Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gran Badshah is active.

Publication


Featured researches published by Gran Badshah.


student conference on research and development | 2014

Mobile cloud computing & mobile battery augmentation techniques: A survey

Mushtaq Ali; Jasni Mohamed Zain; Mohammad Fadli Zolkipli; Gran Badshah

Energy efficiency of mobile devices is paramount after the tremendous advancement in technology while the explosion of smart mobile applications such as, YouTube, Facebook, Twitters and Google maps makes Smart Internet Devices (SIDs) the first choice of communication. On the other hand, multiple sensors and wireless interfaces drain battery swiftly, thus reducing the operational time of SIDs. Therefore, extending battery life problem has become of crucial research importance, at hardware and software levels, both alike. This paper firstly, makes contribution by reviewing different techniques at software level used to enhance battery life of SIDs in particular Smartphones. At the end, suggestions and opinions related to energy efficiency of SIDs are given, based on the comparative studies.


international conference on electronics computer and computation | 2013

Digital watermarking for recovering attack areas of medical images using spiral numbering

Syifak Izhar Hisham; Afifah Nailah Muhammad; Jasni Mohamad Zain; Gran Badshah; Nurul Wahidah Arshad

Medical image is seen as one of crucial data that demand for authentication method in order to ensure that data has not been tampered. This paper has conducted a research proposing a recovery feature in an authentication watermark with spiral manner numbering, which shows a good numbering system of embedding. The schema is a fragile, blind watermarking. The operating time taken is short and the result is very promising with high Peak-Signal-to-Noise-Ratio (PSNR) value and low Mean-Squared Error (MSE).


advances in information technology | 2013

Localization Watermarking for Authentication of Text Images in Quran with Spiral Manner Numbering

Syifak Izhar Hisham; Afifah Nailah Muhammad; Jasni Mohamad Zain; Gran Badshah

The phenomenon of widespread usage of smart phone has encouraged many android applications to be produced, by free or paid. Nowadays, with the trend of communicating through social networking applications and social networking sites, Muslims tend to share the image of verse from the Quran applications to the sites. Several concerns regarding security and copy control of the verse text image have aroused, and among the solution to this issue is watermarking. This paper has conducted a research proposing an authentication fragile watermark with spiral manner which shows a good numbering system of embedding. The watermarking scheme is imperceptible and can embed high capacity of data. The average Peak-signal-of-Noise-Ratio (PSNR) value of embedded image is 67.06dB and the average operating time is 1.29 seconds. Subsequently, it proposed a localization and restoration watermarking scheme to be applied in the Quran application as a function before sharing.


Journal of medical imaging | 2016

Watermarking of ultrasound medical images in teleradiology using compressed watermark

Gran Badshah; Siau-Chuin Liew; Jasni Mohamad Zain; Mushtaq Ali

Abstract. The open accessibility of Internet-based medical images in teleradialogy face security threats due to the nonsecured communication media. This paper discusses the spatial domain watermarking of ultrasound medical images for content authentication, tamper detection, and lossless recovery. For this purpose, the image is divided into two main parts, the region of interest (ROI) and region of noninterest (RONI). The defined ROI and its hash value are combined as watermark, lossless compressed, and embedded into the RONI part of images at pixel’s least significant bits (LSBs). The watermark lossless compression and embedding at pixel’s LSBs preserve image diagnostic and perceptual qualities. Different lossless compression techniques including Lempel-Ziv-Welch (LZW) were tested for watermark compression. The performances of these techniques were compared based on more bit reduction and compression ratio. LZW was found better than others and used in tamper detection and recovery watermarking of medical images (TDARWMI) scheme development to be used for ROI authentication, tamper detection, localization, and lossless recovery. TDARWMI performance was compared and found to be better than other watermarking schemes.


