Ghazali Sulong
Universiti Teknologi Malaysia

Published : 4 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 4 Documents
Search

Segmentation of Fingerprint Image Based on Gradient Magnitude and Coherence Saparudin Saparudin; Ghazali Sulong
International Journal of Electrical and Computer Engineering (IJECE) Vol 5, No 5: October 2015
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (1602.699 KB) | DOI: 10.11591/ijece.v5i5.pp1202-1215

Abstract

Fingerprint image segmentation is an important pre-processing step in automatic fingerprint recognition system. A well-designed fingerprint segmentation technique can improve the accuracy in collecting clear fingerprint area and mark noise areas. The traditional grey variance segmentation method is widely and easily used, but it can hardly segment fingerprints with low contrast of high noise. To overcome the low image contrast, combining two-block feature; mean of gradient magnitude and coherence, where the fingerprint image is segmented into background, foreground or noisy regions,  has been done. Except for the noisy regions in the foreground, there are still such noises existed in the background whose coherences are low, and are mistakenly assigned as foreground. A novel segmentation method based on combination local mean of grey-scale and local variance of gradient magnitude is presented in this paper. The proposed extraction begins with normalization of the fingerprint. Then, it is followed by foreground region separation from the background. Finally, the gradient coherence approach is used to detect the noise regions existed in the foreground. Experimental results on NIST-Database14 fingerprint images indicate that the proposed method gives the impressive results.
The use of Least Significant Bit (LSB) and Knight Tour Algorithm for image steganography of cover image Soo Ann Nie; Ghazali Sulong; Rozniza Ali; Andrew Abel
International Journal of Electrical and Computer Engineering (IJECE) Vol 9, No 6: December 2019
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (578.452 KB) | DOI: 10.11591/ijece.v9i6.pp5218-5226

Abstract

Steganography is one of the method to communicate in a hidden way. In another word, steganography literally means the practice of hiding messages or information within another data. Previous studies have proposed various steganography techniques using different approaches including Least Significant Bit (LSB), Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT). However, different approaches still have its own weaknesses. Therefore image stenography using Knight Tour Algorithm with Least Significant Bit (LSB) technique is presented. The main objective is to improve the security factor in the stego image. Basically, the proposed technique is divided into two parts which are the sender and receiver side. Then, steganalysis which is a type of attack on stenography algorithm is used to detect the secret message in the cover image by the statistical analysis of pixel values. Chi Square Statistical Attach which is one of the type of steganalysis is used to detect these near-equal Po Vs in images and bases the probability of embedding on how close to equal the even pixel values and their corresponding odd pixel values are in the test image. The Knight Tour Algorithm is applied due to the common Least Significant Bit technique that is weak in security and easily decoded by outsider.
Multi Facial Blurring using Improved Henon Map Saparudin Saparudin; Ghazali Sulong; Muhammed Ahmed Saleh
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 12, No 4: December 2014
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v12i4.359

Abstract

Generally, full encryption is applied on the entire image to obscure the faces. However, it suffers in overhead, speed and time. Alternatively, selective encryption can be used to encrypt only the sensitive part of the image such as human faces. This paper proposes a new encryption algorithm using enhanced Henon chaotic map to conceal the faces. This technique involves three steps: face detection, encryption and decryption. Experiments have been performed to evaluate security such as histogram, sensitivity and statistical analysis, and results reveal that the proposed method provides high security with entropy and correlation close to ideal values.
A Technique to Improve Ridge Flows of Fingerprint Orientation Fields Estimation Saparudin Saparudin; Ghazali Sulong
TELKOMNIKA (Telecommunication Computing Electronics and Control) Vol 14, No 3: September 2016
Publisher : Universitas Ahmad Dahlan

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.12928/telkomnika.v14i3.3112

Abstract

This paper is under in-depth investigation due to suspicion of possible plagiarism on a high similarity indexAn accurate estimated fingerprint orientation fields is a significant step for detection of singular points. Gradient-based methods are frequently used for estimating orientation fields but those methods are sensitive to noise. Fingerprints that perfect quality are seldom. They may be corrupted and degraded due to impression conditions or variations on skin. Enhancement of ridge flows improved the structure of orientation fields and hence increased the number of true singular points thereby conducting the overall performance of the classification process. In this paper, we provided discussion on the technique and implementation to improve local ridge flows segmentation; secondly, identification of noise areas and marking; thirdly, estimation of fingerprint orientation fields using gradient-based method and finally, enhancement of ridge flows using minimum variance of the cross centre block direction in squared gradients. A standard fingerprint database is used for testing of proposed technique to verify the tier of effectivity of algorithm. The experimental results suggest that our enhanced algorithm achieves visibly better ridge flows compare to other methods.