Authentication and Tamper Detection of Digital Holy Quran Images

This paper introduces a novel fragile watermarking method for digital Quran image authentication and tamper identification. The presented scheme utilizes discrete wavelet transform (DWT) and can locate the pixels of malicious tampering if present. The wavelet coefficients are considered for embeddin...

Full description

Saved in:
Bibliographic Details
Published in2013 International Symposium on Biometrics and Security Technologies pp. 291 - 296
Main Authors Kurniawan, Fajri, Khalil, Mohammed S., Khan, Muhammad Khurram, Alginahi, Yasser M.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.07.2013
Subjects
Online AccessGet full text

Cover

Loading…
Abstract This paper introduces a novel fragile watermarking method for digital Quran image authentication and tamper identification. The presented scheme utilizes discrete wavelet transform (DWT) and can locate the pixels of malicious tampering if present. The wavelet coefficients are considered for embedding authentication code that are encrypted with a secret key, ensuring high security. The authentication binary code is embedded in a block of wavelet coefficients. The experimental results show that the proposed method can retain the image quality after watermarking process with minimum watermark payload and can achieve promising tampering detection. The watermark is secure against local attacks because it is encrypted using secret key. We have also performed experiments to exhibit the fragility of the watermark against known attacks.
AbstractList This paper introduces a novel fragile watermarking method for digital Quran image authentication and tamper identification. The presented scheme utilizes discrete wavelet transform (DWT) and can locate the pixels of malicious tampering if present. The wavelet coefficients are considered for embedding authentication code that are encrypted with a secret key, ensuring high security. The authentication binary code is embedded in a block of wavelet coefficients. The experimental results show that the proposed method can retain the image quality after watermarking process with minimum watermark payload and can achieve promising tampering detection. The watermark is secure against local attacks because it is encrypted using secret key. We have also performed experiments to exhibit the fragility of the watermark against known attacks.
Author Kurniawan, Fajri
Alginahi, Yasser M.
Khalil, Mohammed S.
Khan, Muhammad Khurram
Author_xml – sequence: 1
  givenname: Fajri
  surname: Kurniawan
  fullname: Kurniawan, Fajri
  email: fkurniawan.c@ksu.edu.sa
  organization: Center of Excellence Inf. Assurance, King Saud Univ., Riyadh, Saudi Arabia
– sequence: 2
  givenname: Mohammed S.
  surname: Khalil
  fullname: Khalil, Mohammed S.
  email: sayimkhalil@gmail.com
  organization: Center of Excellence Inf. Assurance, King Saud Univ., Riyadh, Saudi Arabia
– sequence: 3
  givenname: Muhammad Khurram
  surname: Khan
  fullname: Khan, Muhammad Khurram
  email: mkhurram@ksu.edu.sa
  organization: Center of Excellence Inf. Assurance, King Saud Univ., Riyadh, Saudi Arabia
– sequence: 4
  givenname: Yasser M.
  surname: Alginahi
  fullname: Alginahi, Yasser M.
  email: yginahi@taibahu.edu.sa
  organization: IT Res. Center for the Holy Quran, Taibah Univ., Madinah, Saudi Arabia
