Tamper detection and localization for Quranic text watermarking scheme based on hybrid technique

The text of the Quran is principally dependent on the Arabic language. Therefore, improving the security and reliability of the Quran's text when it is exchanged via internet networks has become one of the most difcult challenges that researchers face today. Consequently, the diacritical marks...

Full description

Saved in:
Bibliographic Details
Main Authors: Alkhafaji, Ali A. R., Amir Sjarif, Nilam Nur, Shahidan, M. A., Mohd. Azmi, Nurulhuda Firdaus, Md. Sarkan, Haslina, Chuprat, Suriayati
Format: Article
Published: Tech Science Press 2021
Subjects:
Online Access:http://eprints.utm.my/id/eprint/94954/
http://dx.doi.org/10.32604/cmc.2021.015770
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Universiti Teknologi Malaysia
Description
Summary:The text of the Quran is principally dependent on the Arabic language. Therefore, improving the security and reliability of the Quran's text when it is exchanged via internet networks has become one of the most difcult challenges that researchers face today. Consequently, the diacritical marks in the Holy Quran which represent Arabic vowels ( ) known as the kashida (or extended letters) must be protected from changes. The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio (PSNR), and Normalized Cross-Correlation (NCC); thus, the location for tamper detection accuracy is low. The gap addressed in this paper to improve the security of Arabic text in the Holy Quran by using vowels with kashida. To enhance the watermarking scheme of the text of the Quran based on hybrid techniques (XOR and queuing techniques) of the purposed scheme. The methodology propose scheme consists of four phases: The rst phase is pre-processing. This is followed by the second phase where an embedding process takes place to hide the data after the vowel letters wherein if the secret bit is 1, it inserts the kashida but does not insert the kashida if the bit is 0. The third phase is an extraction process and the last phase is to evaluate the performance of the proposed scheme by using PSNR (for the imperceptibility), and NCC (for the security of the watermarking). Experiments were performed on three datasets of varying lengths under multiple random locations of insertion, reorder and deletion attacks. The experimental results were revealed the improvement of the NCC by 1.76%, PSNR by 9.6% compared to available current schemes.