Authentication and Tamper Detection of Digital Holy Quran Images
This paper introduces a novel fragile watermarking method for digital Quran image authentication and tamper identification. The presented scheme utilizes discrete wavelet transform (DWT) and can locate the pixels of malicious tampering if present. The wavelet coefficients are considered for embeddin...
Saved in:
Published in | 2013 International Symposium on Biometrics and Security Technologies pp. 291 - 296 |
---|---|
Main Authors | , , , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
01.07.2013
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | This paper introduces a novel fragile watermarking method for digital Quran image authentication and tamper identification. The presented scheme utilizes discrete wavelet transform (DWT) and can locate the pixels of malicious tampering if present. The wavelet coefficients are considered for embedding authentication code that are encrypted with a secret key, ensuring high security. The authentication binary code is embedded in a block of wavelet coefficients. The experimental results show that the proposed method can retain the image quality after watermarking process with minimum watermark payload and can achieve promising tampering detection. The watermark is secure against local attacks because it is encrypted using secret key. We have also performed experiments to exhibit the fragility of the watermark against known attacks. |
---|---|
AbstractList | This paper introduces a novel fragile watermarking method for digital Quran image authentication and tamper identification. The presented scheme utilizes discrete wavelet transform (DWT) and can locate the pixels of malicious tampering if present. The wavelet coefficients are considered for embedding authentication code that are encrypted with a secret key, ensuring high security. The authentication binary code is embedded in a block of wavelet coefficients. The experimental results show that the proposed method can retain the image quality after watermarking process with minimum watermark payload and can achieve promising tampering detection. The watermark is secure against local attacks because it is encrypted using secret key. We have also performed experiments to exhibit the fragility of the watermark against known attacks. |
Author | Kurniawan, Fajri Alginahi, Yasser M. Khalil, Mohammed S. Khan, Muhammad Khurram |
Author_xml | – sequence: 1 givenname: Fajri surname: Kurniawan fullname: Kurniawan, Fajri email: fkurniawan.c@ksu.edu.sa organization: Center of Excellence Inf. Assurance, King Saud Univ., Riyadh, Saudi Arabia – sequence: 2 givenname: Mohammed S. surname: Khalil fullname: Khalil, Mohammed S. email: sayimkhalil@gmail.com organization: Center of Excellence Inf. Assurance, King Saud Univ., Riyadh, Saudi Arabia – sequence: 3 givenname: Muhammad Khurram surname: Khan fullname: Khan, Muhammad Khurram email: mkhurram@ksu.edu.sa organization: Center of Excellence Inf. Assurance, King Saud Univ., Riyadh, Saudi Arabia – sequence: 4 givenname: Yasser M. surname: Alginahi fullname: Alginahi, Yasser M. email: yginahi@taibahu.edu.sa organization: IT Res. Center for the Holy Quran, Taibah Univ., Madinah, Saudi Arabia |
BookMark | eNotjLFOwzAUAI0EA5SuLCz-gYRnG9vxRmgpjVQJoWavnJfnYil1qtQd-vcgYDrdDXfHrtOYiLEHAaUQ4J6a7Wu9bUsJQpVaXLG5sxVY47QGAfaWvdTn_EUpR_Q5jon71PPWH4408SVlwt84Br6M-5j9wNfjcOGf58kn3hz8nk737Cb44UTzf85Yu3prF-ti8_HeLOpNgVJCLmSPlaHOd7KyTndkbHCqN5J-DMgaRAqAhCCeDQpnPQoVTNWjqQKpoGbs8W8biWh3nOLBT5ed0c5a0OobI-ZGSw |
