Ghazali Sulong

Ghazali Sulong
Management and Science University | msu · Faculty of Information Sciences and Engineering

PhD Computing (Wales UK, 1989)

About

178
Publications
233,193
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,384
Citations
Introduction
Fields of Specialization: Image Processing & Pattern Recognition: Biometric - fingerprint identification, face recognition, iris verification, ear recognition, handwritten script recognition, and writer identification; object recognition; image enhancement and restoration; medical imaging; human activities recognition; data hiding - digital watermarking and steganography; image fusion; image mining; object detection, segmentation and tracking
Additional affiliations
July 2016 - June 2018
University of Malaysia, Terengganu
Position
  • Professor
May 1982 - June 2016
University of Technology Malaysia
Position
  • Professor
May 1982 - June 2016
University of Technology Malaysia
Position
  • Image processing & pattern recognition
Description
  • Research interests include biometric recognition- fingerprint, face, iris, ear, handwritten script, writer identification; image enhancement, medical image segmentation and restoration, digital watermarking and steganography, cell tracking

Publications

Publications (178)
Article
Full-text available
This research introduces a novel and robust watermarking scheme for medical Brain MRI DICOM images, addressing the challenge of maintaining high imperceptibility and robustness simultaneously. The scheme ensures privacy control, content authentication, and protection against the detachment of vital Electronic Patient Record information. To enhance...
Conference Paper
Full-text available
Digital watermarking is being used for increasing the level of effectiveness and security of the documents transfer over the internet, especially in the biomedical field. This study examined and explored the new working domain for medical image watermarking by introducing a Dynamic Visibility Threshold (DVT) as a crossover from pure mathematics ove...
Conference Paper
Full-text available
Recent developments in writer identification have led new directions, which is writer identification integrated with retrieval mechanism for boosting the performance applications of writer identification when a database is getting larger in size and retrieval of documents from expanding databases is becoming difficult. Issues on datasets used by pr...
Article
Currently, there is a dramatic development ion aspects such as the verbal exchange of data, as well as computer-related technology. This trend has attracted growing scholarly attention, with the aspects of data protection also linked to dramatic growth in the interest of many scholars. For more than a decade, improvements have been felt in certain...
Article
Full-text available
span lang="EN-US">Steganography is one of the method to communicate in a hidden way. In another word, steganography literally means the practice of hiding messages or information within another data. Previous studies have proposed various steganography techniques using different approaches including Least Significant Bit (LSB), Discrete Cosine Tran...
Article
Full-text available
Copy-move forgery (CMF) in digital images is a detrimental tampering of artefacts that requires precise detection and analysis. CMF is performed by copying and pasting a part of an image into other portions of it. Despite several efforts to detect CMF, accurate identification of noise, blur and rotated region-mediated forged image areas is still di...
Preprint
Online signature verification is the process of verifying time series signature data which is generally obtained from the tablet-based device. Unlike offline signature images, the online signature image data consists of points that are arranged in a sequence of time. The aim of this research is to develop an improved approach to map the strokes in...
Article
Full-text available
Since powerful editing software is easily accessible, manipulation on images is expedient and easy without leaving any noticeable evidences. Hence, it turns out to be a challenging chore to authenticate the genuineness of images as it is impossible for human’s naked eye to distinguish between the tampered image and actual image. Among the most comm...
Conference Paper
Full-text available
The availability of powerful editing software sophisticated digital cameras, and region duplication is becoming more and more popular in video manipulation where parts of video frames is pasted to another location to conceal undesirable objects. Most existing techniques to detect such tampering are mainly at the cost of higher computational complex...
Conference Paper
A new approach to fingerprint image segmentation and feature extraction is proposed to improve the implementation of Automated Fingerprint Identification System (AFIS) based on automatic threshold values. The process starts by partitioning the fingerprint image manually into 16 × 16 pixels blocks. For each block, a local threshold is calculated usi...
Article
Full-text available
The direction of fingerprint patterns normally changes from one block to another, which makes it necessary to have information about neighbouring blocks to obtain the original shape of the fingerprint patterns. This paper introduced a novel approach for orientation field calculation using an innovative filter formed as Epicycloid window shape. In w...
Article
Full-text available
In this paper, we present a new method to recognise the leaf type and identify plant species using phenetic parts of the leaf; lobes, apex and base detection. Most of the research in this area focuses on the popular features such as the shape, colour, vein, and texture, which consumes large amounts of computational processing and are not efficient,...
Article
Full-text available
Splicing Image Forgery Identification controls and picture tampering with no proof being left behind has turned out to be exceptionally moderate and exceedingly utilized, because of presence of to a great degree intense altering apparatuses, for example, Adobe Photoshop. Along these lines, there has been a quick expansion of the digitally adjusted...
