Mazen Selim

Mazen Selim
Delta University for Science and Technology

PhD in Computer Engineering

About

39
Publications
14,887
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
300
Citations
Additional affiliations
January 2015 - December 2015
Benha University
Position
  • V. Dean for Learning and students Affairs

Publications

Publications (39)
Conference Paper
Full-text available
This paper proposes a new blind, robust image watermarking for copyright protection and ownership verification in the DCT domain. The owner information is in the form of a logo image. Two different watermarking systems are considered. The first one is based on the principle of spread spectrum communication, in which we propose an adaptive direct se...
Article
Full-text available
With the rapid growth and adoption of cloud computing, more sensitive information is centralized onto the cloud every day. For protecting this sensitive information, it must be encrypted before being outsourced. Current search schemes allow the user to query encrypted data using keywords, but these schemes do not guarantee the privacy of queries (i...
Article
This paper presents a modified Neutron Computerized Tomography (NCT) reconstruction method to obtain an effective and accurate 3D volume rendering with more cleared details that achieve the optimization for contrast, raise the resolution, real view and reduce noise. This proposed method depends on dealing with the slice duplication in case of full...
Article
Full-text available
This paper presents a modified Neutron Computerized Tomography reconstruction method for solving three main problems facing the Inverse Radon Transform based reconstruction method. The three problems are poor contrast of the reconstructed slice, the duplication of slice and the error in the center of rotation position in the images. The paper aims...
Article
Recently, users and news followers across websites face many fabricated images. Moreover, it goes far beyond that to the point of defaming or imprisoning a person. Hence, image authentication has become a significant issue. One of the most common tampering techniques is copy-move. Keypoint-based methods are considered as an effective method for det...
Article
In the present study, a multimodal biometric authentication method is presented to confirm the identity of a person based on his face and iris features. This method depends on multiple biometric techniques that combine face and iris (left and right) features to recognize. The authors have designed and applied a system to identify people. It depends...
Article
Full-text available
Sign language (SL) is the hands spoken language assisting the deaf to understand each other. Understanding SL by vocal people not only paves the way to contribute deaf and dumb in the workforce, but also provides a fertile environment for analyzing the human motion and gesturing. Consequently, translating SL sentence into written or spoken language...
Article
This paper presents a proposed procedure for neutron radiography image enhancement through studying the effect of the projection exposure time on the quality of Neutron Computerized Tomography (NCT) image. A sample was exposure at the Egyptian Second Research Reactor (ETRR-2) NCT facility with projection exposure time varying from one second to six...
Article
Full-text available
Copy-move image forgery detection has become a significant research subject in multimedia forensics and security due to its widespread use and its hard detection. In this type of image forging, a region of the image is copied and pasted elsewhere in the same image. Keypoint-based forgery detection approaches use local visual features to identify th...
Article
Full-text available
Recently, in healthcare sector, the data is steadily growing and becomes more vital. Most of this data is embedded in the medical record of the patient. In fact, Patient Health Records (PHRs) refer to those records that the patient can maintain, access and share among different specialists. Storing these PHRs to the cloud allow the patient to maint...
Article
Nowadays, breast cancer considered a main cause of death for women all over the world. It is defined as a group of cells that grow rapidly and causes the formation of a lump in breast tissue which leads to tumor formation which can be categorized either malignant (cancerous) or benign (non-cancerous). On the other side, mammography as a screening a...
Article
Feature selection in molecular classification is a basic area of research in chemoinformatics field. This paper introduces a hybrid approach that investigates the performances of chicken swarm optimisation (CSO) algorithm with genetic algorithms (GA) for feature selection and support vector machine (SVM) for classification. The purpose of this pape...
Article
Full-text available
Nodes localization in a wireless sensor network (WSN) aims for calculating the coordinates of unknown nodes with the assist of known nodes. The performance of a WSN can be greatly affected by the localization accuracy. In this paper, a node localization scheme is proposed based on a recent bioinspired algorithm called Salp Swarm Algorithm (SSA). Th...
Article