BookMark eNotjLFOwzAUAI0EA5SuLCz-gYRnG9vxRmgpjVQJoWavnJfnYil1qtQd-vcgYDrdDXfHrtOYiLEHAaUQ4J6a7Wu9bUsJQpVaXLG5sxVY47QGAfaWvdTn_EUpR_Q5jon71PPWH4408SVlwt84Br6M-5j9wNfjcOGf58kn3hz8nk737Cb44UTzf85Yu3prF-ti8_HeLOpNgVJCLmSPlaHOd7KyTndkbHCqN5J-DMgaRAqAhCCeDQpnPQoVTNWjqQKpoGbs8W8biWh3nOLBT5ed0c5a0OobI-ZGSw
CODEN IEEPAD
CitedBy_id crossref_primary_10_1109_ACCESS_2017_2682109
crossref_primary_10_1007_s13369_017_2415_4
crossref_primary_10_1371_journal_pone_0198284
crossref_primary_10_1016_j_ijleo_2019_04_074
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ISBAST.2013.51
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Xplore
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE/IET Electronic Library
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9780769550107
1467353140
9781467353144
076955010X
EndPage 296
ExternalDocumentID 6597705
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-c220t-2dc86ebab28795be67f93d62e7950e76ccef0cec0146c197ac13f68dc68fe3f3
IEDL.DBID RIE
IngestDate Thu Jun 29 18:36:33 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c220t-2dc86ebab28795be67f93d62e7950e76ccef0cec0146c197ac13f68dc68fe3f3
PageCount 6
ParticipantIDs ieee_primary_6597705
PublicationCentury 2000
PublicationDate 2013-July
PublicationDateYYYYMMDD 2013-07-01
PublicationDate_xml – month: 07
  year: 2013
  text: 2013-July
PublicationDecade 2010
PublicationTitle 2013 International Symposium on Biometrics and Security Technologies
PublicationTitleAbbrev isbast
PublicationYear 2013
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.6288376
Snippet This paper introduces a novel fragile watermarking method for digital Quran image authentication and tamper identification. The presented scheme utilizes...
SourceID ieee
SourceType Publisher
StartPage 291
SubjectTerms Authentication
Fragile watermarking
Holy Quran
Image coding
PSNR
Tamper detection
Transform coding
Watermarking
Wavelet coefficients
Wavelet domain
Title Authentication and Tamper Detection of Digital Holy Quran Images
URI https://ieeexplore.ieee.org/document/6597705
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3PT8MgGCVzJ09qNuPvcPBouxY6KDd_zGUzmdGsJrst9OuHMbrWzPagf73QzmmMB29AQoCQ8ODjfe8RcipRpiKLIg-MZl7Utw8UC8Kxp_vGorO2dwzlEoUnt2L0EN3M-rMWOVvnwiBiTT5D3xXrv_ysgMqFynrCiaU5wdINqVSTq7XSYQwD1RtPLy-miWNrcd_9O_5wS6nBYrhFJl_DNByRZ78qUx8-fikw_nce26T7nZZH79aAs0NamHfIuQtyOcpPE3ujOs9oou1leEkHWNZEq5wWhg6eHp0_CB0VL-_0vrIQRccLe5i8dUkyvE6uRt7KFsEDxoLSYxnEAlOdMmcUnqKQRvFMMLS1AKUAQBMAgpOFgVBJDSE3Is5AxAa54buknRc57hEahkohR2lspwhT-_LiKuBMxiGAihXbJx23-PlrI3wxX6374O_mQ7LJaq8Ix2U9Iu1yWeGxRewyPam36hMFjJhk
link.rule.ids 310,311,783,787,792,793,799,27939,55088
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV09T8MwELUqGGAC1CK-8cBI0sROnHjjo1QptBWoQepWJc4ZISBBJRng1-NLSkGIgc22ZNlWpLzz-d17hJwEEKQi8zxL6YRZnm8uKAaEQyvxtUHnxMQYEguFR2MR3XvXU3_aIqfLWhgAqMlnYGOzfsvPClVhqqwrUCwNBUtXfYwrmmqthRKj68juYHJxPomRr8VtfHn84ZdSw0V_g4y-FmpYIk92Vaa2-vilwfjfnWySzndhHr1dQs4WaUHeJmeY5kLST5N9o0me0Tgx4fCc9qCsqVY5LTTtPT6gQwiNiud3elcZkKKDF_M7eeuQuH8VX0bWwhjBUow5pcUyFQpIk5ShVXgKItCSZ4KB6TkQCKVAOwoUCsMoVwaJcrkWYaZEqIFrvk1W8iKHHUJdV0rgEGgzyYPU3L24dDgLQlcpGUq2S9p4-NlrI30xW5x77-_hY7IWxaPhbDgY3-yTdVY7RyCz9YCslPMKDg1-l-lR_dk-ATDMm7E
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2013+International+Symposium+on+Biometrics+and+Security+Technologies&rft.atitle=Authentication+and+Tamper+Detection+of+Digital+Holy+Quran+Images&rft.au=Kurniawan%2C+Fajri&rft.au=Khalil%2C+Mohammed+S.&rft.au=Khan%2C+Muhammad+Khurram&rft.au=Alginahi%2C+Yasser+M.&rft.date=2013-07-01&rft.pub=IEEE&rft.spage=291&rft.epage=296&rft_id=info:doi/10.1109%2FISBAST.2013.51&rft.externalDocID=6597705