Khalid Hosny

Khalid Hosny
Zagazig University · Department of Information Technology

PhD
I am working as a prof. of Information technology and looking for scientific collaborations in my areas of interests.

About

205
Publications
102,758
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,101
Citations
Introduction
Currently, my research interests are in image processing, computer vision, multimedia & multimedia security, IoT, and cloud computing.
Additional affiliations
January 2012 - July 2013
Najran University
Position
  • Head of Department
January 2012 - present
Zagazig University
January 2002 - present
Education
May 1997 - November 2000
University of Cincinnati
Field of study
  • Mathematical Modelling

Publications

Publications (205)
Article
Full-text available
The accurate classification of potato leaf diseases plays a pivotal role in ensuring the health and productivity of crops. This study presents a unified approach for addressing this challenge by leveraging the power of Explainable AI (XAI) and transfer learning within a deep Learning framework. In this research, we propose a transfer learning-based...
Article
Full-text available
Recently, scientists have widely utilized Artificial Intelligence (AI) approaches in intelligent agriculture to increase the productivity of the agriculture sector and overcome a wide range of problems. Detection and classification of plant diseases is a challenging problem due to the vast numbers of plants worldwide and the numerous diseases that...
Article
Full-text available
Developing robust and secure image encryption methods for transmitting multiple images in batches over unprotected networks has become imperative. This necessity arises from the limitations of single-image encryption techniques in managing the escalating volume of extensive data. This paper introduces a novel three-layer multiple-image encryption (...
Article
Full-text available
Brain tumors are very dangerous as they cause death. A lot of people die every year because of brain tumors. Therefore, accurate classification and detection in the early stages can help in recovery. Various deep learning techniques have achieved good results in brain tumor classification. The traditional deep learning methods and training the neur...
Article
Full-text available
This study proposes a new deep-learning approach incorporating a superfluity mechanism to categorize knee X-ray images into osteoporosis, osteopenia, and normal classes. The superfluity mechanism suggests the use of two distinct types of blocks. The rationale is that, unlike a conventional serially stacked layer, the superfluity concept involves co...
Article
Medical images are essential for diagnosing and determining certain diseases. Securing transmitted medical images is essential where insecure networks negatively influence important patient data. Several medical image-securing methods have succeeded, but their robustness against complex attacks has been neglected, which motivated researchers to str...
Article
Full-text available
Unmanned systems play a pivotal role in military surveillance, critical infrastructure protection, law enforcement, search and rescue operations, and border security, showcasing their multifaceted importance across diverse applications. Video fraud detection is integral to multimedia security, where our task involves the precise identification of m...
Article
Full-text available
This research work presents a novel secured spatial steganography algorithm consisting of three stages. In the first stage, a secret message is divided into three parts, each is encrypted using a tan logistic map encryption key with a unique seed value. In the second stage, the encrypted parts are transformed into quick response codes, serving as a...
Article
Full-text available
Digital video watermarking research has yielded numerous promising breakthroughs in recent years. As more people grow interested in videos, the copyright protection of videos has become an urgent issue that must be addressed. Digital video watermarking is a significant method for copyright protection of videos because of the growing need to safegua...
Article
Full-text available
With the rapid growth of the Internet of Things (IoT), the Internet of Medical Things (IoMT) has emerged as a critical sector that enhances convenience and plays a vital role in saving lives. IoMT devices facilitate remote access and control of various medical tools, significantly improving accessibility in the healthcare field. However, the connec...
Article
Full-text available
People transmit millions of digital images daily over various networks, where securing these images is a big challenge. Image encryption is a successful approach widely used in securing digital images while transmitting. Researchers developed different encryption techniques that focus on securing individual images. Recently, encryption of multiple...
Article
Full-text available
Vehicle communication is one of the most vital aspects of modern transportation systems because it enables real-time data transmission between vehicles and infrastructure to improve traffic flow and road safety. The next generation of mobile technology, 5G, was created to address earlier generations' growing need for high data rates and quality of...
