Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014 (2014), Article ID 803983, 29 pages
Research Article

Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran

1Center of Excellence Information Assurance, King Saud University, P.O. Box 92144, Riyadh 11653, Saudi Arabia
2IT Research Center for the Holy Quran and Its Sciences (NOOR), Taibah University, Madinah 41477, Saudi Arabia
3Department of Computer Science, College of Computer Science and Engineering, Taibah University, Madinah 41477, Saudi Arabia

Received 31 October 2013; Accepted 20 February 2014; Published 29 May 2014

Academic Editors: J.-H. Park and Y. Pan

Copyright © 2014 Mohammed S. Khalil et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Citations to this Article [5 citations]

The following is the list of published articles that have cited the current article.

  • Mandal, and Ghosal, “Binomial transform based fragile watermarking for image authentication,” Journal of Information Security and Applications, vol. 19, no. 4-5, pp. 272–281, 2014. View at Publisher · View at Google Scholar
  • Nilanjan Dey, Soumyo Bose, Achintya Das, Sheli Sinha Chaudhuri, Luca Saba, Shoaib Shafique, Andrew Nicolaides, and Jasjit S. Suri, “Effect of Watermarking on Diagnostic Preservation of Atherosclerotic Ultrasound Video in Stroke Telemedicine,” Journal Of Medical Systems, vol. 40, no. 4, 2016. View at Publisher · View at Google Scholar
  • Saqib Hakak, Amirrudin Kamsin, Omar Tayan, Mohd Yamani Idna Idris, and Gulshan Amin Gilkar, “Approaches for preserving content integrity of sensitive online Arabic content: A survey and research challenges,” Information Processing & Management, 2017. View at Publisher · View at Google Scholar
  • Archana Tiwari, and Manisha Sharma, “Novel watermarking scheme for image authentication using vector quantization approach,” Radioelectronics and Communications Systems, vol. 60, no. 4, pp. 161–172, 2017. View at Publisher · View at Google Scholar
  • Mishal Almazrooie, Azman Samsudin, Adnan Abdul-Aziz Gutub, Muhammad Syukri Salleh, Mohd Adib Omar, and Shahir Akram Hassan, “Integrity verification for digital Holy Quran verses using cryptographic hash function and compression,” Journal of King Saud University - Computer and Information Sciences, 2018. View at Publisher · View at Google Scholar