Pattern Analysis and Applications | 2017

Numbering with spiral pattern to prove authenticity and integrity in medical images

Syifak Izhar Hisham; Afifah Nailah Muhammad; Gran Badshah; Nasrul Hadi Johari; Jasni Mohamad Zain

With the rapid development of technology in digital multimedia, manipulation and misconduct of digital data are soaring. The watermarking procedure is seen as helpful to protect the security of digital images which are highly confidential such as medical images. In this study, an efficient watermarking method for greyscale images is proposed. The scheme is designed to achieve good numbering pattern, exact detection and image recovery. The proposed scheme uses a unique spiral pattern numbering before implementing the block-based mechanism for embedding. The experiment tests the difference between using normal pattern and unique spiral pattern in numbering, and the results show that the proposed method produces a great quality value of embedded image with great tamper localization and recovery ability. This function can help in proving authenticity and integrity of medical images in the system.


student conference on research and development | 2015

Battery efficiency of mobile devices through computational offloading: A review

Mushtaq Ali; Jasni Mohamed Zain; Mohammad Fadli Zolkipli; Gran Badshah

Smart Internet Devices (SIDs) particularly Smartphones are soon turned to be super computers, while the restricted battery timing is a focused issue which hinders the steady meeting expectations yield of these devices. In addition, various sensors, high resolution LCDs, wireless interfaces, GPS and other advanced features drain battery quickly, thus, shrinking the operational time. Subsequently, increasing battery life of SIDs has happened to dire investigation significance at hardware and programming levels, both alike. The intention of our work is to evaluate computational offloading; sending power-intensive processing to remote servers in cloud and accepting the outcome back on devices screen. Furthermore, this paper gives a review of previous research work on computational offloading. We then summarize distinct research work with their respective findings and limitations. In addition, a short critical analysis of the review works following the summarized data.


Journal of Information Processing Systems | 2015

Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities

Gran Badshah; Siau-Chuin Liew; Jasni Mohamad Zain; Mushtaq Ali

Region of interest (ROI) is the most informative part of a medical image and mostly has been used as a major part of watermark. Various shapes ROIs selection have been reported in region-based watermarking techniques. In region-based watermarking schemes an image region of non-interest (RONI) is the second important part of the image and is used mostly for watermark encapsulation. In online healthcare systems the ROI wrong selection by missing some important portions of the image to be part of ROI can create problem at the destination. This paper discusses the complete medical image availability in original at destination using the whole image as a watermark for authentication, tamper localization and lossless recovery (WITALLOR). The WITALLOR watermarking scheme ensures the complete image security without of ROI selection at the source point as compared to the other region-based watermarking techniques. The complete image is compressed using the Lempel-Ziv-Welch (LZW) lossless compression technique to get the watermark in reduced number of bits. Bits reduction occurs to a number that can be completely encapsulated into image. The watermark is randomly encapsulated at the least significant bits (LSBs) of the image without caring of the ROI and RONI to keep the image perceptual degradation negligible. After communication, the watermark is retrieved, decompressed and used for authentication of the whole image, tamper detection, localization and lossless recovery. WITALLOR scheme is capable of any number of tampers detection and recovery at any part of the image. The complete authentic image gives the opportunity to conduct an image based analysis of medical problem without restriction to a fixed ROI.


international conference on computer communications | 2014

Authentication system for medical images using Hilbert numbering

Syifak Izhar Hisham; Jasni Mohamad Zain; Nurul Wahidah Arshad; Siau-Chuin Liew; Nasrul Hadi Johari; Gran Badshah

Medical image is seen as one of crucial data that demand for authentication method as it is highly confidential and used in insurance claim, evidence of jurisdiction and personal identification. Nowadays, Hospital Information System (HIS) is used widely at hospitals and clinical departments and it handles thousands of crucial electronic data in medical. We have introduced a fragile watermarking method using spiral manner numbering which showed a good numbering system and excellent embedding, but due to the technique, it only embedded in square shape. We enhanced the scheme to the Hilbert numbering scheme, which is more compatible with medical image modalities, which is not only specific to square shape of image but applicable to all kinds of image.


Journal of Digital Imaging | 2016

Watermark Compression in Medical Image Watermarking Using Lempel-Ziv-Welch (LZW) Lossless Compression Technique

Gran Badshah; Siau-Chuin Liew; Jasni Mohamad Zain; Mushtaq Ali


Archive | 2015

Importance of Watermark Lossless Compression in Digital Medical Image Watermarking

Gran Badshah; Siau-Chuin Liew; Jasni Mohamad Zain; Syifak Izhar Hisham; Amatul Zehra

Collaboration


Dive into the Gran Badshah's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Siau-Chuin Liew

Universiti Malaysia Pahang

View shared research outputs
Top Co-Authors

Avatar

Mushtaq Ali

Universiti Malaysia Pahang

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge