Limits...
Two-layer fragile watermarking method secured with chaotic map for authentication of digital Holy Quran.

Khalil MS, Kurniawan F, Khan MK, Alginahi YM - ScientificWorldJournal (2014)

Bottom Line: Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain.The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark.A chaotic map is utilized to blur the watermark to make it secure against the local attack.

View Article: PubMed Central - PubMed

Affiliation: Center of Excellence Information Assurance, King Saud University, P.O. Box 92144, Riyadh 11653, Saudi Arabia ; IT Research Center for the Holy Quran and Its Sciences (NOOR), Taibah University, Madinah 41477, Saudi Arabia.

ABSTRACT
This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small.

Show MeSH
Tamper detection on collage attack (page-003.png).
© Copyright Policy - open-access
Related In: Results  -  Collection


getmorefigures.php?uid=PMC4060594&req=5

fig15: Tamper detection on collage attack (page-003.png).

Mentions: The collage attack is one of the security issues on the fragile watermarking method that needs to be concerned. In this regard, the watermarked image is altered by replacing the verse line number 9 with another verse. The pasted versed is taken from watermarked image and hence it has authentication code. Figures 14(i)–14(iv) and 15(i)–15(iv) report the position of the altered region in both datasets as black box. The result demonstrates even with small n value the altered region can be detected but not accurately. The proposed method can localize the collage regions correctly when the parameter n > 4. The NHD metric is utilized to estimate the localization performance by considering the modification between watermarked image and attacked image. The NHD is shown in Figure 16; the values expressing the proposed method can detect the collage attack as long as the n parameter is greater than or equal to 8.


Two-layer fragile watermarking method secured with chaotic map for authentication of digital Holy Quran.

Khalil MS, Kurniawan F, Khan MK, Alginahi YM - ScientificWorldJournal (2014)

Tamper detection on collage attack (page-003.png).
© Copyright Policy - open-access
Related In: Results  -  Collection

Show All Figures
getmorefigures.php?uid=PMC4060594&req=5

fig15: Tamper detection on collage attack (page-003.png).
Mentions: The collage attack is one of the security issues on the fragile watermarking method that needs to be concerned. In this regard, the watermarked image is altered by replacing the verse line number 9 with another verse. The pasted versed is taken from watermarked image and hence it has authentication code. Figures 14(i)–14(iv) and 15(i)–15(iv) report the position of the altered region in both datasets as black box. The result demonstrates even with small n value the altered region can be detected but not accurately. The proposed method can localize the collage regions correctly when the parameter n > 4. The NHD metric is utilized to estimate the localization performance by considering the modification between watermarked image and attacked image. The NHD is shown in Figure 16; the values expressing the proposed method can detect the collage attack as long as the n parameter is greater than or equal to 8.

Bottom Line: Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain.The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark.A chaotic map is utilized to blur the watermark to make it secure against the local attack.

View Article: PubMed Central - PubMed

Affiliation: Center of Excellence Information Assurance, King Saud University, P.O. Box 92144, Riyadh 11653, Saudi Arabia ; IT Research Center for the Holy Quran and Its Sciences (NOOR), Taibah University, Madinah 41477, Saudi Arabia.

ABSTRACT
This paper presents a novel watermarking method to facilitate the authentication and detection of the image forgery on the Quran images. Two layers of embedding scheme on wavelet and spatial domain are introduced to enhance the sensitivity of fragile watermarking and defend the attacks. Discrete wavelet transforms are applied to decompose the host image into wavelet prior to embedding the watermark in the wavelet domain. The watermarked wavelet coefficient is inverted back to spatial domain then the least significant bits is utilized to hide another watermark. A chaotic map is utilized to blur the watermark to make it secure against the local attack. The proposed method allows high watermark payloads, while preserving good image quality. Experiment results confirm that the proposed methods are fragile and have superior tampering detection even though the tampered area is very small.

Show MeSH