Research Article
Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran
Table 13
Bit error rates result on Gaussian noise attack.
| # | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 |
| 001 | 96 | 96.5 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 003 | 83 | 95.6 | 98.3 | 99.8 | 99.8 | 100 | 99.8 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 050 | 83 | 94.3 | 95.6 | 97 | 99.5 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 601 | 91 | 94.3 | 97.5 | 94.3 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 001 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 003 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 050 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 601 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 | 100 |
|
|