Khalid M. Hosny
YOU?
Author Swipe
View article: A new hybrid model for improving outlier detection using combined autoencoder and variational autoencoder
A new hybrid model for improving outlier detection using combined autoencoder and variational autoencoder Open
In this paper, we propose a new hybrid model, called AVE, that integrates the strengths of Autoencoder (AE) and Variational Autoencoder (VAE) to enhance outlier detection for numerous high-dimensional datasets. The proposed architecture le…
View article: A new algorithm for multiple medical image encryption based on stacked representation and block division
A new algorithm for multiple medical image encryption based on stacked representation and block division Open
In the era of big data, medical imaging systems create millions of medical images daily. Securing these images during their transmission and storage is a challenging task. Encryption is a practical approach for securing medical images, as …
View article: A new medical image encryption using modular integrated logistic exponential map and multi-level Q-Sequence matrix
A new medical image encryption using modular integrated logistic exponential map and multi-level Q-Sequence matrix Open
Protecting the confidentiality of medical images during storage and transmission is vital in modern healthcare systems. This paper presents an innovative and efficient encryption algorithm tailored for both grayscale and color medical imag…
View article: Robust zero-watermarking for color images using hybrid deep learning models and encryption
Robust zero-watermarking for color images using hybrid deep learning models and encryption Open
Reliable zero-watermarking is a distortion-free approach to copyright protection, which has been a primary focus of digital watermarking research. Traditional zero-watermarking techniques often struggle to maintain resilience against geome…
View article: RDHNet: Reversible Data Hiding Method for Securing Colour Images Using AlexNet and Watershed Transform in a Fusion Domain
RDHNet: Reversible Data Hiding Method for Securing Colour Images Using AlexNet and Watershed Transform in a Fusion Domain Open
Medical images play a crucial role in diagnosis, treatment procedures and overall healthcare. Nevertheless, they also pose substantial risks to patient confidentiality and safety. Safeguarding the confidentiality of patients' data has beco…
View article: Interframe Forgery Video Detection: Datasets, Methods, Challenges, and Search Directions
Interframe Forgery Video Detection: Datasets, Methods, Challenges, and Search Directions Open
The authenticity of digital video content has become a critical issue in multimedia security due to the significant rise in video editing and manipulation in recent years. The detection of interframe forgeries is essential for identifying …
View article: Improved model for intrusion detection in the Internet of Things
Improved model for intrusion detection in the Internet of Things Open
The Internet of Things (IoT) includes many devices generating vast amounts of data that need extensive computation. IoT has several definitions, but the most popular refers to multiple devices, objects, and sensors all connecting via a net…
View article: Zero-watermarking of light field images using fractional-order radial harmonic fourier moments and chaotic logistic-may map
Zero-watermarking of light field images using fractional-order radial harmonic fourier moments and chaotic logistic-may map Open
Unlike traditional images, light field images capture comprehensive scene information, enabling novel post-capture manipulations. However, this very richness makes them vulnerable to tampering. This paper proposes lossless copyright protec…
View article: Explainable AI and vision transformers for detection and classification of brain tumor: a comprehensive survey
Explainable AI and vision transformers for detection and classification of brain tumor: a comprehensive survey Open
Brain tumor detection and classification are critical for timely diagnosis and effective treatment. The surge in demand for automated and accurate methods is driven by the advancements in deep learning and the need for faster, more reliabl…
View article: LfePy: a Python package for local feature extraction with CPU and GPU compatibility
LfePy: a Python package for local feature extraction with CPU and GPU compatibility Open
Local features identify and describe distinct patterns or features in images at a localized level. However, extracting features from images is crucial for image analysis, as it enables models to acquire knowledge and identify patterns. The…
View article: A new fast multiple color image encryption algorithm
A new fast multiple color image encryption algorithm Open
This article proposes a novel multiple-image encryption algorithm (MIEA) that utilizes parallel processing. The proposed MIEA combines multiple plain images, forming a plain image cube. The proposed MIEA is based on the generation and logi…
View article: Multiple image encryption techniques: Strategies, challenges, and potential future directions
Multiple image encryption techniques: Strategies, challenges, and potential future directions Open
Efficient image encryption techniques are crucial for protecting digital content in multimedia applications. With the increasing generation and usage of images daily, multiple image encryption (MIE) has emerged as a vital research area. Th…
