Follow
Osama Hosam
Title
Cited by
Cited by
Year
Hybrid design for cloud data security using combination of AES, ECC and LSB steganography
O Hosam, MH Ahmad
International Journal of Computational Science and Engineering 19 (2), 153-161, 2019
472019
5GSS: A framework for 5G-secure-smart healthcare monitoring
J Hu, W Liang, O Hosam, MY Hsieh, X Su
Connection Science 34 (1), 139-161, 2022
402022
Attacking image watermarking and steganography-a survey
O Hosam
International Journal of Information Technology and Computer Science 11 (3 …, 2019
392019
Bag of words based surveillance system using support vector machines
NB Halima, O Hosam
Int. J. Secur. Appl 10 (4), 331-346, 2016
352016
Secure digital certificate-based data access control scheme in blockchain
B Liu, L Xiao, J Long, M Tang, O Hosam
IEEE Access 8, 91751-91760, 2020
342020
Adaptive block‐based pixel value differencing steganography
O Hosam, N Ben Halima
Security and Communication Networks 9 (18), 5036-5050, 2016
262016
Enhancing deep training of image landmarking with image CAPTCHA
O Hosam, R Abousamra
2022 8th International Conference on Information Technology Trends (ITT), 88-93, 2022
172022
A two-step MF signal acquisition method for wireless underground sensor networks
W Liang, Y Xie, X Chen, O Hosam, X Chen
Computer Science and Information Systems 13 (2), 623-638, 2016
172016
Quantitative classification of cognitive behaviors for industrial projects' managers in the mena region
R Abousamra, O Hosam
2022 8th International Conference on Information Technology Trends (ITT …, 2022
162022
Hiding bitcoins in steganographic fractals
O Hosam
2018 IEEE International Symposium on Signal Processing and Information …, 2018
162018
Toxic Comments Identification in Arabic Social Media
O Hosam
132019
Watermarking 3d triangular mesh with high visual quality
O Hosam, L Yang, W Liang, X Sun
International Journal of Digital Content Technology and its Applications 4 …, 2010
132010
Deep learning-based car seatbelt classifier resilient to weather conditions
O Hosam
Int. J. Eng. Technol 9 (1), 229-237, 2020
112020
Side-informed image watermarking scheme based on dither modulation in the frequency domain
O Hosam
The Open Signal Processing Journal 5 (1), 2013
112013
A survey of techniques for vlsi ip protection
W Liang, D Zhang, Z You, W Li, O Hosam
Information Technology Journal 12 (12), 2324-2332, 2013
102013
Steganography technique for embedding secure data into the image regions with abrupt changes
O Hosam, Z Malki
Life Sci J 11 (9), 126-130, 2014
82014
Novel Image Watermarking Technique Based on Adjacent Pixel Position Switch
OH Abdulaziz S. Alraddadi
JNIT: Journal of Next Generation Information Technology 4 (3), 81-88, 2013
8*2013
Three-dimensional reconstruction using enhanced shape from stereo technique
O Hosam, X Sun
2009 Eighth IEEE/ACIS International Conference on Computer and Information …, 2009
82009
Intelligent risk management using artificial intelligence
O Hosam
2022 Advances in Science and Engineering Technology International …, 2022
62022
A hybrid ROI-embedding based watermarking technique using DWT and DCT transforms
O Hosam, NB Halima
Journal of Theoretical and Applied Information Technology 81 (3), 514, 2015
62015
The system can't perform the operation now. Try again later.
Articles 1–20