Article
Full-text available
In this paper, new brain tumour detection method is discovered whereby the normal slices are disassembled from the abnormal ones. Three main phases are deployed including the extraction of the cerebral tissue, the detection of abnormal block and the mechanism of fine-tuning and finally the detection of abnormal slice according to the detected abnor...
Article
Full-text available
The recent growth of communications and multimedia applications had led to the requirement of mass storage space as well as efficient retrieval technique especially for multimedia data. In this paper, a novel approach for representing gray level image for data storage and image retrieval is proposed. The proposed approach used set enumeration tree...
Article
Full-text available
Past decades had seen the concerned by researchers in authenticating the originality of an image as the result of advancement in computer technology. Many methods have been developed to detect image forgeries such as copy-move, splicing, resampling and et cetera. The most common type of image forgery is copy-move where the copied region is pasted o...
Article
Full-text available
A Knight Tour problem is an ancient puzzle which remains as a focus of current researcher. The objective of a Knight Tour algorithm is to find out a solution with construct a closed moving path by a knight for visiting each square of a chessboard by only once. This paper proposes a new structural Knight Tour algorithm by four knights moving all tog...
Article
Since 2003, the permanent failure of the scan line corrector (SLC) of the Landsat Enhanced Thematic Mapper Plus (ETM+) sensor has seriously limited the scientific applications and usability of ETM+ data. While a number of methods have been conducted to fill the regular un-scanned locations in ETM+ SLC-off images, only a few researches have been dev...
Article
This paper presents a review on the state of the art in offline text-independent writer identification methods for three major languages, namely English, Chinese and Arabic, which were published in literatures from 2011 till 2016. For ease of discussions, we grouped the techniques into three categories: texture-, structure-, and allograph-based. Re...
Article
Alzheimer's disease is a brain degeneration illness. It requires earlier detection in order to improve the quality of life of the patient. Many researchers have studied different computed aided approaches in order to help in the diagnosis of the disease. However, there are few well-known techniques that were used in most of the studies. It is chall...
Conference Paper
Full-text available
Accurate cancer classification and responses to treatment are important in clinical cancer research since cancer acts as a family of gene-based diseases. Microarray technology has widely developed to measure gene expression level changes under normal and experimental conditions. Normally, gene expression data are high dimensional and characterized...
Conference Paper
Full-text available
In the bioinformatics and clinical research areas, microarray technology has been widely used to distinguish a cancer dataset between normal and tumour samples. However, the high dimensionality of gene expression data affects the classification accuracy of an experiment. Thus, feature selection is needed to select informative genes and remove non-i...
Conference Paper
Full-text available
Owing to the growth of multimedia content, online sketch-based image retrieval from a large dataset has become a dynamic discipline. However, the problem with this type of image retrieval is the development of a real-time sketch-based image search engine for a database characterized as large and variant because of the lack of indexing solutions wit...
Article
Full-text available
Beneath the uncertain primitive visual features of face images are the primitive intrinsic structural patterns (PISP) essential for characterizing a sample face discriminative attributes. It is on this basis that this paper presents a simple yet effective facial descriptor formed from derivatives of Gaussian and Gabor Wavelets. The new descriptor i...
Conference Paper
Arabic text categorization for pattem recognitions is challenging. We propose for the first time a novel holistic method based on clustering for classifying Arabic writer. The categorization is accomplished stage-wise. Firstly, these document images are sectioned into lines, words, and characters. Secondly, their structural and statistical features...
Article
With ceaseless utilization of web and other online advances, it has turned out to be amazingly simple to imitate, discuss, and convey digital material. Subsequently, confirmation and copyright assurance issues have been emerged. Text is the most widely used media of communication on the web as compared with images and videos. The significant part o...
Article
Full-text available
Most of researches on image forensics have been mainly focused on detection of artifacts introduced by a single processing tool. They lead in the development of many specialized algorithms looking for one or more particular footprints under specific settings. Naturally, the performance of such algorithms are not perfect, and accordingly the provide...
Article
Full-text available
This paper presents a combination of enhancement techniques for fingerprint images affected by different type of noise. These techniques were applied to improve image quality and come up with an acceptable image contrast. The proposed method included five different enhancement techniques: Normalization, Histogram Equalization, Binarization, Skeleto...
Article
Digital splicing technology has become an influencing factor when it comes to the technological development of digital photo manipulation because of remarkable technology development in this area. The most popular users of digital splicing are those businesses involved in newspaper and magazine publication, companies that require authenticity verif...
