
Khalid HosnyZagazig University · Department of Information Technology
Khalid Hosny
PhD
I am working as a prof. of Information technology and looking for scientific collaborations in my areas of interests.
About
169
Publications
74,418
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
3,852
Citations
Citations since 2017
Introduction
Currently, my research interests are in image processing, computer vision, multimedia & multimedia security, IoT, and cloud computing.
Additional affiliations
January 2012 - present
Zagazig University
January 2012 - July 2013
January 2002 - present
Education
May 1997 - November 2000
Publications
Publications (169)
Special Issue: Call for papers
Medical video watermarking is one of the beneficial and efficient tools to prohibit important patients' data from illicit enrollment and redistribution. In this paper, a new blind watermarking scheme has been proposed to improve the confidentiality, integrity, authenticity, and perceptual quality of a medical video with minimum distortion. The prop...
Skin cancer is a senior public health issue that could profit from computer-aided diagnosis to decrease the encumbrance of this widespread disease. Researchers have been more motivated to develop computer-aided diagnosis systems because visual examination wastes time. The initial stage in skin lesion analysis is skin lesion segmentation, which migh...
This paper proposes a new robust watermarking method for securing color medical images, where the proposed method relies on combining Slant, Singular Value Decomposition (SVD), and quaternion Fourier-Transform (QFT). The stimulus behind this combination is to improve the invisibility and durability of the proposed method. First, the input cover ima...
The fast-paced advancement in multimedia production and exchanges over unsecured networks have led to a dire need to develop security applications. In this regard, chaos theory has much to offer, especially high-dimensional (HD) chaotic functions of fractional order. The authors propose a new symmetric, secure and robust image encryption method in...
This research paper investigates mobile edge computing (MEC) networks, which involve numerous wireless devices transferring their computation tasks to various edge servers and a single cloud server. The study considers various real-time dependent computation tasks composing an application running on each connected device. This study aims to determi...
Image moments are image descriptors widely utilized in several image processing, pattern recognition, computer vision, and multimedia security applications. In the era of big data, the computation of image moments yields a huge memory demand, especially for large moment order and/or high-resolution images (i.e., megapixel images). The state-of-the-...
Background:
In our current digital world, smartphones are no longer limited to communication but are used in various real-world applications. In the healthcare industry, smartphones have sensors that can record data about our daily activities. Such data can be used for many healthcare purposes, such as elderly healthcare services, early disease di...
Pelvis fracture detection is vital for diagnosing patients and making treatment decisions for traumatic pelvis injuries. Computer-aided diagnostic approaches have recently become popular for assisting doctors in disease diagnosis, making their conclusions more trustworthy and error-free. Inspecting X-ray images with fractures needs a lot of time fr...
Human Skin cancer is commonly detected visually through clinical screening followed by a dermoscopic examination. However, automated skin lesion classification remains challenging due to the visual similarities between benign and melanoma lesions. In this work, the authors proposed a new Artificial Intelligence-Based method to classify skin lesions...
A novel multi-objective Coronavirus disease optimization algorithm (MOCOVIDOA) is presented to solve global optimization problems with up to three objective functions. This algorithm used an archive to store non-dominated POSs during the optimization process. Then, a roulette wheel selection mechanism selects the effective archived solutions by sim...
Computational offloading allows lightweight battery-operated devices such as IoT gadgets and mobile equipment to send computation tasks to nearby edge servers to be completed, which is a challenging problem in the multi-access edge computing (MEC) environment. Numerous conflicting objectives exist in this problem; for example, the execution time, e...
Cervical spine (CS) fractures or dislocations are medical emergencies that may lead to more serious consequences, such as significant functional disability, permanent paralysis, or even death. Therefore, diagnosing CS injuries should be conducted urgently without any delay. This paper proposes an accurate computer-aided-diagnosis system based on de...
Background:
Bio-signals are the essential data that smart healthcare systems require for diagnosing and treating common diseases. However, the amount of these signals that need to be processed and analyzed by healthcare systems is huge. Dealing with such a vast amount of data presents difficulties, such as the need for high storage and transmissio...
