Loading

A Dwt and Scrambling Based Blind Watermarking Algorithm for Digital Images Authentication
Amira Eid1, Ahmed A. Emran2, Ahmed Y. Morsy3

1Amira Eid*, Departement of Computer and Electrical Engineering, Higher Technological Institute HTI, 10th of Ramadan City, Egypt.
2Ahmed A. Emran, Department of Electrical Engineering, Al-Azhar University, Cairo, Egypt.
3Ahmed Y. Morsy, Department of Electrical Engineering, Al-Azhar University, Cairo, Egypt.
Manuscript received on November 25, 2019. | Revised Manuscript received on December 15, 2019. | Manuscript published on December 30, 2019. | PP: 2980-2991 | Volume-9 Issue-2, December, 2019. | Retrieval Number:  B4060129219/2019©BEIESP | DOI: 10.35940/ijeat.B4060.129219
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Like the other multimedia that is spread on the Internet, images are also vulnerable to theft and attacks. Protecting the image is therefore an urgent necessity because it represents a large proportion of the digital content. Authentication and ownership protection are the basic demands of image security and these are achieved by applying watermarking techniques. For the Muslim world, the Holy Quran has its sanctity, which does not accept any controversy or doubt. As part of keeping pace with modern technology, digital copies of the Holy Qur’an are available, which are widely distributed all over the world. Therefore, it is necessary to ensure that these copies maintain their integrity and ensure that there are no malicious manipulations. In this paper, we propose an image watermarking scheme to authenticate the images of digital version of Holy Quran using discrete wavelet transform DWT. Here a fragile watermark is used to clarify whether there is any modification occurred to the intended images. Initially the cover image is decomposed by DWT where 2nd and 4th level coefficients are exploited for watermark embedding. The intended watermark is obtained by scrambling the original cover image. Then the scrambled image is inserted into the DWT coefficients by several trials using different embedding gains. To evaluate our system and see how effective it is to detect any error or manipulation, PSNR, SSIM and MSE are employed beside that they are acting as an imperceptibility measure. Results proved that our method has achieved a good level of imperceptibility and can detect any slight tamper. It is necessary to bear in mind that this method is valid for application to normal color images as well and gives an excellent level of efficiency.
Keywords: Holy Quran, Authentication, Discrete Wavelet Transform (DWT), Fragile watermark, Image watermarking, Scrambling.