CODEN | IEEPAD |
CitedBy_id | crossref_primary_10_1109_ACCESS_2017_2682109 crossref_primary_10_1007_s13369_017_2415_4 crossref_primary_10_1371_journal_pone_0198284 crossref_primary_10_1016_j_ijleo_2019_04_074 |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/ISBAST.2013.51 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Xplore IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE/IET Electronic Library url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9780769550107 1467353140 9781467353144 076955010X |
EndPage | 296 |
ExternalDocumentID | 6597705 |
Genre | orig-research |
GroupedDBID | 6IE 6IL CBEJK RIE RIL |
ID | FETCH-LOGICAL-c220t-2dc86ebab28795be67f93d62e7950e76ccef0cec0146c197ac13f68dc68fe3f3 |
IEDL.DBID | RIE |
IngestDate | Thu Jun 29 18:36:33 EDT 2023 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c220t-2dc86ebab28795be67f93d62e7950e76ccef0cec0146c197ac13f68dc68fe3f3 |
PageCount | 6 |
ParticipantIDs | ieee_primary_6597705 |
PublicationCentury | 2000 |
PublicationDate | 2013-July |
PublicationDateYYYYMMDD | 2013-07-01 |
PublicationDate_xml | – month: 07 year: 2013 text: 2013-July |
PublicationDecade | 2010 |
PublicationTitle | 2013 International Symposium on Biometrics and Security Technologies |
PublicationTitleAbbrev | isbast |
PublicationYear | 2013 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
Score | 1.6288376 |
Snippet | This paper introduces a novel fragile watermarking method for digital Quran image authentication and tamper identification. The presented scheme utilizes... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 291 |
SubjectTerms | Authentication Fragile watermarking Holy Quran Image coding PSNR Tamper detection Transform coding Watermarking Wavelet coefficients Wavelet domain |
Title | Authentication and Tamper Detection of Digital Holy Quran Images |
URI | https://ieeexplore.ieee.org/document/6597705 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8MgGCVzJ09qNuPvcPBouxY6KDd_zGUzmdGsJrst9OuHMbrWzPagf73QzmmMB29AQoCQ8ODjfe8RcipRpiKLIg-MZl7Utw8UC8Kxp_vGorO2dwzlEoUnt2L0EN3M-rMWOVvnwiBiTT5D3xXrv_ysgMqFynrCiaU5wdINqVSTq7XSYQwD1RtPLy-miWNrcd_9O_5wS6nBYrhFJl_DNByRZ78qUx8-fikw_nce26T7nZZH79aAs0NamHfIuQtyOcpPE3ujOs9oou1leEkHWNZEq5wWhg6eHp0_CB0VL-_0vrIQRccLe5i8dUkyvE6uRt7KFsEDxoLSYxnEAlOdMmcUnqKQRvFMMLS1AKUAQBMAgpOFgVBJDSE3Is5AxAa54buknRc57hEahkohR2lspwhT-_LiKuBMxiGAihXbJx23-PlrI3wxX6374O_mQ7LJaq8Ix2U9Iu1yWeGxRewyPam36hMFjJhk |
link.rule.ids | 310,311,783,787,792,793,799,27939,55088 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwELUqGGAC1CK-8cBI0sROnHjjo1QptBWoQepWJc4ZISBBJRng1-NLSkGIgc22ZNlWpLzz-d17hJwEEKQi8zxL6YRZnm8uKAaEQyvxtUHnxMQYEguFR2MR3XvXU3_aIqfLWhgAqMlnYGOzfsvPClVhqqwrUCwNBUtXfYwrmmqthRKj68juYHJxPomRr8VtfHn84ZdSw0V_g4y-FmpYIk92Vaa2-vilwfjfnWySzndhHr1dQs4WaUHeJmeY5kLST5N9o0me0Tgx4fCc9qCsqVY5LTTtPT6gQwiNiud3elcZkKKDF_M7eeuQuH8VX0bWwhjBUow5pcUyFQpIk5ShVXgKItCSZ4KB6TkQCKVAOwoUCsMoVwaJcrkWYaZEqIFrvk1W8iKHHUJdV0rgEGgzyYPU3L24dDgLQlcpGUq2S9p4-NlrI30xW5x77-_hY7IWxaPhbDgY3-yTdVY7RyCz9YCslPMKDg1-l-lR_dk-ATDMm7E |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2013+International+Symposium+on+Biometrics+and+Security+Technologies&rft.atitle=Authentication+and+Tamper+Detection+of+Digital+Holy+Quran+Images&rft.au=Kurniawan%2C+Fajri&rft.au=Khalil%2C+Mohammed+S.&rft.au=Khan%2C+Muhammad+Khurram&rft.au=Alginahi%2C+Yasser+M.&rft.date=2013-07-01&rft.pub=IEEE&rft.spage=291&rft.epage=296&rft_id=info:doi/10.1109%2FISBAST.2013.51&rft.externalDocID=6597705 |