Full-text available
Migrating Patient Health Record (PHR) to the cloud plays an essential role in the healthcare field. The patient has become able to maintain, access and share his health record among different specialists anywhere and anytime. However, he still suffers from security issues related to storing PHR in the cloud. Giving security to an immense volume of...
Article
Full-text available
Recently, the need for digital communication has increased greatly. As a result, the Internet has become the most economical and speedy medium of communication today. Nevertheless, such accessible communication channels have a great chance of being exposed to security threats causing illegal information access. Steganography provides a type of data...
Research
Feature selection in molecular classification is a basic area of research in chemoinformatics field. This paper introduces a hybrid approach that investigates the performances of chicken swarm optimization (CSO) algorithm with genetic algorithms (GA) for feature selection and support vector machine (SVM) for classification. The purpose of this pape...
Article
Full-text available
Despite the quickly expanding utilization of Master cards and other electronic types of payment, money is still broadly utilized for ordinary exchanges because of its convenience. However, the visually impaired people may suffer from knowing each currency paper apart. Currency Recognition Systems (CRS) can be used to help blind and visually impaire...
Article
Full-text available
Sign language recognition system (SLRS) is one of the application areas of human computer interaction (HCI) where signs of hearing impaired people are converted to text or voice of the oral language. This paper presents an automatic visual SLRS that translates isolated Arabic words signs into text. The proposed system has four main stages: hand seg...
Article
Full-text available
We present a new approach for face recognition system. The method is based on 2D face image features using subset of non-correlated and Orthogonal Gabor Filters instead of using the whole Gabor Filter Bank, then compressing the output feature vector using Linear Discriminant Analysis (LDA). The face image has been enhanced using multi stage image p...
Article
In this paper, we present a new approach to enhance and improve the performance of automatic 3D face recognition system. The proposed method has been implemented through a preprocessing technique to align and normalise all images in the database based on eyes centres localisation using 2D normalised cross-correlation (2DNCC). Preprocessing 3D face...
Article
Full-text available
This paper proposes a new region-based image retrieval technique called Principal Regions Image Retrieval (PRIR). This technique starts by segmenting an image to the most general principal regions and applies a fuzzy feature histogram to describe the color and texture properties of each segmented region. The proposed approach starts by generating a...
Conference Paper
Full-text available
In the last ten years, skin detection has been a milestone in most of the computer vision applications. But till now, there is no robust skin detector. The different degrees of the skin tone color are the obstacle that faces skin detection process. This paper proposes an adaptive skin modeling and detection technique which is based on face skin ton...
Article
This paper proposes an algorithm to reconstruct a High Resolution (HR) image from a set of blurred, warped, undersampled, and noisy measured images. The proposed algorithm uses the affine block-based algorithm in the maximum likelihood (ML) estimator. It is tested using synthetic images, where the reconstructed image can be compared with its origin...
Article
Content-Based Image Retrieval (CBIR) considers the characteristics of the image itself, for example its shapes, colors and textures. The Current approaches to CBIR differ in terms of which image features are extracted. Recent work deals with combination of distances or scores from different and independent representations. This work attempts to ind...
Article
Examining the representations and reality of poverty in Uzbekistan, in the case of the declining status of academic intellectuals and then in relation to the World Bank's inadequate category of « poverty », reveals a country that has fallen into « underdevelopment » and that blocks any democratic change. In this context, the role of NGOs has been t...
Article
Melanocytomas of the eye are typically benign tumors that may be associated with nevi and melanomas. In this study, we assessed the genetic data of melanocytomas and compared them with nevi and melanomas of both the eyes and the skin. We microdissected 8 melanocytomas, 13 uveal melanomas, and 10 cutaneous melanomas and analyzed loss of heterozygosi...
Conference Paper
A method for computing the Fourier coefficients of a complex valued periodic function resulting from tracing the contour of a closed shape using the arithmetic Fourier transform (AFT) is presented. It requires only simple addition operations, thus saving computational time and load. The algorithm is suitable for parallel computation and has a good...

Network

Cited By