Page 89 - IJEEE-2023-Vol19-ISSUE-1
P. 89
Hussein, Muhajjar & Mahdi | 85
VI. A COMPARISON OF THE SEVERAL ALTERNATIVE extra image fragility required to accomplish the study's
SYSTEMS purpose. Furthermore, the use of lossless compression in the
form of PNGs assisted in maintaining the quality of the
The proposed method was compared to previous techniques embedded images, which achieved a PSNR of 70.82db and
to determine if image quality is maintained after embedding. an MSE of 0.005; both values are considered to be within
Suggested results showed a higher percentage of PSNR acceptable ranges for picture quality.
compared to other methods, showing the technique's ability This research helped create a new fragile watermark
to preserve image quality. as shown in Table IV and Fig. 7 generator using hashing and visual cryptography techniques,
explain the proposed method with other techniques. providing an additional layer of protection against
watermark tampering by ensuring that the attacker cannot
TABLE IV determine the nature of the watermark being entered. As a
SHOWS A COMPARISON WITH OTHER METHODS result, the technique employed in this research may be used
for more sensitive images and documents, such as
Method PSNR (db) government files, to detect any alteration on these documents
and the watermark's inherent fragility in this methodology.
Raj & Shreelekshmi, [7] 55.14 The suggested approach is very efficient at preserving image
quality.
Chitra, K., & Prasanna Venkatesan, V., [8] 56.49
CONFLICT OF INTEREST
Ayu et al. [9] 44.91
The authors have no conflict of relevant interest to this
Gul & Ozturk [10] 57.19 article.
Sinhal et al., [11] 49.68 REFERENCES
Reyes-Reyes et al. [12] 43.89 [1] K. Dou, B. Guo, and L. Kuang, “A privacy-preserving
multimedia recommendation in the context of social
Su et al [13] 47.8 network based on weighted noise injection,” Multimedia
Tools and Applications, vol. 78, no. 19. pp. 26907–26926,
Proposed Method 70.82 2019. doi: 10.1007/s11042-017-4352-3.
[2] A. Alsimry, K. Hussein Ali, and E. Wahab Abood, “A
PSNR (db) new approach for finding duplicated words in scanned
Arabic documents based on OCR and SURF,” J. Basrah
80 Res., no. 47, 2021. [Online]. Available:
70 https://www.iasj.net/iasj/journal/260/issues.
60 [3] Farah Abdul-Hussain Badr, “secure data
50 communications using cryptography and IPv6
40 steganography.pdf,” International Journal of Engineering &
30 Technology, vol. 7, no. 4.19, pp. 624-628, 2018.
20 [4] H. M. Abdul-Nabi, E. S. Al-Shawi, and H. L. Hussain,
10 “Hiding Three Images at one image by Using Wavelet
0 Coefficients at Color Image,” Basrah Journal of Science
(A), vol. 28, no. 1, pp. 58-73, 2010.
ChRitajrPRrae,o&ypKeS.so,h-GsSriRue&elnedeAPhly&ryaeeSlMasukOsuesezteaetthetthntuaolanmarlil.a,.ld,.ak… [5] Q. Su et al., “New Rapid and Robust Color Image
Watermarking Technique in Spatial Domain,” IEEE
Fig. 7: Comparison of PSNR chart with other methods. Access, vol. 7, pp. 30398–30409, 2019. doi:
10.1109/ACCESS.2019.2895062.
VII. CONCLUSION [6] D. Singh and S. K. Singh, “DCT based efficient fragile
watermarking scheme for image authentication and
This research study proposed a method for creating a restoration,” Multimedia Tools and Applications, vol. 76,
watermark and embedding it in images to verify their no. 1. pp. 953–977, 2017. doi: 10.1007/s11042-015-3010-
authenticity or fraud. The watermark has shown its fragility x.
in several manipulations. It has successfully overcome [7] N. R. N. Raj and R. Shreelekshmi, “Blockwise Fragile
various attacks on an image, such as noise that typically Watermarking Schemes for Tamper Localization in Digital
happens to the picture for different reasons. Additionally, the Images,” 2018 International CET Conference on Control,
embedding procedure in the second bit contributed to the Communication, and Computing, IC4 2018, pp. 441–446,
2018. doi: 10.1109/CETIC4.2018.8530950.