Limits...
Two-layer fragile watermarking method secured with chaotic map for authentication of digital Holy Quran.

Khalil MS, Kurniawan F, Khan MK, Alginahi YM - ScientificWorldJournal (2014)

Bottom Line: Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain.The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark.A chaotic map is utilized to blur the watermark to make it secure against the local attack.

View Article: PubMed Central - PubMed

Affiliation: Center of Excellence Information Assurance, King Saud University, P.O. Box 92144, Riyadh 11653, Saudi Arabia ; IT Research Center for the Holy Quran and Its Sciences (NOOR), Taibah University, Madinah 41477, Saudi Arabia.

ABSTRACT
This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small.

Show MeSH
Bit error rate result against median filtering attack.
© Copyright Policy - open-access
Related In: Results  -  Collection


getmorefigures.php?uid=PMC4060594&req=5

fig13: Bit error rate result against median filtering attack.

Mentions: The succeeding considered attack is median filtering attack. Such attack is known as nonlinear attack and alters the gradient vector of image much more than Gaussian filter. The median filter does not change the edge points unlike Gaussian filter. The PSNR and the BER results of proposed method under median filtering attacks are presented in Tables 14 and 15, respectively. As mentioned before, the median filters are executed with 3 × 3 window. The result demonstrates that tamper localization after a median filtering attack is very efficient in both dataset A and dataset B. This attack degrades the image quality more than previous attacks as presented in Figure 12. The proposed method can attain acceptable fragility only after n ≥ 8 for both datasets as depicted in Figure 13.


Two-layer fragile watermarking method secured with chaotic map for authentication of digital Holy Quran.

Khalil MS, Kurniawan F, Khan MK, Alginahi YM - ScientificWorldJournal (2014)

Bit error rate result against median filtering attack.
© Copyright Policy - open-access
Related In: Results  -  Collection

Show All Figures
getmorefigures.php?uid=PMC4060594&req=5

fig13: Bit error rate result against median filtering attack.
Mentions: The succeeding considered attack is median filtering attack. Such attack is known as nonlinear attack and alters the gradient vector of image much more than Gaussian filter. The median filter does not change the edge points unlike Gaussian filter. The PSNR and the BER results of proposed method under median filtering attacks are presented in Tables 14 and 15, respectively. As mentioned before, the median filters are executed with 3 × 3 window. The result demonstrates that tamper localization after a median filtering attack is very efficient in both dataset A and dataset B. This attack degrades the image quality more than previous attacks as presented in Figure 12. The proposed method can attain acceptable fragility only after n ≥ 8 for both datasets as depicted in Figure 13.

Bottom Line: Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain.The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark.A chaotic map is utilized to blur the watermark to make it secure against the local attack.

View Article: PubMed Central - PubMed

Affiliation: Center of Excellence Information Assurance, King Saud University, P.O. Box 92144, Riyadh 11653, Saudi Arabia ; IT Research Center for the Holy Quran and Its Sciences (NOOR), Taibah University, Madinah 41477, Saudi Arabia.

ABSTRACT
This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small.

Show MeSH