Page 88 - IJEEE-2023-Vol19-ISSUE-1
P. 88

84 |                                                                                       Hussein, Muhajjar, & Mahdi

The major purpose of the suggested framework is not only to                              TABLE III
construct a watermark and embed it inside an image, but this
mark must also be fragile to identify any manipulation that            IMAGE RESULTS AFTER DIFFERENT ATTACKS
happens on the image, which means that it will be destroyed
once an alteration occurs. This manipulation is considered      Lena   Attacks      PSNR MSE LOGO EXCRACTED
forging If it isn't within the acceptable range.                image
The VC serves as a threshold for determining whether or not
an image is fraudulent. This VC is created by combining two            Rotate       70.83 0.005
photos to ensure that the authentication is genuine and not            (90, -90)    DB
fabricated. Additionally, the hash function's benefits have
been used by giving one-way outputs, providing that this               Scale        48.13 1
procedure had greater integrity.                                                    DB
After conducting the embedding procedure on several
images, this technique yielded the best PSNR scale results.            Salt and 49.81 0.67
However, the quality of the photograph remained intact. This
study found that the PSNR value increased with picture size,           Pepper       DB
with a maximum value of about 70 dB and a minimum of
59.15, and a reduction in MSE of 0.07 as image size was
increased.as show in Table II

                           TABLE II
      IMAGE RESULTS AFTER DIFFERENT ATTACKS

         Size    PSNR   MSE                                            Write on     34.65  22.24
       512.512   59.15  0.07                                           image (more  DB
       800.800   63.05  0.03
      1000.1500  66.75  0.013                                          the 500
      1600.2400  70.82  0.005                                          word)

The VC serves as a threshold for determining whether or not            compression 70.82 0.005
                                                                                          DB
an image is fraudulent. This VC is created by combining two
                                                                       Gaussian     39.64 7.05
photos to ensure that the authentication is genuine and not            filter       DB

fabricated. Additionally, the hash function's benefits have            Delete from -       ---
                                                                       image
been used by giving one-way outputs, providing that this
                                                                       Copy a       ---    ----
procedure had greater integrity. Some image assaults have              component
                                                                       from one
been performed to validate the suggested system's operation
                                                                       image to
and influence the image's quality. Implemented the attacks             another

(Rotate, salt and pepper, scale).

          Measurements are shown in the Table III below.
Following the attacks, the image was rotated and checked
whether the original bits could be recovered once they
returned to their original shape. It was able to overcome this
assault. On the contrary, in scale attacks, there was no way
to extract the watermark because it was too fragile, and the
pixel values changed when zoomed in or out, affecting the
extraction process. In regards to the Salt and Pepper assault,
the watermark was successful, and the majority of the bits
were recovered.

          Another attack involved the deletion of an image,
and a component from another image was copied and pasted
into the image where the watermark was embedded. As
indicated in the table, the suggested work successfully
detected this manipulation process. The effects were visible
in the logo through apparent distortion, which helped
determine the location of the alteration.
   83   84   85   86   87   88   89   90   91   92   93