Article
Full-text available
A new image encryption algorithm based on the triple chaotic maps is proposed to deal with the issues of inadequate security and low encryption efficiency. Coloured images consist of three linked channels used in the scheme. This method uses different keys to break the correlations between adjacent pixels in each channel. The triple chaotic maps ar...
Article
Full-text available
In this paper, we introduce the Enhanced Whale Optimization Algorithm (EWA) to optimize dependent task offloading in a multi-edge cloud computing environment. Our proposed algorithm aims to identify the most suitable offloading scenario for dependent tasks, focusing on minimizing total processing latency, energy consumption , and associated costs....
Article
Full-text available
The COVID-19 virus is causing a global pandemic. The total number of new coronavirus cases worldwide by the end of November 2020 had already surpassed 60 million. The World Health Organization (WHO) has determined that wearing masks is a crucial precaution during the COVID-19 epidemic to limit the growth of viruses, and facemasks are frequently see...
Article
Full-text available
Knee Osteoarthritis (OA) is one of the most common joint diseases that may cause physical disability associated with a significant personal and socioeconomic burden. X-ray imaging is the cheapest and most common method to detect Knee (OA). Accurate classification of knee OA can help physicians manage treatment efficiently and slow knee OA progressi...
Article
There is often a lack of explanation when artificial intelligence (AI) is used to diagnose skin lesions, which makes the physician unable to interpret and validate the output; thus, diagnostic systems become significantly less safe. In this paper, we proposed a deep inherent learning method to classify seven types of skin lesions. The proposed deep...
Article
Full-text available
Greenhouse farming is considered one of the precision and sustainable forms of smart agriculture. Although greenhouse gases can support off-season crops inside the indoor environment, monitoring, controlling, and managing crop parameters at greenhouse farms more precisely and securely is necessary, even in harsh climate regions. The evolving Intern...
Article
Full-text available
Online platforms and social networking have increased in the contemporary years. They are now a major news source worldwide, leading to the online proliferation of Fake News (FNs). These FNs are alarming because they fundamentally reshape public opinion, which may cause customers to leave these online platforms, threatening the reputations of sever...
Article
Full-text available
On most e-commerce websites, there are two crucial factors that customers rely on to assess product quality and dependability: customer reviews provided online and related ratings. Reviews offer feedback to customers about the product’s merits, reasons for negative reviews, and feelings of satisfaction or dissatisfaction with the provided service....
Preprint
Full-text available
A Brain Tumor (BT), further known as an intracranial tumor, is a mass of abnormal tissue whose cells multiply and procreate uncontrolled and appear unaffected by those mechanisms that control normal cells, and it causes many people's deaths each year. BT is frequently detected using Magnetic Resonance Imaging (MRI) procedures. One of the greatest c...
Article
Full-text available
The Internet of Medical Things systems involve medical data transmissions between patients, medical experts, and medical centers over public networks. The sensitivity of the medical images' contents and the personal information in the medical images required high levels of security. Chaotic maps are successfully used in image encryption due to thei...
Article
Full-text available
In various image-processing applications, the fractional-order functions outperform their equivalent integer-order functions. In this study, we proposed a novel technique to encrypt color images with fractional-order chaotic systems, where the fractional-order simple Loranz is integrated with the FQM. Our novel part is hybridizing two maps (Lorenz...
Article
Full-text available
Feature selection (FS) is a crucial task in machine learning applications, which aims to select the most appropriate feature subset while maintaining high classification accuracy with the minimum number of selected features. Despite the widespread usage of metaheuristics as wrapper-based FS techniques, they show reduced effectiveness and increased...
Article
Full-text available
Orthogonal generalized Laguerre moments of fractional orders (FrGLMs) are signal and image descriptors. The utilization of the FrGLMs in the analysis of big-size signals encounters three challenges. First, calculating the high-order moments is a time-consuming process. Second, accumulating numerical errors leads to numerical instability and degrade...
Article
Full-text available
The development of Internet of Healthcare Things (IoHT) technology leads to high upgrades in monitor signal systems concerning healthcare. Battery life-saving is one of the biggest issues facing healthcare monitoring signal systems. The most important approach to achieve this goal is to decrease the signal size (i.e., data or signal compression); t...
