Osama Hosam

413 total citations
28 papers, 209 citations indexed

About

Osama Hosam is a scholar working on Computer Vision and Pattern Recognition, Information Systems and Artificial Intelligence. According to data from OpenAlex, Osama Hosam has authored 28 papers receiving a total of 209 indexed citations (citations by other indexed papers that have themselves been cited), including 19 papers in Computer Vision and Pattern Recognition, 7 papers in Information Systems and 5 papers in Artificial Intelligence. Recurrent topics in Osama Hosam's work include Advanced Steganography and Watermarking Techniques (13 papers), Chaos-based Image/Signal Encryption (7 papers) and Digital Media Forensic Detection (5 papers). Osama Hosam is often cited by papers focused on Advanced Steganography and Watermarking Techniques (13 papers), Chaos-based Image/Signal Encryption (7 papers) and Digital Media Forensic Detection (5 papers). Osama Hosam collaborates with scholars based in Saudi Arabia, Egypt and China. Osama Hosam's co-authors include Wei Liang, Meng-Yen Hsieh, Mingdong Tang, Jing Long, Lijun Xiao, Xiaohong Chen, Xuhui Chen, Wenwei Li, Weihong Huang and Yang Yang and has published in prestigious journals such as IEEE Access, Journal of Intelligent & Fuzzy Systems and Connection Science.

In The Last Decade

Osama Hosam

28 papers receiving 198 citations

Peers

Osama Hosam
Osama Hosam
Citations per year, relative to Osama Hosam Osama Hosam (= 1×) peers Kranthi Kumar Singamaneni

Countries citing papers authored by Osama Hosam

Since Specialization
Citations

This map shows the geographic impact of Osama Hosam's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Osama Hosam with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Osama Hosam more than expected).

Fields of papers citing papers by Osama Hosam

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Osama Hosam. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Osama Hosam. The network helps show where Osama Hosam may publish in the future.

Co-authorship network of co-authors of Osama Hosam

This figure shows the co-authorship network connecting the top 25 collaborators of Osama Hosam. A scholar is included among the top collaborators of Osama Hosam based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Osama Hosam. Osama Hosam is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Yang, Yang, et al.. (2023). A Review of Blockchain-based Privacy Computing Research. 241–246. 3 indexed citations
4.
Hosam, Osama, et al.. (2022). Enhancing Deep Training of Image Landmarking with Image CAPTCHA. 25. 88–93. 2 indexed citations
5.
Liang, Wei, et al.. (2021). 5GSS: a framework for 5G-secure-smart healthcare monitoring. Connection Science. 34(1). 139–161. 30 indexed citations
6.
Xiao, Lijun, et al.. (2020). Secure Digital Certificate-Based Data Access Control Scheme in Blockchain. IEEE Access. 8. 91751–91760. 24 indexed citations
7.
Xiao, Lijun, et al.. (2020). A novel watermarking algorithm based on characteristics model of local fragmentary images. International Journal of Embedded Systems. 12(1). 11–11. 2 indexed citations
8.
Hosam, Osama. (2019). Attacking Image Watermarking and Steganography - A Survey. International Journal of Information Technology and Computer Science. 11(3). 23–37. 25 indexed citations
9.
Zhu, Wei, Osama Hosam, & Xiaodong Zheng. (2019). A secure hierarchical community detection algorithm. International Journal of Computational Science and Engineering. 19(2). 242–242. 1 indexed citations
10.
Hosam, Osama, et al.. (2019). Hybrid design for cloud data security using combination of AES, ECC and LSB steganography. International Journal of Computational Science and Engineering. 19(2). 153–153. 18 indexed citations
11.
Huang, Weihong, et al.. (2019). Intellectual property protection for FPGA designs using the public key cryptography. Advances in Mechanical Engineering. 11(4). 3 indexed citations
12.
Liang, Wei, et al.. (2016). A two-step MF signal acquisition method for wireless underground sensor networks. Computer Science and Information Systems. 13(2). 623–638. 11 indexed citations
13.
Hosam, Osama, et al.. (2016). Bag of Words Based Surveillance System Using Support Vector Machines. International Journal of Security and Its Applications. 10(4). 331–346. 23 indexed citations
15.
Hosam, Osama, et al.. (2015). Embedding Image ROI Watermark Into Median DCT Coefficients. International Review on Computers and Software (IRECOS). 10(6). 643–643. 3 indexed citations
16.
Hosam, Osama, et al.. (2013). Novel Image Watermarking Technique Based on Adjacent Pixel Position Switch. 4(3). 81–88. 3 indexed citations
17.
Liang, Wei, et al.. (2013). A Survey of Techniques for VLSI IP Protection. Information Technology Journal. 12(12). 2324–2332. 5 indexed citations
18.
Hosam, Osama, et al.. (2012). Public watermarking scheme for 3D laser scanned archeological models. 18. 382–389. 2 indexed citations
19.
Hosam, Osama. (2012). Motion compensation for video codec based on disparity estimation. 14. 559–565. 1 indexed citations
20.
Hosam, Osama, et al.. (2010). Watermarking 3D Triangular Mesh with High Visual Quality. International Journal of Digital Content Technology and its Applications. 4(4). 107–116. 5 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026