Table of Contents Author Guidelines Submit a Manuscript
The Scientific World Journal
Volume 2014, Article ID 803983, 29 pages
http://dx.doi.org/10.1155/2014/803983
Research Article

Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran

1Center of Excellence Information Assurance, King Saud University, P.O. Box 92144, Riyadh 11653, Saudi Arabia
2IT Research Center for the Holy Quran and Its Sciences (NOOR), Taibah University, Madinah 41477, Saudi Arabia
3Department of Computer Science, College of Computer Science and Engineering, Taibah University, Madinah 41477, Saudi Arabia

Received 31 October 2013; Accepted 20 February 2014; Published 29 May 2014

Academic Editors: J.-H. Park and Y. Pan

Copyright © 2014 Mohammed S. Khalil et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. http://greyfalcon.us/restored/Himmler%20fake.htm.
  2. A. Tefas and I. Pitas, “Image authentication using chaotic mixing systems,” in Proceedings of the IEEE 2000 Internaitonal Symposium on Circuits and Systems, vol. 1, pp. 216–219, Geneva, Switzerland, May 2000. View at Scopus
  3. C. K. Ho and C.-T. Li, “Semi-fragile watermarking scheme for authentication of JPEG images,” in Proceedings of the International Conference on Information Technology: Coding Computing (ITCC '04), pp. 7–11, Las Vegas, Nev, USA, April 2004. View at Scopus
  4. I. Cox, M. Miller, and B. Jeffrey, Digital Watermarking: Principles and Practice, Morgan Kaufmann, 2002.
  5. P. S. L. M. Barreto, H. Y. Kim, and V. Rijmen, “Toward secure public-key blockwise fragile authentication watermarking,” IEE Proceedings: Vision, Image and Signal Processing, vol. 149, no. 2, pp. 57–62, 2002. View at Publisher · View at Google Scholar · View at Scopus
  6. P. W. Wong and N. Memon, “Secret and public key authentication watermarking schemes that resist vector quantization attack,” in Security and Watermarking of Multimedia Contents II, vol. 3971 of Proceedings of SPIE, pp. 417–427, January 2000. View at Scopus
  7. M. Holliman and N. Memon, “Counterfeiting attacks on oblivious block-wise independent invisible watermarking schemes,” IEEE Transactions on Image Processing, vol. 9, no. 3, pp. 432–441, 2000. View at Publisher · View at Google Scholar · View at Scopus
  8. J. Fridrich, M. Goljan, and N. Memon, “Further attacks on Yeung-Mintzer fragile watermarking scheme,” in Security and Watermarking of Multimedia Contents II, vol. 3971 of Proceedings of SPIE, pp. 428–437, San Jose, Calif, USA, January 2000. View at Scopus
  9. N. Memon, S. Shende, and P. W. Wong, “On the security of the Yeung-Mintzer authentication watermark,” in Proceedings of the IS & T PICS Symposium, pp. 301–306, Savannah, Ga, USA, March 1999. View at Scopus
  10. “Google Play,” https://play.google.com/store.
  11. H. Nyeem, W. Boles, and C. Boyd, “Counterfeiting attacks on block-wise dependent fragile watermarking schemes,” in Proceedings of the 6th International Conference on Security of Information and Networks, Aksaray, Turkey, 2013.
