scispace - formally typeset
M

Mohamed Elhoseny

Researcher at Mansoura University

Publications -  287
Citations -  11252

Mohamed Elhoseny is an academic researcher from Mansoura University. The author has contributed to research in topics: Computer science & Wireless sensor network. The author has an hindex of 49, co-authored 240 publications receiving 7044 citations. Previous affiliations of Mohamed Elhoseny include Maharaja Agrasen Institute of Technology & Cairo University.

Papers
More filters
Journal ArticleDOI

Hybrid optimization with cryptography encryption for medical image security in Internet of Things

TL;DR: This paper investigated the security of medical images in IoT by utilizing an innovative cryptographic model with optimization strategies, and identified a diverse encryption algorithm with its optimization methods with the most extreme peak signal-to-noise ratio values.
Journal ArticleDOI

A Genetic Algorithm-Based, Dynamic Clustering Method Towards Improved WSN Longevity

TL;DR: A genetic algorithm-based, self-organizing network clustering (GASONeC) method that provides a framework to dynamically optimize wireless sensor node clusters and greatly extends the network life and the improvement up to 43.44 %.
Journal ArticleDOI

An approach for de-noising and contrast enhancement of retinal fundus image using CLAHE

TL;DR: A noise removal and contrast enhancement algorithm for fundus image using Integration of filters and contrast limited adaptive histogram equalization (CLAHE) technique is applied for solving the issues of de-noising and enhancement of color fundus images.
Journal ArticleDOI

Secure and Robust Fragile Watermarking Scheme for Medical Images

TL;DR: A new fragile watermarking-based scheme for image authentication and self-recovery for medical applications that greatly improves both tamper localization accuracy and the peak signal to noise ratio of self-recovered image.
Journal ArticleDOI

Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications

TL;DR: Experimental results clearly indicated that the proposed technique is highly robust and sufficient secure for various forms of attacks without any significant distortions between watermarked and cover image.