Research Article
Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran
Table 4
Six image manipulations applied on datasets.
| Number | Image manipulation | Parameter | JPEG | PNG |
| 1 | Pixel manipulation | Window size | ✓ | ✓ | 2 | Blurring | Gaussian filter, sigma = 0.5 | ✓ | ✓ | 3 | Noise |
Gaussian noise, 150 blocks, block size , mean = 0.4, variance = 0.01 | ✓ | ✓ | 4 | Median filtering |
Filter size | ✓ | ✓ | 5 | Replacement/collage | — | ✓ | ✓ | 6 | JPEG compression | Quality factor | ✓ | ✗ |
|
|