Page 88 - IJEEE-2023-Vol19-ISSUE-1
P. 88
84 | Hussein, Muhajjar, & Mahdi
The major purpose of the suggested framework is not only to TABLE III
construct a watermark and embed it inside an image, but this
mark must also be fragile to identify any manipulation that IMAGE RESULTS AFTER DIFFERENT ATTACKS
happens on the image, which means that it will be destroyed
once an alteration occurs. This manipulation is considered Lena Attacks PSNR MSE LOGO EXCRACTED
forging If it isn't within the acceptable range. image
The VC serves as a threshold for determining whether or not
an image is fraudulent. This VC is created by combining two Rotate 70.83 0.005
photos to ensure that the authentication is genuine and not (90, -90) DB
fabricated. Additionally, the hash function's benefits have
been used by giving one-way outputs, providing that this Scale 48.13 1
procedure had greater integrity. DB
After conducting the embedding procedure on several
images, this technique yielded the best PSNR scale results. Salt and 49.81 0.67
However, the quality of the photograph remained intact. This
study found that the PSNR value increased with picture size, Pepper DB
with a maximum value of about 70 dB and a minimum of
59.15, and a reduction in MSE of 0.07 as image size was
increased.as show in Table II
TABLE II
IMAGE RESULTS AFTER DIFFERENT ATTACKS
Size PSNR MSE Write on 34.65 22.24
512.512 59.15 0.07 image (more DB
800.800 63.05 0.03
1000.1500 66.75 0.013 the 500
1600.2400 70.82 0.005 word)
The VC serves as a threshold for determining whether or not compression 70.82 0.005
DB
an image is fraudulent. This VC is created by combining two
Gaussian 39.64 7.05
photos to ensure that the authentication is genuine and not filter DB
fabricated. Additionally, the hash function's benefits have Delete from - ---
image
been used by giving one-way outputs, providing that this
Copy a --- ----
procedure had greater integrity. Some image assaults have component
from one
been performed to validate the suggested system's operation
image to
and influence the image's quality. Implemented the attacks another
(Rotate, salt and pepper, scale).
Measurements are shown in the Table III below.
Following the attacks, the image was rotated and checked
whether the original bits could be recovered once they
returned to their original shape. It was able to overcome this
assault. On the contrary, in scale attacks, there was no way
to extract the watermark because it was too fragile, and the
pixel values changed when zoomed in or out, affecting the
extraction process. In regards to the Salt and Pepper assault,
the watermark was successful, and the majority of the bits
were recovered.
Another attack involved the deletion of an image,
and a component from another image was copied and pasted
into the image where the watermark was embedded. As
indicated in the table, the suggested work successfully
detected this manipulation process. The effects were visible
in the logo through apparent distortion, which helped
determine the location of the alteration.