View article: Enhanced Binary Kepler Optimization Algorithm for effective feature selection of supervised learning classification
Enhanced Binary Kepler Optimization Algorithm for effective feature selection of supervised learning classification Open
This study proposes an Enhanced Binary Kepler Optimization Algorithm (BKOA-MUT) improves feature selection (FS) by integrating Kepler’s planetary motion laws with DE/rand and DE/best Mutation Approach. BKOA-MUT balances exploration and exp…
View article: A new CNN-based watermarking method for color medical images in a fusion domain
A new CNN-based watermarking method for color medical images in a fusion domain Open
The transmission of medical images via medical agencies raises security concerns, necessitating increased security measures to ensure integrity and security. However, many watermarking algorithms overlook equipoise; the relation between ro…
View article: Deep learning and explainable AI for classification of potato leaf diseases
Deep learning and explainable AI for classification of potato leaf diseases Open
The accurate classification of potato leaf diseases plays a pivotal role in ensuring the health and productivity of crops. This study presents a unified approach for addressing this challenge by leveraging the power of Explainable AI (XAI)…
View article: A hybrid Framework for plant leaf disease detection and classification using convolutional neural networks and vision transformer
A hybrid Framework for plant leaf disease detection and classification using convolutional neural networks and vision transformer Open
Recently, scientists have widely utilized Artificial Intelligence (AI) approaches in intelligent agriculture to increase the productivity of the agriculture sector and overcome a wide range of problems. Detection and classification of plan…
View article: Robust Blind Watermarking to Secure Color Medical Images Using Multidimensional-FFT Fusing LFSR-Encryption and LZW Compression
Robust Blind Watermarking to Secure Color Medical Images Using Multidimensional-FFT Fusing LFSR-Encryption and LZW Compression Open
This paper offers a new robust-blind watermarking scheme for medical image protection. In the digital era, protecting medical images is essential to maintain the confidentiality of patients and data reliability. Robust blind watermarking h…
View article: Multiple image encryption algorithm using channel randomization and multiple chaotic maps
Multiple image encryption algorithm using channel randomization and multiple chaotic maps Open
Developing robust and secure image encryption methods for transmitting multiple images in batches over unprotected networks has become imperative. This necessity arises from the limitations of single-image encryption techniques in managing…
View article: Explainable ensemble deep learning-based model for brain tumor detection and classification
Explainable ensemble deep learning-based model for brain tumor detection and classification Open
Brain tumors are very dangerous as they cause death. A lot of people die every year because of brain tumors. Therefore, accurate classification and detection in the early stages can help in recovery. Various deep learning techniques have a…
View article: An efficient convolution neural network method for copy-move video forgery detection
An efficient convolution neural network method for copy-move video forgery detection Open
Unmanned systems play a pivotal role in military surveillance, critical infrastructure protection, law enforcement, search and rescue operations, and border security, showcasing their multifaceted importance across diverse applications. Vi…
View article: Masked face image segmentation using a multilevel threshold with a hybrid fitness function
Masked face image segmentation using a multilevel threshold with a hybrid fitness function Open
Masked face segmentation tasks have become significantly more difficult due to the increasing use of face masks. On the other hand, the forehead, eyebrows, and eye regions are usually visible and reveal vital information. This exposed area…
View article: Stegocrypt: A robust tri‐stage spatial steganography algorithm using TLM encryption and DNA coding for securing digital images
Stegocrypt: A robust tri‐stage spatial steganography algorithm using TLM encryption and DNA coding for securing digital images Open
This research work presents a novel secured spatial steganography algorithm consisting of three stages. In the first stage, a secret message is divided into three parts, each is encrypted using a tan logistic map encryption key with a uniq…
View article: A new four-tier technique for efficient multiple images encryption
A new four-tier technique for efficient multiple images encryption Open
People transmit millions of digital images daily over various networks, where securing these images is a big challenge. Image encryption is a successful approach widely used in securing digital images while transmitting. Researchers develo…
View article: Handover for V2V communication in 5G using convolutional neural networks
Handover for V2V communication in 5G using convolutional neural networks Open
Vehicle communication is one of the most vital aspects of modern transportation systems because it enables real-time data transmission between vehicles and infrastructure to improve traffic flow and road safety. The next generation of mobi…