Research Article

Two-Layer Fragile Watermarking Method Secured with Chaotic Map for Authentication of Digital Holy Quran

Table 5

Examples of image manipulations on page-050.png.

ManipulationOriginal imageTampered image

Pixel manipulation803983.table.005a803983.table.005b
Blurring803983.table.005c
Noise803983.table.005d
Median filtering803983.table.005e
Replacement/collage803983.table.005f