  12. S. Suthaharan, “Fragile image watermarking using a gradient image for improved localization and security,” Pattern Recognition Letters, vol. 25, no. 16, pp. 1893–1903, 2004. View at Publisher · View at Google Scholar · View at Scopus
  13. C.-C. Chang, P.-Y. Lin, and J.-C. Chuang, “Fragile watermarking scheme for digital image authentication using pixel difference,” Imaging Science Journal, vol. 55, no. 3, pp. 140–147, 2007. View at Publisher · View at Google Scholar · View at Scopus
  14. R. O. Preda, “Semi-fragile watermarking for image authentication with sensitive tamper localization in the wavelet domain,” Measurement, vol. 46, pp. 367–373, 2013. View at Google Scholar
  15. C. Fei, D. Kundur, and R. H. Kwong, “Analysis and design of secure watermark-based authentication systems,” IEEE Transactions on Information Forensics and Security, vol. 1, no. 1, pp. 43–55, 2006. View at Publisher · View at Google Scholar · View at Scopus
  16. C.-S. Chan and C.-C. Chang, “An efficient image authentication method based on Hamming code,” Pattern Recognition, vol. 40, no. 2, pp. 681–690, 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. P.-Y. Lin, J.-S. Lee, and C.-C. Chang, “Protecting the content integrity of digital imagery with fidelity preservation,” ACM Transactions on Multimedia Computing, Communications and Applications, vol. 7, no. 3, article 15, 20 pages, 2011. View at Publisher · View at Google Scholar · View at Scopus
  18. P. Tsai, Y.-C. Hu, and C.-C. Chang, “Using set partitioning in hierarchical trees to authenticate digital images,” Signal Processing: Image Communication, vol. 18, no. 9, pp. 813–822, 2003. View at Publisher · View at Google Scholar · View at Scopus
  19. C.-C. Lin and W.-H. Tsai, “Secret image sharing with steganography and authentication,” Journal of Systems and Software, vol. 73, no. 3, pp. 405–414, 2004. View at Publisher · View at Google Scholar · View at Scopus
  20. C.-S. Lu and H.-Y. M. Liao, “Structural digital signature for image authentication: an incidental distortion resistant scheme,” IEEE Transactions on Multimedia, vol. 5, no. 2, pp. 161–173, 2003. View at Publisher · View at Google Scholar · View at Scopus
  21. R. C.-W. Phan, “Tampering with a watermarking-based image authentication scheme,” Pattern Recognition, vol. 41, no. 11, pp. 3493–3496, 2008. View at Publisher · View at Google Scholar · View at Scopus
  22. C. Rey and J.-L. Dugelay, “A survey of watermarking algorithms for image authentication,” Eurasip Journal on Applied Signal Processing, vol. 2002, no. 6, pp. 613–621, 2002. View at Publisher · View at Google Scholar · View at Scopus
  23. C.-C. Thien and J.-C. Lin, “A simple and high-hiding capacity method for hiding digit-by-digit data in images based on modulus function,” Pattern Recognition, vol. 36, no. 12, pp. 2875–2881, 2003. View at Publisher · View at Google Scholar · View at Scopus
  24. R.-S. Run, S.-J. Horng, W.-H. Lin, T.-W. Kao, P. Fan, and M. K. Khan, “An efficient wavelet-tree-based watermarking method,” Expert Systems with Applications, vol. 38, no. 12, pp. 14357–14366, 2011. View at Publisher · View at Google Scholar · View at Scopus
  25. C.-C. Chang, Y.-S. Hu, and T.-C. Lu, “A watermarking-based image ownership and tampering authentication scheme,” Pattern Recognition Letters, vol. 27, no. 5, pp. 439–446, 2006. View at Publisher · View at Google Scholar · View at Scopus
  26. A. Cheddad, J. Condell, K. Curran, and P. Mc Kevitt, “A secure and improved self-embedding algorithm to combat digital document forgery,” Signal Processing, vol. 89, no. 12, pp. 2324–2332, 2009. View at Publisher · View at Google Scholar · View at Scopus
  27. X. Zhang and S. Wang, “Statistical fragile watermarking capable of locating individual tampered pixels,” IEEE Signal Processing Letters, vol. 14, no. 10, pp. 727–730, 2007. View at Publisher · View at Google Scholar · View at Scopus
  28. X. Zhang and S. Wang, “Fragile watermarking scheme using a hierarchical mechanism,” Signal Processing, vol. 89, no. 4, pp. 675–679, 2009. View at Publisher · View at Google Scholar · View at Scopus
  29. A. Giakoumaki, S. Pavlopoulos, and D. Koutsouris, “Multiple image watermarking applied to health information management,” IEEE Transactions on Information Technology in Biomedicine, vol. 10, no. 4, pp. 722–732, 2006. View at Publisher · View at Google Scholar · View at Scopus
  30. J. K. Mandal and R. Kanji, “Invisible image watermarking using Z transforms, (IIWZT),” Advances in Intelligent Systems and Computing, vol. 177, pp. 797–804, 2013. View at Google Scholar
  31. A. T. S. Ho, X. Zhu, J. Shen, and P. Marziliano, “Fragile watermarking based on encoding of the zeroes of the z-transform,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 3, pp. 567–569, 2008. View at Publisher · View at Google Scholar · View at Scopus
  32. Y.-G. Yang, X. Jia, P. Xu, and J. Tian, “Analysis and improvement of the watermark strategy for quantum images based on quantum Fourier transform,” Quantum Information Processing, vol. 12, no. 8, pp. 2765–2769, 2013. View at Publisher · View at Google Scholar
  33. C. Wang and H. Li, “Application of binary image authentication algorithm in digital watermarking,” in Proceedings of the International Conference on Information Technology and Software Engineering, vol. 212 of Lecture Notes in Electrical Engineering, pp. 887–894, 2012. View at Publisher · View at Google Scholar
  34. Z. H. Li and J. J. Hou, “Semi-fragile water marking technique based on JPEG invariant and chaotic maps,” Computer Engineering and Applications, vol. 43, no. 32, pp. 40–43, 2007 (Chinese). View at Google Scholar
  35. X. Wang, J. Wang, and H. Peng, “A semi-fragile image watermarking resisting to JPEG compression,” in Proceedings of the International Conference on Management of e-Commerce and e-Government (ICMeCG '09), pp. 498–502, September 2009. View at Publisher · View at Google Scholar · View at Scopus
  36. P. W. Wong and N. Memon, “Secret and public key image watermarking schemes for image authentication and ownership verification,” IEEE Transactions on Image Processing, vol. 10, no. 10, pp. 1593–1601, 2001. View at Publisher · View at Google Scholar · View at Scopus
  37. G. Gao, “A blind grayscale watermark algorithm based on chaos and mixed transform domain,” in Proceedings of the 2nd International Conference on Computer and Automation Engineering (ICCAE '10), pp. 658–662, February 2010. View at Publisher · View at Google Scholar · View at Scopus
  38. K.-C. Liu and C.-H. Chou, “Robust and transparent watermarking scheme for colour images,” IET Image Processing, vol. 3, no. 4, pp. 228–242, 2009. View at Publisher · View at Google Scholar · View at Scopus
  39. C. G. Thorat and B. D. Jadhav, “A blind digital watermark technique for color image wavelet transform and SIFT,” Procedia Computer Science, vol. 2, pp. 236–241, 2010. View at Google Scholar
  40. P. W. Wong, “A public key watermark for image verification and authentication,” in Proceedings of the International Conference on Image Processing (ICIP '98), vol. 1, pp. 455–459, Chicago, III, USA, October 1998. View at Scopus
  41. M. Wu and B. Liu, “Watermarking for image authentication,” in Proceedings of the International Conference on Image Processing (ICIP '98), vol. 2, pp. 437–441, Chicago, III, USA, October 1998. View at Scopus
  42. C.-T. Li, D.-C. Lou, and T.-H. Chen, “Image authentication and integrity verification via content-based watermarks and a public key cryptosystem,” in Proceedings of the International Conference on Image Processing (ICIP '00), vol. 3, pp. 694–697, Vancouver, Canada, September 2000. View at Scopus
  43. C.-T. Li and F.-M. Yang, “One-dimensional neighborhood forming strategy for fragile watermarking,” Journal of Electronic Imaging, vol. 12, no. 2, pp. 284–291, 2003. View at Publisher · View at Google Scholar · View at Scopus
  44. C.-T. Li, F.-M. Yang, and C.-S. Lee, “Oblivious fragile watermarking scheme for image authentication,” in Proceedings of the IEEE International Conference on Acoustic, Speech, and Signal Processing, vol. 6, pp. 3445–3448, Orlando, Fla, USA, May 2002. View at Scopus
  45. C.-C. Chang and H. Chou, “A new public-key oblivious fragile watermarking for image authentication using discrete cosine transform,” International Journal of Signal Processing, Image Processing and Pattern, vol. 2, no. 1, pp. 133–140, 2009. View at Google Scholar
  46. D. A. Winne, H. D. Knowles, D. R. Bull, and C. N. Canagarajah, “Digital watermarking in wavelet domain with predistortion for authenticity verification and localization,” in Security and Watermarking of Multimedia Contents IV, vol. 4675 of Proceedings of SPIE, pp. 349–356, San Jose, Calif, USA, January 2002. View at Publisher · View at Google Scholar · View at Scopus
  47. A. Sharifara, M. S. M. Rahim, and M. Bashardoost, “A novel approach to enhance robustness in digital image watermarking using multiple bit-planes of intermediate significant bits,” in International Conference on Informatics and Creative Multimedia (ICICM '13), pp. 22–27, 2013.
  48. L. Xie and G. R. Arce, “A class of authentication digital watermarks for secure multimedia communication,” IEEE Transactions on Image Processing, vol. 10, no. 11, pp. 1754–1764, 2001. View at Publisher · View at Google Scholar · View at Scopus
  49. J. Fridrich, M. Goljan, and R. Du, “Invertible authentication watermark for JPEG images,” in Proceedings of the IEEE International Conference on Information Technology: Coding and Computing, pp. 223–227, Las Vegas, Nev, USA, April 2001.
  50. R. Schmitz, “Use of chaotic dynamical systems in cryptography,” Journal of the Franklin Institute, vol. 338, no. 4, pp. 429–441, 2001. View at Publisher · View at Google Scholar · View at Scopus
  51. C.-C. Chang, K.-N. Chen, C.-F. Lee, and L.-J. Liu, “A secure fragile watermarking scheme based on chaos-and-hamming code,” Journal of Systems and Software, vol. 84, no. 9, pp. 1462–1470, 2011. View at Publisher · View at Google Scholar · View at Scopus
  52. Y.-T. Wu and F. Y. Shih, “Digital watermarking based on chaotic map and reference register,” Pattern Recognition, vol. 40, no. 12, pp. 3753–3763, 2007. View at Publisher · View at Google Scholar · View at Scopus
  53. X. Wu and Z.-H. Guan, “A novel digital watermark algorithm based on chaotic maps,” Physics Letters A, vol. 365, no. 5-6, pp. 403–406, 2007. View at Publisher · View at Google Scholar · View at Scopus
  54. Z. Dawei, C. Guanrong, and L. Wenbo, “A chaos-based robust wavelet-domain watermarking algorithm,” Chaos, Solitons & Fractals, vol. 22, no. 1, pp. 47–54, 2004. View at Publisher · View at Google Scholar · View at Scopus
  55. J. Zhang, T. Lei, and H. M. Tai, “A new watermarking method based on chaotic maps,” in Proceedings of the IEEE International Conference on Multimedia and Expo (ICME '04), Taipei, Taiwan, 2004.
  56. K. K. Muhammad, J. Zhang, and L. Tian, “Protecting biometric data for personal identification,” in Advances in Biometric Person Authentication, vol. 3383 of Lecture Notes in Computer Science, pp. 629–638, Springer, 2004. View at Publisher · View at Google Scholar
  57. Z. Wang, A. C. Bovik, H. R. Sheikh, and E. P. Simoncelli, “Image quality assessment: from error visibility to structural similarity,” IEEE Transactions on Image Processing, vol. 13, no. 4, pp. 600–612, 2004. View at Publisher · View at Google Scholar · View at Scopus
  58. M. K. Khan, J. Zhang, and L. Tian, “Chaotic secure content-based hidden transmission of biometric templates,” Chaos, Solitons & Fractals, vol. 32, no. 5, pp. 1749–1759, 2007. View at Publisher · View at Google Scholar · View at Scopus