanaa Ghouzali:
Challenges and Solutions for Internet of Things Driven by IPv6. KSII Trans. Internet Inf. Syst. 9(12): 4739-4758 (2015) - [c10]Sanaa Ghouzali:
Watermarking Based Multi-biometric Fusion Approach. C2SI 2015: 342-351 - [c9]Maryam Lafkih, Patrick Lacharme, Christophe Rosenberger, Mounia Mikram, Sanaa Ghouzali, Mohamed El Haziti, Driss Aboutajdine:
Vulnerabilities of fuzzy vault schemes using biometric data with traces. IWCMC 2015: 822-827 - 2014
- [j4]Chouaib Moujahdi, Sanaa Ghouzali, Mounia Mikram, Wadood Abdul, Mohammed Rziza:
Inter-communication classification for multi-view face recognition. Int. Arab J. Inf. Technol. 11(4): 387-395 (2014) - [j3]Muhammad Bilal, Sana Imtiaz, Wadood Abdul, Sanaa Ghouzali, Shahzad Asif:
Chaos based Zero-steganography algorithm. Multim. Tools Appl. 72(2): 1073-1092 (2014) - [j2]Chouaib Moujahdi, George Bebis, Sanaa Ghouzali, Mohammed Rziza:
Fingerprint shell: Secure representation of fingerprint template. Pattern Recognit. Lett. 45: 189-196 (2014) - 2013
- [c8]Muhammad Bilal, Sana Imtiaz, Wadood Abdul, Sanaa Ghouzali:
Zero-steganography using DCT and spatial domain. AICCSA 2013: 1-7 - 2012
- [c7]Chouaib Moujahdi, Sanaa Ghouzali, Mounia Mikram, Mohammed Rziza, George Bebis:
Spiral Cube for Biometric Template Protection. ICISP 2012: 235-244 - [c6]Maryam Lafkih, Mounia Mikram, Sanaa Ghouzali, Mohamed El Haziti:
Security Analysis of Key Binding Biometric Cryptosystems. ICISP 2012: 269-281 - 2011
- [j1]Mohamed El Aroussi, Mohammed El Hassouni, Sanaa Ghouzali, Mohammed Rziza, Driss Aboutajdine:
Local appearance based face recognition method using block based steerable pyramid transform. Signal Process. 91(1): 38-50 (2011)
2000 – 2009
- 2009
- [c5]Mohamed El Aroussi, Sanaa Ghouzali, Mohammed El Hassouni, Mohammed Rziza, Driss Aboutajdine:
Curvelet-based feature extraction with B-LDA for face recognition. AICCSA 2009: 444-448 - [c4]Mohamed El Aroussi, Mohammed El Hassouni, Sanaa Ghouzali, Mohammed Rziza, Driss Aboutajdine:
Novel face recognition approach based on steerable pyramid feature extraction. ICIP 2009: 4165-4168 - [c3]Mohamed El Aroussi, Sanaa Ghouzali, Mohammed Rziza, Driss Aboutajdine, Mohammed El Hassouni:
Face Recognition Using Enhanced Fisher Linear Discriminant. SITIS 2009: 48-53 - 2008
- [c2]Sanaa Ghouzali, Sheila S. Hemami, Mohammed Rziza, Driss Aboutajdine, El Mustapha Mouaddib:
A skin detection algorithm based on discrete Cosine transform and generalized Gaussian density. ICIP 2008: 605-608 - [c1]Aouatif Amine, Sanaa Ghouzali, Mohammed Rziza, Driss Aboutajdine:
Investigation of feature dimension reduction based DCT/SVM for face recognition. ISCC 2008: 188-193
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint