Khalid Hosny

Khalid Hosny
Verified
Khalid verified their affiliation via an institutional email.
Verified
Khalid verified their affiliation via an institutional email.
  • PhD
  • Professor (Full) at Zagazig University

I am working as a prof. of Information technology and looking for scientific collaborations in my areas of interests.

About

213
Publications
106,405
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
6,577
Citations
Introduction
Currently, my research interests are in image processing, computer vision, multimedia & multimedia security, IoT, and cloud computing.
Current institution
Zagazig University
Current position
  • Professor (Full)
Additional affiliations
January 2012 - July 2013
Najran University
Position
  • Head of Department
January 2012 - present
Zagazig University
January 2002 - present
Education
May 1997 - November 2000
University of Cincinnati
Field of study
  • Mathematical Modelling

Publications

Publications (213)
Article
Full-text available
This article proposes a novel multiple-image encryption algorithm (MIEA) that utilizes parallel processing. The proposed MIEA combines multiple plain images, forming a plain image cube. The proposed MIEA is based on the generation and logical XORing of novel pseudo-random encryption keys from the hyperchaotic 4D Chen system and the Mersenne Twister...
Article
Full-text available
Efficient image encryption techniques are crucial for protecting digital content in multimedia applications. With the increasing generation and usage of images daily, multiple image encryption (MIE) has emerged as a vital research area. This paper provides a comprehensive survey of MIE approaches, categorizing them based on strategies such as chaos...
Article
Full-text available
This paper proposes an enhanced data-hiding method using PVD that combines LSB and a hyperchaotic system to embed textual data inside a color medical image without causing any observable image distortions. We first select the host color image and then compress it by leveraging the rapid and an effective vector quantization (VQ) method to ensure rel...
Article
Full-text available
This study proposes an Enhanced Binary Kepler Optimization Algorithm (BKOA-MUT) improves feature selection (FS) by integrating Kepler’s planetary motion laws with DE/rand and DE/best Mutation Approach. BKOA-MUT balances exploration and exploitation, effectively guiding search for optimal feature subsets. BKOA-MUT was evaluated using k-Nearest Neigh...
Article
Full-text available
The transmission of medical images via medical agencies raises security concerns, necessitating increased security measures to ensure integrity and security. However, many watermarking algorithms overlook equipoise; the relation between robustness, invisibility, and payload capacity results in a less satisfactory performance. To bridge this gap, we...
Article
Full-text available
Secure image encryption is critical for protecting sensitive data such as satellite imagery, which is pivotal for national security and environmental monitoring. However, existing encryption methods often face challenges such as vulnerability to traffic analysis, limited randomness, and insufficient resistance to attacks. To address these gaps, thi...
Article
Full-text available
The accurate classification of potato leaf diseases plays a pivotal role in ensuring the health and productivity of crops. This study presents a unified approach for addressing this challenge by leveraging the power of Explainable AI (XAI) and transfer learning within a deep Learning framework. In this research, we propose a transfer learning-based...
Article
Full-text available
Recently, scientists have widely utilized Artificial Intelligence (AI) approaches in intelligent agriculture to increase the productivity of the agriculture sector and overcome a wide range of problems. Detection and classification of plant diseases is a challenging problem due to the vast numbers of plants worldwide and the numerous diseases that...
Article
Full-text available
This paper offers a new robust-blind watermarking scheme for medical image protection. In the digital era, protecting medical images is essential to maintain the confidentiality of patients and data reliability. Robust blind watermarking has surfaced as a practical option for secure image authentication and copyright protection. A new plan uses the...
Article
Full-text available
Developing robust and secure image encryption methods for transmitting multiple images in batches over unprotected networks has become imperative. This necessity arises from the limitations of single-image encryption techniques in managing the escalating volume of extensive data. This paper introduces a novel three-layer multiple-image encryption (...
Article
Full-text available
Brain tumors are very dangerous as they cause death. A lot of people die every year because of brain tumors. Therefore, accurate classification and detection in the early stages can help in recovery. Various deep learning techniques have achieved good results in brain tumor classification. The traditional deep learning methods and training the neur...
Article
Full-text available
This study proposes a new deep-learning approach incorporating a superfluity mechanism to categorize knee X-ray images into osteoporosis, osteopenia, and normal classes. The superfluity mechanism suggests the use of two distinct types of blocks. The rationale is that, unlike a conventional serially stacked layer, the superfluity concept involves co...
Article
Medical images are essential for diagnosing and determining certain diseases. Securing transmitted medical images is essential where insecure networks negatively influence important patient data. Several medical image-securing methods have succeeded, but their robustness against complex attacks has been neglected, which motivated researchers to str...
Article
Full-text available
Unmanned systems play a pivotal role in military surveillance, critical infrastructure protection, law enforcement, search and rescue operations, and border security, showcasing their multifaceted importance across diverse applications. Video fraud detection is integral to multimedia security, where our task involves the precise identification of m...
Article
Full-text available
This research work presents a novel secured spatial steganography algorithm consisting of three stages. In the first stage, a secret message is divided into three parts, each is encrypted using a tan logistic map encryption key with a unique seed value. In the second stage, the encrypted parts are transformed into quick response codes, serving as a...
Article
Full-text available
Digital video watermarking research has yielded numerous promising breakthroughs in recent years. As more people grow interested in videos, the copyright protection of videos has become an urgent issue that must be addressed. Digital video watermarking is a significant method for copyright protection of videos because of the growing need to safegua...
Article
Full-text available
With the rapid growth of the Internet of Things (IoT), the Internet of Medical Things (IoMT) has emerged as a critical sector that enhances convenience and plays a vital role in saving lives. IoMT devices facilitate remote access and control of various medical tools, significantly improving accessibility in the healthcare field. However, the connec...
Article
Full-text available
People transmit millions of digital images daily over various networks, where securing these images is a big challenge. Image encryption is a successful approach widely used in securing digital images while transmitting. Researchers developed different encryption techniques that focus on securing individual images. Recently, encryption of multiple...
Article
Full-text available
Vehicle communication is one of the most vital aspects of modern transportation systems because it enables real-time data transmission between vehicles and infrastructure to improve traffic flow and road safety. The next generation of mobile technology, 5G, was created to address earlier generations' growing need for high data rates and quality of...
Article
Full-text available
A new image encryption algorithm based on the triple chaotic maps is proposed to deal with the issues of inadequate security and low encryption efficiency. Coloured images consist of three linked channels used in the scheme. This method uses different keys to break the correlations between adjacent pixels in each channel. The triple chaotic maps ar...
Article
Full-text available
In this paper, we introduce the Enhanced Whale Optimization Algorithm (EWA) to optimize dependent task offloading in a multi-edge cloud computing environment. Our proposed algorithm aims to identify the most suitable offloading scenario for dependent tasks, focusing on minimizing total processing latency, energy consumption , and associated costs....
Article
Full-text available
The COVID-19 virus is causing a global pandemic. The total number of new coronavirus cases worldwide by the end of November 2020 had already surpassed 60 million. The World Health Organization (WHO) has determined that wearing masks is a crucial precaution during the COVID-19 epidemic to limit the growth of viruses, and facemasks are frequently see...
Article
Full-text available
Knee Osteoarthritis (OA) is one of the most common joint diseases that may cause physical disability associated with a significant personal and socioeconomic burden. X-ray imaging is the cheapest and most common method to detect Knee (OA). Accurate classification of knee OA can help physicians manage treatment efficiently and slow knee OA progressi...
Article
There is often a lack of explanation when artificial intelligence (AI) is used to diagnose skin lesions, which makes the physician unable to interpret and validate the output; thus, diagnostic systems become significantly less safe. In this paper, we proposed a deep inherent learning method to classify seven types of skin lesions. The proposed deep...
Article
Full-text available
Greenhouse farming is considered one of the precision and sustainable forms of smart agriculture. Although greenhouse gases can support off-season crops inside the indoor environment, monitoring, controlling, and managing crop parameters at greenhouse farms more precisely and securely is necessary, even in harsh climate regions. The evolving Intern...
Article
Full-text available
Online platforms and social networking have increased in the contemporary years. They are now a major news source worldwide, leading to the online proliferation of Fake News (FNs). These FNs are alarming because they fundamentally reshape public opinion, which may cause customers to leave these online platforms, threatening the reputations of sever...
Article
Full-text available
On most e-commerce websites, there are two crucial factors that customers rely on to assess product quality and dependability: customer reviews provided online and related ratings. Reviews offer feedback to customers about the product’s merits, reasons for negative reviews, and feelings of satisfaction or dissatisfaction with the provided service....
Preprint
Full-text available
A Brain Tumor (BT), further known as an intracranial tumor, is a mass of abnormal tissue whose cells multiply and procreate uncontrolled and appear unaffected by those mechanisms that control normal cells, and it causes many people's deaths each year. BT is frequently detected using Magnetic Resonance Imaging (MRI) procedures. One of the greatest c...
Article
Full-text available
The Internet of Medical Things systems involve medical data transmissions between patients, medical experts, and medical centers over public networks. The sensitivity of the medical images' contents and the personal information in the medical images required high levels of security. Chaotic maps are successfully used in image encryption due to thei...
Article
Full-text available
In various image-processing applications, the fractional-order functions outperform their equivalent integer-order functions. In this study, we proposed a novel technique to encrypt color images with fractional-order chaotic systems, where the fractional-order simple Loranz is integrated with the FQM. Our novel part is hybridizing two maps (Lorenz...
Article
Full-text available
Feature selection (FS) is a crucial task in machine learning applications, which aims to select the most appropriate feature subset while maintaining high classification accuracy with the minimum number of selected features. Despite the widespread usage of metaheuristics as wrapper-based FS techniques, they show reduced effectiveness and increased...
Article
Full-text available
Orthogonal generalized Laguerre moments of fractional orders (FrGLMs) are signal and image descriptors. The utilization of the FrGLMs in the analysis of big-size signals encounters three challenges. First, calculating the high-order moments is a time-consuming process. Second, accumulating numerical errors leads to numerical instability and degrade...
Article
Full-text available
The development of Internet of Healthcare Things (IoHT) technology leads to high upgrades in monitor signal systems concerning healthcare. Battery life-saving is one of the biggest issues facing healthcare monitoring signal systems. The most important approach to achieve this goal is to decrease the signal size (i.e., data or signal compression); t...
Article
Full-text available
Skin Cancer (SC) is among the most hazardous due to its high mortality rate. Therefore, early detection of this disease would be very helpful in the treatment process. Multilevel Thresholding (MLT) is widely used for extracting regions of interest from medical images. Therefore, this paper utilizes the recent Coronavirus Disease Optimization Algori...
Article
Full-text available
Medical video watermarking is one of the beneficial and efficient tools to prohibit important patients' data from illicit enrollment and redistribution. In this paper, a new blind watermarking scheme has been proposed to improve the confidentiality, integrity, authenticity, and perceptual quality of a medical video with minimum distortion. The prop...
Article
Full-text available
Skin cancer is a senior public health issue that could profit from computer-aided diagnosis to decrease the encumbrance of this widespread disease. Researchers have been more motivated to develop computer-aided diagnosis systems because visual examination wastes time. The initial stage in skin lesion analysis is skin lesion segmentation, which migh...
Article
Full-text available
This paper proposes a new robust watermarking method for securing color medical images, where the proposed method relies on combining Slant, Singular Value Decomposition (SVD), and quaternion Fourier-Transform (QFT). The stimulus behind this combination is to improve the invisibility and durability of the proposed method. First, the input cover ima...
Article
Full-text available
The fast-paced advancement in multimedia production and exchanges over unsecured networks have led to a dire need to develop security applications. In this regard, chaos theory has much to offer, especially high-dimensional (HD) chaotic functions of fractional order. The authors propose a new symmetric, secure and robust image encryption method in...
Article
This research paper investigates mobile edge computing (MEC) networks, which involve numerous wireless devices transferring their computation tasks to various edge servers and a single cloud server. The study considers various real-time dependent computation tasks composing an application running on each connected device. This study aims to determi...
Article
Image moments are image descriptors widely utilized in several image processing, pattern recognition, computer vision, and multimedia security applications. In the era of big data, the computation of image moments yields a huge memory demand, especially for large moment order and/or high-resolution images (i.e., megapixel images). The state-of-the-...
Article
Full-text available
Background: In our current digital world, smartphones are no longer limited to communication but are used in various real-world applications. In the healthcare industry, smartphones have sensors that can record data about our daily activities. Such data can be used for many healthcare purposes, such as elderly healthcare services, early disease dia...
Article
Full-text available
Pelvis fracture detection is vital for diagnosing patients and making treatment decisions for traumatic pelvis injuries. Computer-aided diagnostic approaches have recently become popular for assisting doctors in disease diagnosis, making their conclusions more trustworthy and error-free. Inspecting X-ray images with fractures needs a lot of time fr...
Article
Full-text available
Human Skin cancer is commonly detected visually through clinical screening followed by a dermoscopic examination. However, automated skin lesion classification remains challenging due to the visual similarities between benign and melanoma lesions. In this work, the authors proposed a new Artificial Intelligence-Based method to classify skin lesions...
Article
Full-text available
A novel multi-objective Coronavirus disease optimization algorithm (MOCOVIDOA) is presented to solve global optimization problems with up to three objective functions. This algorithm used an archive to store non-dominated POSs during the optimization process. Then, a roulette wheel selection mechanism selects the effective archived solutions by sim...
Article
Full-text available
Computational offloading allows lightweight battery-operated devices such as IoT gadgets and mobile equipment to send computation tasks to nearby edge servers to be completed, which is a challenging problem in the multi-access edge computing (MEC) environment. Numerous conflicting objectives exist in this problem; for example, the execution time, e...
Article
Full-text available
Cervical spine (CS) fractures or dislocations are medical emergencies that may lead to more serious consequences, such as significant functional disability, permanent paralysis, or even death. Therefore, diagnosing CS injuries should be conducted urgently without any delay. This paper proposes an accurate computer-aided-diagnosis system based on de...
Article
Full-text available
Background: Bio-signals are the essential data that smart healthcare systems require for diagnosing and treating common diseases. However, the amount of these signals that need to be processed and analyzed by healthcare systems is huge. Dealing with such a vast amount of data presents difficulties, such as the need for high storage and transmission...
Article
Full-text available
COVID-19 is highly infectious and causes acute respiratory disease. Machine learning (ML) and deep learning (DL) models are vital in detecting disease from computerized chest tomography (CT) scans. The DL models outperformed the ML models. For COVID-19 detection from CT scan images, DL models are used as end-to-end models. Thus, the performance of...
Article
Document examination is a vital mission for revealing illegal modifications that assist in the detection and resolution of criminal acts. Addition and alteration are more frequently used in handwritten documents. However, most of the documents have been modified with similar inks, and it is tough to detect or observe them with human eyes. As a resu...
Article
Full-text available
The internet of things (IoT) is the communication of everything with anything else, with the primary goal of data transfer over a network. Raspberry Pi, a low-cost computer device with minimal energy consumption is employed in IoT applications designed to accomplish many of the same tasks as a normal desktop computer. Raspberry Pi is a quad-core co...
Chapter
The image moments are considered a key technique for image feature extraction. It is utilized in several applications such as watermarking and classification. One of the major shortcomings of the image moment descriptors is the computation time. The image moments algorithm is a compute-intensive task. This can be justified by the fact that computin...
Chapter
In modern technologies, digital image processing is an essential field with various applications. Over the past few years, the multidisciplinary field of real-time image processing has undergone an explosion. Scientists are looking for advanced processing tools such as embedded and special hardware systems such as Raspberry Pi for big data processi...
Article
Full-text available
Recently, digital images have been considered the primary key for many applications, such as forensics, medical diagnosis, and social networks. Image forgery detection is considered one of the most complex digital image applications. More profoundly, image splicing was investigated as one of the common types of image forgery. As a result, we propos...
Article
Full-text available
Plant diseases are one of the primary causes of decreased agricultural production quality and quantity. With ongoing changes in plant structure and cultivation techniques, new diseases are constantly arising on plant leaves. Thus, accurate classification and detection of plant leaf diseases in their early stages will limit the spread of the infecti...
Article
Full-text available
Considering the current dependency on digital technology in modern society, the protection of multimedia is highly important. Encryption is vital in modern digital communication, ensuring data confidentiality, authentication, integrity, and non-repudiation. Multimedia encryption-based security techniques are becoming increasingly important as they...
Article
despite the extensive use of IoT and mobile devices in the different applications, their computing power, memory, and battery life are still limited. Multi-Access Edge Computing (MEC) has recently emerged to address the drawbacks of these limitations. With MEC on the network's edge, mobile and IoT devices can offload their computing operations to a...
Article
Full-text available
Volumetric images have a three-dimensional (3D) view, in which viewers can examine their characteristics from any angle. The more accurate the digital representation of volumetric images, the more precise and valuable the assessment of what these images represent. The representation of volumetric images is a significant area of study in pattern rec...
Article
Full-text available
This paper proposes a new method for encryption of RGB color images by combining two encryption approaches: the spatial approach and the transformation approach. The proposed method uses the 3D fractional modified Henon map (3D FrMHM) and the discrete fractional Krawtchouk moments (FrDKM). We have also proposed a new hybrid optimization algorithm (...
Article
Full-text available
Multimedia information usage is increasing with new technologies such as the Internet of things (IoT), cloud computing, and big data processing. Video is one of the most widely used types of multimedia. Videos are played and transmitted over different networks in many IoT applications. Consequently, securing videos during transmission over various...
Article
Full-text available
The number of diabetic patients is increasing yearly worldwide, requiring the need for a quick intervention to help these people. Mortality rates are higher for diabetic patients with other serious health complications. Thus, early prediction for such diseases positively impacts healthcare quality and can prevent serious health complications later....
Article
Full-text available
Pathologists need a lot of clinical experience and time to do the histopathological investigation. AI may play a significant role in supporting pathologists and resulting in more accurate and efficient histopathological diagnoses. Breast cancer is one of the most diagnosed cancers in women worldwide. Breast cancer may be detected and diagnosed usin...
Article
Full-text available
Image segmentation is a critical step in digital image processing applications. One of the most preferred methods for image segmentation is multilevel thresholding, in which a set of threshold values is determined to divide an image into different classes. However, the computational complexity increases when the required thresholds are high. Theref...
Article
Full-text available
Image segmentation is a critical step in digital image processing applications. One of the most preferred methods for image segmentation is multilevel thresholding, in which a set of threshold values is determined to divide an image into different classes. However, the computational complexity increases when the required thresholds are high. Theref...
Article
Full-text available
Digital images are transferred with ease through the network. Many users are using the images without the knowledge of the owners. Therefore, a novel watermarking scheme is proposed to ensure copyright protection and authentication of images using cryptography techniques. Here, a quick response (QR) image is generated for a watermark image that con...
Article
Full-text available
This paper presents a novel bio-inspired optimization algorithm called Coronavirus Optimization Algorithm (COVIDOA). COVIDOA is an evolutionary search strategy that mimics the mechanism of coronavirus when hijacking human cells. COVIDOA is inspired by the frameshifting technique used by the coronavirus for replication. The proposed algorithm is tes...
Article
Medical image segmentation is a crucial step in Computer-Aided Diagnosis systems, where accurate segmentation is vital for perfect disease diagnoses. This paper proposes a multilevel thresholding technique for 2D and 3D medical image segmentation using Otsu and Kapur's entropy methods as fitness functions to determine the optimum threshold values....
Article
Full-text available
Copyright protection of medical images is a vital goal in the era of smart healthcare systems. In recent telemedicine applications, medical images are sensed using medical imaging devices and transmitted to remote places for screening by physicians and specialists. During their transmission, the medical images could be tampered with by intruders. T...
Article
Full-text available
Robust watermarking is an effective method and a promising solution for securing and protecting the copyright of digital images. Moments and moment invariants have become popular tools for robust watermarking due to their geometric invariance and favorable capability of image description. Many moments-based robust watermarking schemes have been pro...
Article
Full-text available
Recently, there has been a rapid growth in the utilization of medical images in telemed-icine applications. The authors in this paper presented a detailed discussion of different types of medical images and the attacks that may affect medical image transmission. This survey paper summarizes existing medical data security approaches and the differen...
Article
Full-text available
Because of the current COVID-19 circumstances in the world and the tremendous technological developments, it has become necessary to use this technology to combat the spread of the new coronavirus. The systems that depend on using hands, such as fingerprint systems and PINs in ATM systems, could lead to infection, so they have become undesirable an...
Article
Full-text available
Internet of Things (IoT) enables different smart environment objects to communicate without involving humans. Recently, IoT has started a new challenge within the healthcare sector called the Internet of Medical Things (IoMT). The huge amounts of data generated by IoMT entities need to be analyzed in real-time to improve the performance and quality...
Article
Full-text available
Image authentication approaches have gotten a lot of interest recently as a way to safeguard transmitted images. Watermarking is one of the many ways used to protect transmitted images. Watermarking systems are pc-based that have limited portability that is difficult to use in harsh environments as military use. We employ embedded devices like Rasp...
Article
The increased use of smart devices such as mobile devices, Internet of Things devices, cameras, and microphones, has produced big data. Large data dimensionality, redundancy, and irrelevance are challenging problems. Feature selection is a necessary process to select the optimal subset of features. In this paper, the authors propose a novel Binary...
Conference Paper
Abstract: The World Wide Web Consortium (W3C) RDB2RDF Work Group (RDB2RDF-WG) recommended two mapping languages, Direct Mapping (DM) and Relational Database to RDF Mapping Language (R2RML) for Mapping Relational Databases (RDBs) to Resource Description Framework (RDF). Direct Mapping directly maps the RDB schema to RDF using a collection of simple...
Article
Full-text available
A communications system consists of interconnected telecommunications networks, transmission systems, relay stations, tributary stations, and terminal equipment. Increasing network limits to fulfill the developing needs of consumers has prompted the advancement of cell correspondence networks from 1G to 5G. Many heterogeneous connections request hi...
Article
Orthogonal moments (OMs) are used to extract features from color images. OMs with fractional orders are better than the OMs with integer orders due to their ability to extract fine features. This paper defined novel quaternion orthogonal shifted Gegenbauer moments (FrQSGMs) of fractional orders for color image analysis and recognition. Since both s...
Article
Skin cancer is the most common type of cancer that affects humans and is usually diagnosed by initial clinical screening, which is followed by dermoscopic analysis. Automated classification of skin lesions is still a challenging task because of the high visual similarity between melanoma and benign lesions. This paper proposes a new residual deep c...
Article
Full-text available
A novel cryptosystem of color images is proposed. We defined a multi-channel orthogonal Gegenbauer moments with fractional order (FrMGMs) in Cartesian coordinates and then combined the FrMGMs with the 2D logistic-sine map. The proposed color image encryption method has three main steps in this process. The first step is confusion, where image pixel...
Article
Full-text available
The fractional-order functions show better performance than their corresponding integer-order functions in various image processing applications. In this paper, the authors propose a novel utilization of fractional-order chaotic systems in color image encryption. The 4D hyperchaotic Chen system of fractional-order combined with the Fibonacci Q-matr...
Article
Full-text available
Images are very important forms of data that are widely used nowadays. Every day, millions of grey and color images are transferred via the web. Protecting these images from unauthorized persons is an important issue. Image encryption is one of the image-securing techniques. One advantage of using encryption is that the plain image is converted to...
Article
Full-text available
Patients’ readmission can be considered as a critical factor affecting cost reduction while maintaining a high-quality treatment of patients. Therefore, predicting and controlling patients’ readmission rates would significantly improve the healthcare service. In this study, we aim at predicting the readmission of COPD (Chronic Obstructive Pulmonary...
Article
Full-text available
Internet of Medical Things (IoMT) plays a vital role in healthcare systems to increase electronic devices accuracy, reliability, and productivity. This paper presents fast multiple zero-watermarking methods based on Multi-channel Fractional Legendre Fourier moments (MFrLFMs) for medical image security and copyright protection in IoMT applications w...
Article
Full-text available
Recently, digital images have become used in many applications, where they have become the focus of digital image processing researchers. Image forgery represents one hot topic on which researchers prioritize their studies. We concentrate on the copy-move image forgery topic as a deceptive forgery type. In copy-move image forgery, a part of an imag...
Article
Full-text available
Surely surveillance cameras are certainly important in all aspects of life. We have become in an era where we need to use surveillance cameras everywhere, homes, schools, banks, hospitals, and companies, even in the general streets, to monitor everything that happens and follow the progress of those places with all safety by surveillance videos. Ho...
Article
Full-text available
Watermarking of digital images is a well-known technique that is widely used for securing image contents. A successful watermarking method must be accurate, reversible, resilient, and robust against various attacks. In this paper, we propose a reversible and robust color image watermarking method. A new set of multi-channel fractional-order polar h...
Article
Full-text available
This paper proposes a new blind, color image watermarking method using fast Walsh–Hadamard transformation (FWHT) and multi-channel fractional Legendre–Fourier moments (MFrLFMs). The input host color image is first split into 4 × 4 non-interfering blocks, and the MFrLFMs are computed for each block, where proper MFrLFMs coefficients are selected and...
Article
Full-text available
Representation and classification of color texture generate considerable interest within the field of computer vision. Texture classification is a difficult task that assigns unlabeled images or textures to the correct labeled class. Some key factors such as scaling and viewpoint variations and illumination changes make this task challenging. In th...
Article
In some situations, finding the rare association rule is of higher importance than the frequent itemset. Unique rules represent rare cases, activities, or events in real-world applications. It is essential to extract exceptional critical activity from vast routine data. This paper proposes a new algorithm called FR-Tree to mine the association rule...
Article
The single watermarking algorithm for medical images faced several inherent problems like lack of security. In this paper, a new geometrically invariant multiple zero-watermarking method is proposed to secure medical images. We proposed a novel set of multi-channels shifted Gegenbauer moments of fractional orders (FrMGMs). These moments are used to...

Questions

Question (1)
Question
I would like to invite you and your colleagues to contribute in my new book titled:
"Multimedia Security using Chaotic Maps: Principles & Methodologies"
All details about this book could be found in the following link:
Please submit your chapter using the following Easychair submission link:
Best regards
Khalid M. Hosny, PhD

Network

Cited By