scispace - formally typeset
Search or ask a question
Author

Mohamed Elhoseny

Bio: Mohamed Elhoseny is an academic researcher from Mansoura University. The author has contributed to research in topics: Computer science & Encryption. The author has an hindex of 49, co-authored 240 publications receiving 7044 citations. Previous affiliations of Mohamed Elhoseny include Maharaja Agrasen Institute of Technology & Cairo University.

Papers published on a yearly basis

Papers
More filters
Book ChapterDOI
01 Jan 2020
TL;DR: The present chapter provides an overview of video watermarking techniques in wavelet domain and discusses various methods used for embedding and extraction of watermark, as well as providing the description of various attacks and key characteristics of videoWaterMarking techniques with comparative analysis of results for evaluation of the existing methods.
Abstract: The large availability and access of video data for education, entertainment such as games and movies poses several challenges of copyright violation and illegal distribution of data. More specifically, pirated video distribution has been a key threat for such copyright violation. To handle these challenges, watermarking techniques can be used to provide copyright protection. The wide application of wavelet transform in the implementation of image watermarking techniques compelled to discuss wavelet domain video watermarking techniques in this chapter. The present chapter provides an overview of video watermarking techniques in wavelet domain and discusses various methods used for embedding and extraction of watermark. It also provides the description of various attacks and key characteristics of video watermarking techniques with comparative analysis of results for evaluation of the existing methods.

2 citations

Proceedings ArticleDOI
01 Jul 2019
TL;DR: Some of the mistakes that doing by some traders in the market, especially those who use Fibonacci correction to make decision in trading are highlighted, to clarify some of these errors and eliminate noise in a fibonacci sequence in order to avoid the wrong signals.
Abstract: in this article we will try to highlight some of the mistakes that doing by some traders in the market, especially those who use Fibonacci correction to make decision in trading. The Fibonacci sequence is ideal mathematically, but this method release noise when included in the trading graphics, so we will work in this paper to clarify some of these errors and eliminate noise in a Fibonacci sequence in order to avoid the wrong signals, and so we have contributed to help traders in the market through automated trading to avoid loss and make a bigger profit.

2 citations

Book ChapterDOI
01 Jan 2018
TL;DR: The security analysis of authentication and communication processes against many types of attacks proved that the attacker can’t gain any information during intercepting either authentication or communication processes.
Abstract: In this chapter, a generalized architecture of quantum secure direct communication for N disjoint users with partial and full cooperation of quantum server is proposed. So, \( N - 1 \) disjointed users \( u_{1},\, u_{2},\, \ldots,\, u_{N - 1} \) can transmit a secret message of classical bits to a remote user \( u_{N} \) by utilizing the property of dense coding and Pauli unitary transformations. The authentication process between the quantum server and users validated by \( EPR \) entangled pair and \( CNOT \) gate. Afterward, the remaining \( EPR \) will be intended for generating shared \( GHZ \) states which used for directly transmitting the secret message. The partial cooperation process involved that \( N - 1 \) users can transmit a secret message directly to a remote user \( u_{N} \) through quantum channel. Furthermore, \( N - 1 \) users and a remote user \( u_{N} \) can communicate without an established quantum channel among them by full cooperation process. The security analysis of authentication and communication processes against many types of attacks proved that the attacker can’t gain any information during intercepting either authentication or communication processes. Hence, the security of transmitted message among \( N \) users is ensured as the attacker introducing an error probability irrespective of the sequence of measurement.

2 citations


Cited by
More filters
01 Jan 2004
TL;DR: Comprehensive and up-to-date, this book includes essential topics that either reflect practical significance or are of theoretical importance and describes numerous important application areas such as image based rendering and digital libraries.
Abstract: From the Publisher: The accessible presentation of this book gives both a general view of the entire computer vision enterprise and also offers sufficient detail to be able to build useful applications. Users learn techniques that have proven to be useful by first-hand experience and a wide range of mathematical methods. A CD-ROM with every copy of the text contains source code for programming practice, color images, and illustrative movies. Comprehensive and up-to-date, this book includes essential topics that either reflect practical significance or are of theoretical importance. Topics are discussed in substantial and increasing depth. Application surveys describe numerous important application areas such as image based rendering and digital libraries. Many important algorithms broken down and illustrated in pseudo code. Appropriate for use by engineers as a comprehensive reference to the computer vision enterprise.

3,627 citations

01 Jun 2005

3,154 citations

01 Sep 2008
TL;DR: The Methodology used to Prepare the Guideline Epidemiology Incidence Etiology and Recommendations for Assessing Response to Therapy Suggested Performance Indicators is summarized.
Abstract: Executive Summary Introduction Methodology Used to Prepare the Guideline Epidemiology Incidence Etiology Major Epidemiologic Points Pathogenesis Major Points for Pathogenesis Modifiable Risk Factors Intubation and Mechanical Ventilation Aspiration, Body Position, and Enteral Feeding Modulation of Colonization: Oral Antiseptics and Antibiotics Stress Bleeding Prophylaxis, Transfusion, and Glucose Control Major Points and Recommendations for Modifiable Risk Factors Diagnostic Testing Major Points and Recommendations for Diagnosis Diagnostic Strategies and Approaches Clinical Strategy Bacteriologic Strategy Recommended Diagnostic Strategy Major Points and Recommendations for Comparing Diagnostic Strategies Antibiotic Treatment of Hospital-acquired Pneumonia General Approach Initial Empiric Antibiotic Therapy Appropriate Antibiotic Selection and Adequate Dosing Local Instillation and Aerosolized Antibiotics Combination versus Monotherapy Duration of Therapy Major Points and Recommendations for Optimal Antibiotic Therapy Specific Antibiotic Regimens Antibiotic Heterogeneity and Antibiotic Cycling Response to Therapy Modification of Empiric Antibiotic Regimens Defining the Normal Pattern of Resolution Reasons for Deterioration or Nonresolution Evaluation of the Nonresponding Patient Major Points and Recommendations for Assessing Response to Therapy Suggested Performance Indicators

2,961 citations