COVID-19 is highly infectious and causes acute respiratory disease. Machine learning (ML) and deep learning (DL) models are vital in detecting disease from computerized chest tomography (CT) scans. The DL models outperformed the ML models. For COVID-19 detection from CT scan images, DL models are used as end-to-end models. Thus, the performance of...
Document examination is a vital mission for revealing illegal modifications that assist in the detection and resolution of criminal acts. Addition and alteration are more frequently used in handwritten documents. However, most of the documents have been modified with similar inks, and it is tough to detect or observe them with human eyes. As a resu...
The internet of things (IoT) is the communication of everything with anything else, with the primary goal of data transfer over a network. Raspberry Pi, a low-cost computer device with minimal energy consumption is employed in IoT applications designed to accomplish many of the same tasks as a normal desktop computer. Raspberry Pi is a quad-core co...
The image moments are considered a key technique for image feature extraction. It is utilized in several applications such as watermarking and classification. One of the major shortcomings of the image moment descriptors is the computation time. The image moments algorithm is a compute-intensive task. This can be justified by the fact that computin...
In modern technologies, digital image processing is an essential field with various applications. Over the past few years, the multidisciplinary field of real-time image processing has undergone an explosion. Scientists are looking for advanced processing tools such as embedded and special hardware systems such as Raspberry Pi for big data processi...
Recently, digital images have been considered the primary key for many applications, such as forensics, medical diagnosis, and social networks. Image forgery detection is considered one of the most complex digital image applications. More profoundly, image splicing was investigated as one of the common types of image forgery. As a result, we propos...
Plant diseases are one of the primary causes of decreased agricultural production quality and quantity. With ongoing changes in plant structure and cultivation techniques, new diseases are constantly arising on plant leaves. Thus, accurate classification and detection of plant leaf diseases in their early stages will limit the spread of the infecti...
Considering the current dependency on digital technology in modern society, the protection of multimedia is highly important. Encryption is vital in modern digital communication, ensuring data confidentiality, authentication, integrity, and non-repudiation. Multimedia encryption-based security techniques are becoming increasingly important as they...
despite the extensive use of IoT and mobile devices in the different applications, their computing power, memory, and battery life are still limited. Multi-Access Edge Computing (MEC) has recently emerged to address the drawbacks of these limitations. With MEC on the network's edge, mobile and IoT devices can offload their computing operations to a...
Volumetric images have a three-dimensional (3D) view, in which viewers can examine their characteristics from any angle. The more accurate the digital representation of volumetric images, the more precise and valuable the assessment of what these images represent. The representation of volumetric images is a significant area of study in pattern rec...
This paper proposes a new method for encryption of RGB color images by combining two encryption approaches: the spatial approach and the transformation approach. The proposed method uses the 3D fractional modified Henon map (3D FrMHM) and the discrete fractional Krawtchouk moments (FrDKM). We have also proposed a new hybrid optimization algorithm (...
Multimedia information usage is increasing with new technologies such as the Internet of things (IoT), cloud computing, and big data processing. Video is one of the most widely used types of multimedia. Videos are played and transmitted over different networks in many IoT applications. Consequently, securing videos during transmission over various...
The number of diabetic patients is increasing yearly worldwide, requiring the need for a quick intervention to help these people. Mortality rates are higher for diabetic patients with other serious health complications. Thus, early prediction for such diseases positively impacts healthcare quality and can prevent serious health complications later....
Pathologists need a lot of clinical experience and time to do the histopathological investigation. AI may play a significant role in supporting pathologists and resulting in more accurate and efficient histopathological diagnoses. Breast cancer is one of the most diagnosed cancers in women worldwide. Breast cancer may be detected and diagnosed usin...
Image segmentation is a critical step in digital image processing applications. One of the most preferred methods for image segmentation is multilevel thresholding, in which a set of threshold values is determined to divide an image into different classes. However, the computational complexity increases when the required thresholds are high. Theref...
Digital images are transferred with ease through the network. Many users are using the images without the knowledge of the owners. Therefore, a novel watermarking scheme is proposed to ensure copyright protection and authentication of images using cryptography techniques. Here, a quick response (QR) image is generated for a watermark image that con...
