Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 803983, 29 pages
http://dx.doi.org/10.1155/2014/803983
Research Article

Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran

1Center of Excellence Information Assurance, King Saud University, P.O. Box 92144, Riyadh 11653, Saudi Arabia
2IT Research Center for the Holy Quran and Its Sciences (NOOR), Taibah University, Madinah 41477, Saudi Arabia
3Department of Computer Science, College of Computer Science and Engineering, Taibah University, Madinah 41477, Saudi Arabia

Received 31 October 2013; Accepted 20 February 2014; Published 29 May 2014

Academic Editors: J.-H. Park and Y. Pan

Copyright © 2014 Mohammed S. Khalil et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [10 citations]

The following is the list of published articles that have cited the current article.

  • Mandal, and Ghosal, “Binomial transform based fragile watermarking for image authentication,” Journal of Information Security and Applications, vol. 19, no. 4-5, pp. 272–281, 2014. View at Publisher · View at Google Scholar
  • Fajri Kurniawan, Mohammed S. Khalil, Muhammad Khurram Khan, and Yasser M. Alginahi, “DWTru based fragile watermarking method for digital Quran images,” Proceedings - 2014 International Symposium on Biometrics and Security Technologies, ISBAST 2014, pp. 290–297, 2015. View at Publisher · View at Google Scholar
  • Chinmay Vyas, and Munindra Lunagaria, “A review on methods for image authentication and visual cryptography in digital image watermarking,” 2014 IEEE International Conference on Computational Intelligence and Computing Research, IEEE ICCIC 2014, pp. 3497–3506, 2015. View at Publisher · View at Google Scholar
  • Nilanjan Dey, Soumyo Bose, Achintya Das, Sheli Sinha Chaudhuri, Luca Saba, Shoaib Shafique, Andrew Nicolaides, and Jasjit S. Suri, “Effect of Watermarking on Diagnostic Preservation of Atherosclerotic Ultrasound Video in Stroke Telemedicine,” Journal Of Medical Systems, vol. 40, no. 4, 2016. View at Publisher · View at Google Scholar
  • Saqib Hakak, Amirrudin Kamsin, Omar Tayan, Mohd Yamani Idna Idris, and Gulshan Amin Gilkar, “Approaches for preserving content integrity of sensitive online Arabic content: A survey and research challenges,” Information Processing & Management, 2017. View at Publisher · View at Google Scholar
  • Archana Tiwari, and Manisha Sharma, “An Efficient Vector Quantization Based Watermarking Method for Image Integrity Authentication,” Progress in Intelligent Computing Techniques: Theory, Practice, and Applications, vol. 519, pp. 215–225, 2017. View at Publisher · View at Google Scholar
  • Archana Tiwari, and Manisha Sharma, “Novel watermarking scheme for image authentication using vector quantization approach,” Radioelectronics and Communications Systems, vol. 60, no. 4, pp. 161–172, 2017. View at Publisher · View at Google Scholar
  • Muhammad Khurram Khan, Zeeshan Siddiqui, and Omar Tayan, “A secure framework for digital Quran certification,” 2017 IEEE International Conference on Consumer Electronics, ICCE 2017, pp. 59–60, 2017. View at Publisher · View at Google Scholar
  • Saqib Hakak, Amirrudin Kamsin, Shivakumara Palaiahnakote, Omar Tayan, Mohd. Yamani Idna Idris, and Khir Zuhaili Abukhir, “Residual-based approach for authenticating pattern of multi-style diacritical Arabic texts,” Plos One, vol. 13, no. 6, pp. e0198284, 2018. View at Publisher · View at Google Scholar
  • Mishal Almazrooie, Azman Samsudin, Adnan Abdul-Aziz Gutub, Muhammad Syukri Salleh, Mohd Adib Omar, and Shahir Akram Hassan, “Integrity verification for digital Holy Quran verses using cryptographic hash function and compression,” Journal of King Saud University - Computer and Information Sciences, 2018. View at Publisher · View at Google Scholar