
Samia BoucherkhaUniversité Constantine 2 | UC2
Samia Boucherkha
Associate professor
About
16
Publications
4,198
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
290
Citations
Publications
Publications (16)
The use of Internet of Things (IoT) is becoming increasingly common in agribusiness to increase food production capacity for the expanding global population. Recently, low-power wide-area networks (LPWANs) have been used in the development of IoT applications that require low power consumption and low data transmission rates. LoRaWAN is considered...
Cluster validation aims to both evaluate the results of clustering algorithms and predict the number of clusters. It is usually achieved using several indexes. Traditional internal clustering validation indexes (CVIs) are mainly based in computing pairwise distances which results in a quadratic complexity of the related algorithms. The existing CVI...
Abstract—Efficient identity management system has become
one of the fundamental requirements for ensuring safe, secure
and transparent use of cloud services. In such a borderless
environment, entities belonging to different network domains
need to cooperate dynamically with each other by exchanging
and sharing a significant amount of personal infor...
Secure and reliable management of identities has become one of the greatest challenges facing cloud computing today, mainly due to the huge number of new cloud-based applications generated by this model, which means more user accounts, passwords, and personal information to provision, monitor, and secure. Currently, identity federation is the most...
With the proliferation of Cloud-based services,
Federated Identity Management (FIM) has gained considerable
attention in recent years. It is considered as a promising
approach to facilitate secure resource sharing between
collaborating partners in the Cloud. However, current FIM
frameworks such as OpenID, SAML, Liberty Alliance,
Shibboleth and WS-F...
Vehicular ad-hoc network (VANET) is a type of mobile ad-hoc network, in which vehicles constitute nodes of a temporary, rapidly changing wireless network, without any fixed infrastructure. In this kind of networks the communication performance is highly dependent on the routing policy. In this study, we examine through simulation, a set of routing...
With the progressive expansion of computer networks and their increasing complexity, it becomes considerably difficult for administrators to ensure the maintenance of these networks with reasonable efforts and in acceptable times.
In this paper, we investigate the potential use of mobile agents in networks management problem. To this end, we propos...
This chapter discusses an approach for both authentication of medical images and confidentiality for the related textual data in an online medical application paradigm. The image authentication is achieved in a soft manner through a feature-based digital signature while the confidentiality of the related patient information is achieved through reve...
This chapter discusses an approach for both authentication of medical images and confidentiality for the related textual data in an online medical application paradigm. The image authentication is achieved in a soft manner through a feature-based digital signature while the confidentiality of the related patient information is achieved through reve...
The comparison of color histograms is one of the most widely used techniques for content-based image retrieval. Before establishing a color histogram in a defined model (RGB, HSV or others), a process of quantization is often used to reduce the number of used colors. In this paper, we present the results of an experimental investigation studying th...
This article discusses an approach for both authentication of medical images and confidentiality for the related textual data in an online medical application paradigm. The image authentication is achieved in a soft manner through a feature-based digital signature while the confidentiality of the related patient information is achieved through reve...
Soft authentication intends to distinguish specific acceptable image manipulations from malicious ones. In this article, we propose a soft authentication scheme based on texture features and digital signature. It can detect and locate malicious manipulations made to individual image blocks, and verify the integrity of the overall image. It makes us...
This paper develops a scheme for semi-fragile image authentication based on texture features and digital signature. It can
detect and locate malicious manipulations made to individual image blocks, and verify the integrity of the overall image.
It makes use of the invariance of Second Order Statistics (SOS) on adjacent pixels to geometric transform...
The paper describes a possible implementation of a Web service that allows a restricted group of authorized users to securely share a collection of medical images which they provide remotely, to constitute incrementally a database stored at the server which maintains a PKI. Watermarking technology is used for the identification of the originator an...