Article
Full-text available
Owing to the growth of multimedia content, online sketch-based image retrieval from a large dataset has become a dynamic discipline. However, the problem with this type of image retrieval is the development of a real-time sketch-based image search engine for a database characterized as large and variant because of the lack of indexing solutions wit...
Article
Full-text available
p class="zhengwen">Developing an accurate and efficient Sketch-Based Image Retrieval (SBIR) method in determining the resemblances between the user's query and image stream has been a never-ending quest in digital data communication era. The main challenge is to overcome the asymmetry between a binary sketch and a full-color image. We introduce a u...
Article
Full-text available
Developing an accurate and efficient Sketch-Based Image Retrieval (SBIR) method in determining the resemblances between the user's query and image stream has been a never-ending quest in digital data communication era. The main challenge is to overcome the asymmetry between a binary sketch and a full-color image. We introduce a unique sketch board...
Article
Full-text available
Computed Tomography (CT) has remained an important component of medical imaging since its inception. In general, it is preferred to keep the radiation dose as low as possible during the CT examinations to prevent patients as well as operators from the dangerous side effects of these radiations, which in an extreme case may lead to cancer. However,...
Article
Full-text available
Lip-syncing is a process of speech assimilation with the lip motions of a virtual character. A virtual talking character is a challenging task because it should provide control on all articulatory movements and must be synchronized with the speech signal. This study presents a virtual talking character system aimed to speeding and easing the visual...
Article
Full-text available
On 31 May 2003, the scan line corrector (SLC) of the Landsat 7 Enhanced Thematic Mapper Plus (ETM+) sensor which compensates for the forward motion of the satellite in the imagery acquired failed permanently, resulting in loss of the ability to scan about 20% of the pixels in each Landsat 7 SLC-off image. This permanent failure has seriously hamper...
Article
Full-text available
An accurate estimated fingerprint orientation fields is a significant step for detection of singular points. Gradient-based methods are frequently used for estimating orientation fields but those methods are sensitive to noise. Fingerprints that perfect quality are seldom. They may be corrupted and degraded due to impression conditions or variation...
Article
Full-text available
Sketch based image retrieval method is still a new filed under development process in the research area. The main idea of image retrieval by sketch is to detect or bound the object in images which stored in the database and match it with a query which inserted as a sketch. This study displays the edge detection algorithms like (Sobel,Canny) and com...
Article
Full-text available
Magnetic Resonance (MR) images provide physicians with vital information about different diseases of the human body. Thus, such images must have adequate clarity to become highly beneficial in the medical field. However, it is known that MR images have a poor dynamic range which significantly affects their visible quality due to the deficient brigh...
Article
Full-text available
Objectives: To analyze the influence of the sparseness distribution characteristics of gradient-based descriptor data on reduction of high-dimensional data, this paper presents experimental analysis on learned samples of gradient descriptor data. Method: In order to draw valid inferences, a single gradient descriptor, the Edge based Gabor Magnitude...
Article
Since 2003, the scan line corrector (SLC) of the Landsat 7 Enhanced Thematic Mapper Plus (ETM+) sensor has failed permanently, inhibiting the retrieval or scanning of 22% of the pixels in each Landsat 7 SLC-off image. This utter failure has seriously limited the scientific applications and usability of ETM+ data. Precise and complete recovery of th...
Article
Full-text available
Content based image retrieval (CBIR) depends on several factors, such as, feature extraction method (the usage of appropriate features in CBIR), similarity measurement method and mathematical transform (chosen to calculate effective features), feedback usage and etc. All these factors are important in CBIR to enhance image retrieval accuracy and ef...
Article
Full-text available
Generally, radiologists analyse the Magnetic Resonance Imaging (MRI) by visual inspection to detect and identify the presence of tumour or abnormal tissue in brain MR images. The huge number of such MR images makes this visual interpretation process, not only laborious and expensive but often erroneous. Furthermore, the human eye and brain sensitiv...
Article
Full-text available
Mammography became the most efficient tool for early detection among breast cancer patients because it can detect cancer up to two years earlier than a mass can be shown. Pre-processing and postprocessing of mammographic images involves high computational cost. Preprocessing is an essential element of any imaging modalities whose foremost aim is to...
Article
Full-text available
Fingerprint classification is an important stage in automatic fingerprint identification system (AFIS) because it significantly reduces the processing time to search and retrieve in a large-scale fingerprint database. However, its performance is heavily relied on image quality that comes in various forms such as low contrast, wet, dry, bruise, cuts...
Article
Full-text available
Neuroimaging is a new technique used to create images of the structure and function of the nervous system in the human brain. Currently, it is crucial in scientific fields. Neuroimaging data are becoming of more interest among the circle of neuroimaging experts. Therefore, it is necessary to develop a large amount of neuroimaging tools. This paper...