Article
Full-text available
Skin Cancer (SC) is among the most hazardous due to its high mortality rate. Therefore, early detection of this disease would be very helpful in the treatment process. Multilevel Thresholding (MLT) is widely used for extracting regions of interest from medical images. Therefore, this paper utilizes the recent Coronavirus Disease Optimization Algori...
Article
Full-text available
Medical video watermarking is one of the beneficial and efficient tools to prohibit important patients' data from illicit enrollment and redistribution. In this paper, a new blind watermarking scheme has been proposed to improve the confidentiality, integrity, authenticity, and perceptual quality of a medical video with minimum distortion. The prop...
Article
Full-text available
Skin cancer is a senior public health issue that could profit from computer-aided diagnosis to decrease the encumbrance of this widespread disease. Researchers have been more motivated to develop computer-aided diagnosis systems because visual examination wastes time. The initial stage in skin lesion analysis is skin lesion segmentation, which migh...
Article
Full-text available
This paper proposes a new robust watermarking method for securing color medical images, where the proposed method relies on combining Slant, Singular Value Decomposition (SVD), and quaternion Fourier-Transform (QFT). The stimulus behind this combination is to improve the invisibility and durability of the proposed method. First, the input cover ima...
Article
Full-text available
The fast-paced advancement in multimedia production and exchanges over unsecured networks have led to a dire need to develop security applications. In this regard, chaos theory has much to offer, especially high-dimensional (HD) chaotic functions of fractional order. The authors propose a new symmetric, secure and robust image encryption method in...
Article
This research paper investigates mobile edge computing (MEC) networks, which involve numerous wireless devices transferring their computation tasks to various edge servers and a single cloud server. The study considers various real-time dependent computation tasks composing an application running on each connected device. This study aims to determi...
Article
Image moments are image descriptors widely utilized in several image processing, pattern recognition, computer vision, and multimedia security applications. In the era of big data, the computation of image moments yields a huge memory demand, especially for large moment order and/or high-resolution images (i.e., megapixel images). The state-of-the-...
Article
Full-text available
Background: In our current digital world, smartphones are no longer limited to communication but are used in various real-world applications. In the healthcare industry, smartphones have sensors that can record data about our daily activities. Such data can be used for many healthcare purposes, such as elderly healthcare services, early disease di...
Article
Full-text available
Pelvis fracture detection is vital for diagnosing patients and making treatment decisions for traumatic pelvis injuries. Computer-aided diagnostic approaches have recently become popular for assisting doctors in disease diagnosis, making their conclusions more trustworthy and error-free. Inspecting X-ray images with fractures needs a lot of time fr...
Article
Full-text available
Human Skin cancer is commonly detected visually through clinical screening followed by a dermoscopic examination. However, automated skin lesion classification remains challenging due to the visual similarities between benign and melanoma lesions. In this work, the authors proposed a new Artificial Intelligence-Based method to classify skin lesions...
Article
Full-text available
A novel multi-objective Coronavirus disease optimization algorithm (MOCOVIDOA) is presented to solve global optimization problems with up to three objective functions. This algorithm used an archive to store non-dominated POSs during the optimization process. Then, a roulette wheel selection mechanism selects the effective archived solutions by sim...
Article
Full-text available
Computational offloading allows lightweight battery-operated devices such as IoT gadgets and mobile equipment to send computation tasks to nearby edge servers to be completed, which is a challenging problem in the multi-access edge computing (MEC) environment. Numerous conflicting objectives exist in this problem; for example, the execution time, e...
Article
Full-text available
Cervical spine (CS) fractures or dislocations are medical emergencies that may lead to more serious consequences, such as significant functional disability, permanent paralysis, or even death. Therefore, diagnosing CS injuries should be conducted urgently without any delay. This paper proposes an accurate computer-aided-diagnosis system based on de...
Article
Full-text available
Background: Bio-signals are the essential data that smart healthcare systems require for diagnosing and treating common diseases. However, the amount of these signals that need to be processed and analyzed by healthcare systems is huge. Dealing with such a vast amount of data presents difficulties, such as the need for high storage and transmissio...
