Research Article

Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran

Table 12

PSNR results on Gaussian noise attack.

#ā€‰123456789101112131415

JPEG
001Bef.40.7440.1243.0645.0147.6148.9950.6551.2051.8052.0552.1952.2552.2752.2852.30
Aft.40.8040.2542.8744.5346.5947.5948.6448.9749.2949.4249.4949.5249.5349.5449.55
003Bef.42.5041.9344.8646.7549.2750.6951.8452.6953.0052.9953.2453.2753.2753.2953.28
Aft.42.0741.6043.9245.2446.7347.4247.8848.1948.2948.2848.3648.3748.3748.3748.37
050Bef.42.2041.6144.5546.3748.9050.2651.6252.3552.7152.8852.9853.0153.0453.0653.06
Aft.41.8341.3443.6945.0146.5547.2447.8148.0848.2048.2548.2948.3048.3148.3148.31
601Bef.41.9741.2244.1546.1448.6849.9751.5252.1252.4852.7552.8952.9052.9352.9452.95
Aft.41.7041.0643.4744.9646.6147.3048.0148.2548.3948.4848.5348.5448.5548.5548.55

PNG
001Bef.38.7838.0542.9443.9448.1050.0453.8456.0559.6462.3566.3768.8072.3674.0180.24
Aft.28.9528.9628.9228.9228.9128.9128.9128.9028.9028.9028.9028.9028.9028.9028.90
003Bef.38.0237.3941.3043.2247.2049.3552.9555.2958.6961.1765.5268.3570.8173.7578.57
Aft.28.9929.0028.9728.9628.9528.9528.9528.9528.9528.9528.9528.9528.9528.9528.95
050Bef.37.3436.8141.3042.7446.4348.8952.3254.7758.1060.8664.0167.7770.2173.0079.44
Aft.29.0029.0028.9728.9728.9628.9628.9528.9528.9528.9528.9528.9528.9528.9528.95
601Bef.37.1536.5540.3142.6446.3048.5852.1254.4957.7060.6664.1167.7170.9674.7876.58
Aft.29.0229.0328.9928.9928.9828.9828.9828.9728.9728.9728.9728.9728.9728.9728.97