This paper presents a novel bio-inspired optimization algorithm called Coronavirus Optimization Algorithm (COVIDOA). COVIDOA is an evolutionary search strategy that mimics the mechanism of coronavirus when hijacking human cells. COVIDOA is inspired by the frameshifting technique used by the coronavirus for replication. The proposed algorithm is tes...
Medical image segmentation is a crucial step in Computer-Aided Diagnosis systems, where accurate segmentation is vital for perfect disease diagnoses. This paper proposes a multilevel thresholding technique for 2D and 3D medical image segmentation using Otsu and Kapur's entropy methods as fitness functions to determine the optimum threshold values....
Copyright protection of medical images is a vital goal in the era of smart healthcare systems. In recent telemedicine applications, medical images are sensed using medical imaging devices and transmitted to remote places for screening by physicians and specialists. During their transmission, the medical images could be tampered with by intruders. T...
Robust watermarking is an effective method and a promising solution for securing and protecting the copyright of digital images. Moments and moment invariants have become popular tools for robust watermarking due to their geometric invariance and favorable capability of image description. Many moments-based robust watermarking schemes have been pro...
Recently, there has been a rapid growth in the utilization of medical images in telemed-icine applications. The authors in this paper presented a detailed discussion of different types of medical images and the attacks that may affect medical image transmission. This survey paper summarizes existing medical data security approaches and the differen...
Because of the current COVID-19 circumstances in the world and the tremendous technological developments, it has become necessary to use this technology to combat the spread of the new coronavirus. The systems that depend on using hands, such as fingerprint systems and PINs in ATM systems, could lead to infection, so they have become undesirable an...
Internet of Things (IoT) enables different smart environment objects to communicate without involving humans. Recently, IoT has started a new challenge within the healthcare sector called the Internet of Medical Things (IoMT). The huge amounts of data generated by IoMT entities need to be analyzed in real-time to improve the performance and quality...
Image authentication approaches have gotten a lot of interest recently as a way to safeguard transmitted images. Watermarking is one of the many ways used to protect transmitted images. Watermarking systems are pc-based that have limited portability that is difficult to use in harsh environments as military use. We employ embedded devices like Rasp...
The increased use of smart devices such as mobile devices, Internet of Things devices, cameras, and microphones, has produced big data. Large data dimensionality, redundancy, and irrelevance are challenging problems. Feature selection is a necessary process to select the optimal subset of features. In this paper, the authors propose a novel Binary...
Abstract:
The World Wide Web Consortium (W3C) RDB2RDF Work Group (RDB2RDF-WG) recommended two mapping languages, Direct Mapping (DM) and Relational Database to RDF Mapping Language (R2RML) for Mapping Relational Databases (RDBs) to Resource Description Framework (RDF). Direct Mapping directly maps the RDB schema to RDF using a collection of simple...
The fractional-order functions show better performance than their corresponding integer-order functions in various image processing applications. In this paper, the authors propose a novel utilization of fractional-order chaotic systems in color image encryption. The 4D hyperchaotic Chen system of fractional-order combined with the Fibonacci Q-matr...
A communications system consists of interconnected telecommunications networks, transmission systems, relay stations, tributary stations, and terminal equipment. Increasing network limits to fulfill the developing needs of consumers has prompted the advancement of cell correspondence networks from 1G to 5G. Many heterogeneous connections request hi...
Orthogonal moments (OMs) are used to extract features from color images. OMs with fractional orders are better than the OMs with integer orders due to their ability to extract fine features. This paper defined novel quaternion orthogonal shifted Gegenbauer moments (FrQSGMs) of fractional orders for color image analysis and recognition. Since both s...
Skin cancer is the most common type of cancer that affects humans and is usually diagnosed by initial clinical screening, which is followed by dermoscopic analysis. Automated classification of skin lesions is still a challenging task because of the high visual similarity between melanoma and benign lesions. This paper proposes a new residual deep c...
