Limits...
Two-layer fragile watermarking method secured with chaotic map for authentication of digital Holy Quran.

Khalil MS, Kurniawan F, Khan MK, Alginahi YM - ScientificWorldJournal (2014)

Bottom Line: Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain.The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark.A chaotic map is utilized to blur the watermark to make it secure against the local attack.

View Article: PubMed Central - PubMed

Affiliation: Center of Excellence Information Assurance, King Saud University, P.O. Box 92144, Riyadh 11653, Saudi Arabia ; IT Research Center for the Holy Quran and Its Sciences (NOOR), Taibah University, Madinah 41477, Saudi Arabia.

ABSTRACT
This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small.

Show MeSH

Related in: MedlinePlus

Image quality metrics on Gaussian blurring attack.
© Copyright Policy - open-access
Related In: Results  -  Collection


getmorefigures.php?uid=PMC4060594&req=5

fig8: Image quality metrics on Gaussian blurring attack.

Mentions: The Gaussian filter is applied on the watermarked image, and the fragility is measured. The filter is blurring the Quran image that makes some verses unreadable or vague. Table 10 shows the image quality measurement to indicate the image quality after attack and Table 11 reports that the BER results indicated how fragile the proposed method is. As expected, changes in the magnitude of gradient vectors due to Gaussian filter can be detected properly. Hence, the proposed method is fragile to blurring attack. Blurring attack has decreased the image quality as reported in Figure 8, the PSNR result and other metrics shows obtain lower values compare with metrics' values before apply blurring attack. BER for both datasets are shown in Figure 9 and finest fragility can be achieved only after n ≥ 8.


Two-layer fragile watermarking method secured with chaotic map for authentication of digital Holy Quran.

Khalil MS, Kurniawan F, Khan MK, Alginahi YM - ScientificWorldJournal (2014)

Image quality metrics on Gaussian blurring attack.
© Copyright Policy - open-access
Related In: Results  -  Collection

Show All Figures
getmorefigures.php?uid=PMC4060594&req=5

fig8: Image quality metrics on Gaussian blurring attack.
Mentions: The Gaussian filter is applied on the watermarked image, and the fragility is measured. The filter is blurring the Quran image that makes some verses unreadable or vague. Table 10 shows the image quality measurement to indicate the image quality after attack and Table 11 reports that the BER results indicated how fragile the proposed method is. As expected, changes in the magnitude of gradient vectors due to Gaussian filter can be detected properly. Hence, the proposed method is fragile to blurring attack. Blurring attack has decreased the image quality as reported in Figure 8, the PSNR result and other metrics shows obtain lower values compare with metrics' values before apply blurring attack. BER for both datasets are shown in Figure 9 and finest fragility can be achieved only after n ≥ 8.

Bottom Line: Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain.The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark.A chaotic map is utilized to blur the watermark to make it secure against the local attack.

View Article: PubMed Central - PubMed

Affiliation: Center of Excellence Information Assurance, King Saud University, P.O. Box 92144, Riyadh 11653, Saudi Arabia ; IT Research Center for the Holy Quran and Its Sciences (NOOR), Taibah University, Madinah 41477, Saudi Arabia.

ABSTRACT
This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small.

Show MeSH
Related in: MedlinePlus