Research Article

Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran

Table 4

Six image manipulations applied on datasets.

NumberImage manipulationParameterJPEGPNG

1Pixel manipulationWindow size
2BlurringGaussian filter, sigma = 0.5
3Noise Gaussian noise, 150 blocks, block size , mean = 0.4, variance = 0.01
4Median filtering Filter size
5Replacement/collage
6JPEG compressionQuality factor