Article
Full-text available
Today, the security of digital images is considered more and more essential and a strong secret key plays a major role in the image encryption. In this paper, a novel method for generating dynamic non-linear secret keys for a symmetric block cipher using XOR-operation is proposed. The dynamic non-linear secret keys generation is based on a combinat...
Article
Full-text available
The use of low-intricacy techniques for fast and efficient detection of moving objects is considered quite challenging because it often leads to undesirable results. In this study, we propose an innovative technique that improves the motion detection process for moving objects. The proposed technique employs only a few distinct steps to obtain desi...
Article
Full-text available
Background/Objectives: Selective image encryption is the best modern approach for reducing the amount of encrypted area. The objective of this paper is to study the strength and limitationof the modern approach. Methods: This survey has mainly focuses on reviewing modern approaches in literature on selective encryption and classifies them into thre...
Article
Full-text available
Fingerprint image segmentation is an important pre-processing step in automatic fingerprint recognition system. A well-designed fingerprint segmentation technique can improve the accuracy in collecting clear fingerprint area and mark noise areas. The traditional grey variance segmentation method is widely and easily used, but it can hardly segment...
Article
Full-text available
Automatic age estimation provided efficient solution for many applications in our life. One of the most significant biometric in estimating a human age is the face; since it is the most captured biometric and it contains a lot of age information embedded in it. Senior adult faces contain the most obvious age progression signs such as, wrinkles, lin...
Article
Deblurring computed tomography (CT) images has been an active research topic in recent years because of the wide variety of challenges it offers. Hence, a novel filter is proposed in this article unveiling a simple, efficient, and fast deblurring process that involves few parameters, low calculations and does not utilize the undesirable iterative p...
Article
Full-text available
This work studies age estimation in children faces; cranial features are used to represent age effects on child face (0-12) years. Determined face oval is built depending on two points that are not affected by weakness such as fatness, opening mouth, and hair style; these two points are chosen from provided landmarks with standard FG-NET face datas...
Article
Full-text available
Speech is one of the most important interaction methods between the humans. Therefore, most of avatar researches focus on this area with significant attention. Creating animated speech requires a facial model capable of representing the myriad shapes the human face expressions during speech. Moreover, a method to produce the correct shape at the co...
Article
Full-text available
We propose a new method for detecting the abnormality in cerebral tissues present within Magnetic Resonance Images (MRI). Present classifier is comprised of cerebral tissue extraction, image division into angular and distance span vectors, acquirement of four features for each portion and classification to ascertain the abnormality location. The th...
Article
Full-text available
This paper provides a comprehensive review of existing works including the characteristics of Chinese characters’ complex stroke crossing and challenges, which is still a largely unexplored subject for off-line textindependent Chinese handwriting identification.
Article
Full-text available
In computed tomography (CT), blurring occurs due to different hardware or software errors and hides certain medical details that are present in an image. Image blur is difficult to avoid in many circumstances and can frequently ruin an image. For this, many methods have been developed to reduce the blurring artifact from CT images. The problems wit...
Article
Full-text available
Automated cell migration tracking is important in detecting the cell movement in order to help in cell status analysis especially when there are a huge numbers of cells in one image frame. Automated cell tracking processes involve detecting, segmentation and labelling the cell. Each step is crucial and will affect the next step. The common problems...
Article
Full-text available
This paper proposed a novel approach to cluster the species of plants based on their lobes, sinuses and margin. Firstly, all the boundary points in the clockwise or anticlockwise direction were selected. Then, an estimated centre point for leaf boundary points was used to compute the distance between the leaf boundary points and centre point. Next,...
Article
Full-text available
An accurate estimation of fingerprint orientation fields is an important step in the fingerprint classification process. Gradient-based approaches are often used for estimating orientation fields of ridge structures but this method is susceptible to noise. Enhancement of fingerprint images improves the ridge-valley structure and increases the numbe...
Article
Full-text available
The quest for achieving an accurate and efficient algorithm in enhancing the security of colour image encryption is never-ending. We enhance the security level of conventional Blowfish algorithm (BA) for colour image encryption by modifying it with new F-function. The dynamic S-box and XOR operator are generated from the F-function via four-dimensi...
Research
Full-text available
Today’s modern medical imaging research faces the challenge of detecting brain tumor through Magnetic Resonance Images (MRI). Normally, to produce images of soft tissue of human body, MRI images are used by experts. It is used for analysis of human organs to replace surgery. For brain tumor detection, image segmentation is required. For this purpos...
Patent
Full-text available
The present invention relates to medical imaging of 5 the brain. More particularly, the present invention relates to the segmentation and visualization of brain tumours as well as the volumetric measurement of brain tumors in Magnetic Resonance Images (MRI).