Article
Full-text available
COVID-19 is highly infectious and causes acute respiratory disease. Machine learning (ML) and deep learning (DL) models are vital in detecting disease from computerized chest tomography (CT) scans. The DL models outperformed the ML models. For COVID-19 detection from CT scan images, DL models are used as end-to-end models. Thus, the performance of...
Article
Document examination is a vital mission for revealing illegal modifications that assist in the detection and resolution of criminal acts. Addition and alteration are more frequently used in handwritten documents. However, most of the documents have been modified with similar inks, and it is tough to detect or observe them with human eyes. As a resu...
Article
Full-text available
The internet of things (IoT) is the communication of everything with anything else, with the primary goal of data transfer over a network. Raspberry Pi, a low-cost computer device with minimal energy consumption is employed in IoT applications designed to accomplish many of the same tasks as a normal desktop computer. Raspberry Pi is a quad-core co...
Chapter
The image moments are considered a key technique for image feature extraction. It is utilized in several applications such as watermarking and classification. One of the major shortcomings of the image moment descriptors is the computation time. The image moments algorithm is a compute-intensive task. This can be justified by the fact that computin...
Chapter
In modern technologies, digital image processing is an essential field with various applications. Over the past few years, the multidisciplinary field of real-time image processing has undergone an explosion. Scientists are looking for advanced processing tools such as embedded and special hardware systems such as Raspberry Pi for big data processi...
Article
Full-text available
Recently, digital images have been considered the primary key for many applications, such as forensics, medical diagnosis, and social networks. Image forgery detection is considered one of the most complex digital image applications. More profoundly, image splicing was investigated as one of the common types of image forgery. As a result, we propos...
Article
Full-text available
Plant diseases are one of the primary causes of decreased agricultural production quality and quantity. With ongoing changes in plant structure and cultivation techniques, new diseases are constantly arising on plant leaves. Thus, accurate classification and detection of plant leaf diseases in their early stages will limit the spread of the infecti...
Article
Full-text available
Considering the current dependency on digital technology in modern society, the protection of multimedia is highly important. Encryption is vital in modern digital communication, ensuring data confidentiality, authentication, integrity, and non-repudiation. Multimedia encryption-based security techniques are becoming increasingly important as they...
Article
despite the extensive use of IoT and mobile devices in the different applications, their computing power, memory, and battery life are still limited. Multi-Access Edge Computing (MEC) has recently emerged to address the drawbacks of these limitations. With MEC on the network's edge, mobile and IoT devices can offload their computing operations to a...
Article
Full-text available
Volumetric images have a three-dimensional (3D) view, in which viewers can examine their characteristics from any angle. The more accurate the digital representation of volumetric images, the more precise and valuable the assessment of what these images represent. The representation of volumetric images is a significant area of study in pattern rec...
Article
Full-text available
This paper proposes a new method for encryption of RGB color images by combining two encryption approaches: the spatial approach and the transformation approach. The proposed method uses the 3D fractional modified Henon map (3D FrMHM) and the discrete fractional Krawtchouk moments (FrDKM). We have also proposed a new hybrid optimization algorithm (...
Article
Full-text available
Multimedia information usage is increasing with new technologies such as the Internet of things (IoT), cloud computing, and big data processing. Video is one of the most widely used types of multimedia. Videos are played and transmitted over different networks in many IoT applications. Consequently, securing videos during transmission over various...
Article
Full-text available
The number of diabetic patients is increasing yearly worldwide, requiring the need for a quick intervention to help these people. Mortality rates are higher for diabetic patients with other serious health complications. Thus, early prediction for such diseases positively impacts healthcare quality and can prevent serious health complications later....
Article
Full-text available
Pathologists need a lot of clinical experience and time to do the histopathological investigation. AI may play a significant role in supporting pathologists and resulting in more accurate and efficient histopathological diagnoses. Breast cancer is one of the most diagnosed cancers in women worldwide. Breast cancer may be detected and diagnosed usin...