A novel cryptosystem of color images is proposed. We defined a multi-channel orthogonal Gegenbauer moments with fractional order (FrMGMs) in Cartesian coordinates and then combined the FrMGMs with the 2D logistic-sine map. The proposed color image encryption method has three main steps in this process. The first step is confusion, where image pixel...
Images are very important forms of data that are widely used nowadays. Every day, millions of grey and color images are transferred via the web. Protecting these images from unauthorized persons is an important issue. Image encryption is one of the image-securing techniques. One advantage of using encryption is that the plain image is converted to...
Patients’ readmission can be considered as a critical factor affecting cost reduction while maintaining a high-quality treatment of patients. Therefore, predicting and controlling patients’ readmission rates would significantly improve the healthcare service. In this study, we aim at predicting the readmission of COPD (Chronic Obstructive Pulmonary...
Internet of Medical Things (IoMT) plays a vital role in healthcare systems to increase electronic devices accuracy, reliability, and productivity. This paper presents fast multiple zero-watermarking methods based on Multi-channel Fractional Legendre Fourier moments (MFrLFMs) for medical image security and copyright protection in IoMT applications w...
Recently, digital images have become used in many applications, where they have become the focus of digital image processing researchers. Image forgery represents one hot topic on which researchers prioritize their studies. We concentrate on the copy-move image forgery topic as a deceptive forgery type. In copy-move image forgery, a part of an imag...
Surely surveillance cameras are certainly important in all aspects of life. We have become in an era where we need to use surveillance cameras everywhere, homes, schools, banks, hospitals, and companies, even in the general streets, to monitor everything that happens and follow the progress of those places with all safety by surveillance videos. Ho...
Watermarking of digital images is a well-known technique that is widely used for securing image contents. A successful watermarking method must be accurate, reversible, resilient, and robust against various attacks. In this paper, we propose a reversible and robust color image watermarking method. A new set of multi-channel fractional-order polar h...
This paper proposes a new blind, color image watermarking method using fast Walsh-Hadamard transformation (FWHT) and multi-channel fractional Legendre-Fourier moments (MFrLFMs). The input host color image is first split into 4 × 4 non-interfering blocks, and the MFrLFMs are computed for each block, where proper MFrLFMs coefficients are selected and...
Representation and classification of color texture generate considerable interest within the field of computer vision. Texture classification is a difficult task that assigns unlabeled images or textures to the correct labeled class. Some key factors such as scaling and viewpoint variations and illumination changes make this task challenging. In th...
In some situations, finding the rare association rule is of higher importance than the frequent itemset. Unique rules represent rare cases, activities, or events in real-world applications. It is essential to extract exceptional critical activity from vast routine data. This paper proposes a new algorithm called FR-Tree to mine the association rule...
The single watermarking algorithm for medical images faced several inherent problems like lack of security. In this paper, a new geometrically invariant multiple zero-watermarking method is proposed to secure medical images. We proposed a novel set of multi-channels shifted Gegenbauer moments of fractional orders (FrMGMs). These moments are used to...
Computer-aided systems for skin lesion diagnosis is a growing area of research. Recently, researchers have shown an increasing interest in developing computer-aided diagnosis systems. This paper aims to review, synthesize and evaluate the quality of evidence for the diagnostic accuracy of computer-aided systems. This study discusses the papers publ...
One of the most often used techniques to represent color images is quaternion algebra. This study introduces the quaternion Krawtchouk moments, QKrMs, as a new set of moments to represent color images. Krawtchouk moments (KrMs) represent one type of discrete moments. QKrMs use traditional Krawtchouk moments of each color channel to describe color i...
Zero-watermarking methods provide promising solutions and impressive performance for copyright protection of images without changing the original images. In this paper, a novel zero-watermarking method for color images is envisioned. Our envisioned approach is based on multi-channel orthogonal Legendre Fourier moments of fractional orders, referred...
Color face recognition has more attention recently since it considered one of the most popular biometric pattern recognitions. With a considerable development in multimedia technologies, finding a suitable color information extraction from color images becomes a hard problem. Several color face recognition methods have been developed. However, thes...