Limits...
Two-layer fragile watermarking method secured with chaotic map for authentication of digital Holy Quran.

Khalil MS, Kurniawan F, Khan MK, Alginahi YM - ScientificWorldJournal (2014)

Bottom Line: Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain.The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark.A chaotic map is utilized to blur the watermark to make it secure against the local attack.

View Article: PubMed Central - PubMed

Affiliation: Center of Excellence Information Assurance, King Saud University, P.O. Box 92144, Riyadh 11653, Saudi Arabia ; IT Research Center for the Holy Quran and Its Sciences (NOOR), Taibah University, Madinah 41477, Saudi Arabia.

ABSTRACT
This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small.

Show MeSH
Diagram of the proposed embedding method.
© Copyright Policy - open-access
Related In: Results  -  Collection


getmorefigures.php?uid=PMC4060594&req=5

fig1: Diagram of the proposed embedding method.

Mentions: This section describes the proposed fragile watermarking method. Figure 1 presents the diagram of the proposed embedding process and Figure 2 shows the diagram of the proposed authentication process. The proposed watermarking method is secured by using the chaotic map to blur the authentication code. Hence, intruder is impossible to generate correct authentication code even if they know the initial parameter of the chaotic map because it has random-like behavior.


Two-layer fragile watermarking method secured with chaotic map for authentication of digital Holy Quran.

Khalil MS, Kurniawan F, Khan MK, Alginahi YM - ScientificWorldJournal (2014)

Diagram of the proposed embedding method.
© Copyright Policy - open-access
Related In: Results  -  Collection

Show All Figures
getmorefigures.php?uid=PMC4060594&req=5

fig1: Diagram of the proposed embedding method.
Mentions: This section describes the proposed fragile watermarking method. Figure 1 presents the diagram of the proposed embedding process and Figure 2 shows the diagram of the proposed authentication process. The proposed watermarking method is secured by using the chaotic map to blur the authentication code. Hence, intruder is impossible to generate correct authentication code even if they know the initial parameter of the chaotic map because it has random-like behavior.

Bottom Line: Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain.The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark.A chaotic map is utilized to blur the watermark to make it secure against the local attack.

View Article: PubMed Central - PubMed

Affiliation: Center of Excellence Information Assurance, King Saud University, P.O. Box 92144, Riyadh 11653, Saudi Arabia ; IT Research Center for the Holy Quran and Its Sciences (NOOR), Taibah University, Madinah 41477, Saudi Arabia.

ABSTRACT
This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small.

Show MeSH