Research Article

Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran

Figure 8

Image quality metrics on Gaussian blurring attack.
803983.fig.008a
803983.fig.008b
803983.fig.008c
803983.fig.008d
803983.fig.008e
803983.fig.008f
803983.fig.008g
803983.fig.008h
803983.fig.008i
803983.fig.008j
803983.fig.008k
803983.fig.008l
803983.fig.008m
803983.fig.008n