Authentication and Tamper Detection of Digital Holy Quran Images

被引:7
|
作者
Kurniawan, Fajri [1 ,2 ]
Khalil, Mohammed S. [1 ,2 ]
Khan, Muhammad Khurram [1 ,2 ]
Alginahi, Yasser M. [2 ,3 ]
机构
[1] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh, Saudi Arabia
[2] Taibah Univ, IT Res Ctr Holy Quran & Sci NOOR, Madinah, Saudi Arabia
[3] Taibah Univ, Coll Comp Sci & Engn, Dept Comp Sci, Madinah, Saudi Arabia
关键词
Holy Quran; Tamper detection; Fragile watermarking; Authentication; FRAGILE WATERMARKING SCHEME; LOCALIZATION;
D O I
10.1109/ISBAST.2013.51
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper introduces a novel fragile watermarking method for digital Quran image authentication and tamper identification. The presented scheme utilizes discrete wavelet transform (DWT) and can locate the pixels of malicious tampering if present. The wavelet coefficients are considered for embedding authentication code that are encrypted with a secret key, ensuring high security. The authentication binary code is embedded in a block of wavelet coefficients. The experimental results show that the proposed method can retain the image quality after watermarking process with minimum watermark payload and can achieve promising tampering detection. The watermark is secure against local attacks because it is encrypted using secret key. We have also performed experiments to exhibit the fragility of the watermark against known attacks.
引用
收藏
页码:291 / 296
页数:6
相关论文
共 50 条
  • [31] Tamper Detection and Recovery on RGB Images
    Macit, Huseyin Bilal
    Koyun, Arif
    ARTIFICIAL INTELLIGENCE AND APPLIED MATHEMATICS IN ENGINEERING PROBLEMS, 2020, 43 : 972 - 981
  • [32] JUSTICE IN THE HOLY QURAN
    Alomar, Abdullah Saleh Abdullah
    JOURNAL OF LAW AND POLITICAL SCIENCES, 2024, 40 (01): : 309 - 333
  • [33] Love in the Holy Quran
    Iqbal, Muzaffar
    JOURNAL OF SHIA ISLAMIC STUDIES, 2012, 5 (03) : 358 - 360
  • [34] Transporting mobile code with internal authentication and tamper detection
    Marvel, LM
    Baur, EH
    Hartwig, GW
    BATTLESPACE DIGITIZATION AND NETWORK-CENTRIC WARFARE, 2001, 4396 : 108 - 115
  • [35] A secure image authentication scheme for tamper detection and recovery
    Chen, T-Y
    Hwang, M-S
    Jan, J-K
    IMAGING SCIENCE JOURNAL, 2012, 60 (04): : 219 - 233
  • [36] Video authentication and tamper detection based on cloud model
    Liang, Chang-yin
    Li, Ang
    Niu, Xia-mu
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 225 - +
  • [37] A comprehensive survey on image authentication for tamper detection with localization
    H R Chennamma
    B Madhushree
    Multimedia Tools and Applications, 2023, 82 : 1873 - 1904
  • [38] A comprehensive survey on image authentication for tamper detection with localization
    Chennamma, H. R.
    Madhushree, B.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (02) : 1873 - 1904
  • [39] A Logistic Map-Based Fragile Watermarking Scheme of Digital Images with Tamper Detection
    Trivedy, Saswati
    Pal, Arup Kumar
    IRANIAN JOURNAL OF SCIENCE AND TECHNOLOGY-TRANSACTIONS OF ELECTRICAL ENGINEERING, 2017, 41 (02) : 103 - 113
  • [40] A Modified Dual watermarking Scheme for digital images with Tamper Localization/detection and recovery Capabilities
    Tashk, Ashkan
    Danyali, Habibollah
    Alavianmehr, Mohammad Ali
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 60 - 65