Page 89 - IJEEE-2023-Vol19-ISSUE-1
P. 89

Hussein, Muhajjar & Mahdi                                                                                                                                                      | 85

   VI. A COMPARISON OF THE SEVERAL ALTERNATIVE                                                               extra image fragility required to accomplish the study's
                              SYSTEMS                                                                        purpose. Furthermore, the use of lossless compression in the
                                                                                                             form of PNGs assisted in maintaining the quality of the
The proposed method was compared to previous techniques                                                      embedded images, which achieved a PSNR of 70.82db and
to determine if image quality is maintained after embedding.                                                 an MSE of 0.005; both values are considered to be within
Suggested results showed a higher percentage of PSNR                                                         acceptable ranges for picture quality.
compared to other methods, showing the technique's ability                                                   This research helped create a new fragile watermark
to preserve image quality. as shown in Table IV and Fig. 7                                                   generator using hashing and visual cryptography techniques,
explain the proposed method with other techniques.                                                           providing an additional layer of protection against
                                                                                                             watermark tampering by ensuring that the attacker cannot
                      TABLE IV                                                                               determine the nature of the watermark being entered. As a
SHOWS A COMPARISON WITH OTHER METHODS                                                                        result, the technique employed in this research may be used
                                                                                                             for more sensitive images and documents, such as
Method                                      PSNR (db)                                                        government files, to detect any alteration on these documents
                                                                                                             and the watermark's inherent fragility in this methodology.
Raj & Shreelekshmi, [7]                     55.14                                                            The suggested approach is very efficient at preserving image
                                                                                                             quality.
Chitra, K., & Prasanna Venkatesan, V., [8]  56.49
                                                                                                                                  CONFLICT OF INTEREST
Ayu et al. [9]                              44.91
                                                                                                                  The authors have no conflict of relevant interest to this
Gul & Ozturk [10]                           57.19                                                            article.

Sinhal et al., [11]                         49.68                                                                                       REFERENCES

Reyes-Reyes et al. [12]                     43.89                                                            [1] K. Dou, B. Guo, and L. Kuang, “A privacy-preserving
                                                                                                              multimedia recommendation in the context of social
Su et al [13]                               47.8                                                              network based on weighted noise injection,” Multimedia
                                                                                                              Tools and Applications, vol. 78, no. 19. pp. 26907–26926,
Proposed Method                             70.82                                                             2019. doi: 10.1007/s11042-017-4352-3.
                                                                                                             [2] A. Alsimry, K. Hussein Ali, and E. Wahab Abood, “A
        PSNR (db)                                                                                             new approach for finding duplicated words in scanned
                                                                                                              Arabic documents based on OCR and SURF,” J. Basrah
                                                                                                         80   Res., no. 47, 2021. [Online]. Available:
                                                                                                         70   https://www.iasj.net/iasj/journal/260/issues.
                                                                                                         60  [3] Farah Abdul-Hussain Badr, “secure data
                                                                                                         50   communications using cryptography and IPv6
                                                                                                         40   steganography.pdf,” International Journal of Engineering &
                                                                                                         30   Technology, vol. 7, no. 4.19, pp. 624-628, 2018.
                                                                                                         20  [4] H. M. Abdul-Nabi, E. S. Al-Shawi, and H. L. Hussain,
                                                                                                         10   “Hiding Three Images at one image by Using Wavelet
                                                                                                         0    Coefficients at Color Image,” Basrah Journal of Science
                                                                                                              (A), vol. 28, no. 1, pp. 58-73, 2010.
ChRitajrPRrae,o&ypKeS.so,h-GsSriRue&elnedeAPhly&ryaeeSlMasukOsuesezteaetthetthntuaolanmarlil.a,.ld,.ak…      [5] Q. Su et al., “New Rapid and Robust Color Image
                                                                                                              Watermarking Technique in Spatial Domain,” IEEE
     Fig. 7: Comparison of PSNR chart with other methods.                                                     Access, vol. 7, pp. 30398–30409, 2019. doi:
                                                                                                              10.1109/ACCESS.2019.2895062.
                        VII. CONCLUSION                                                                      [6] D. Singh and S. K. Singh, “DCT based efficient fragile
                                                                                                              watermarking scheme for image authentication and
This research study proposed a method for creating a                                                          restoration,” Multimedia Tools and Applications, vol. 76,
watermark and embedding it in images to verify their                                                          no. 1. pp. 953–977, 2017. doi: 10.1007/s11042-015-3010-
authenticity or fraud. The watermark has shown its fragility                                                  x.
in several manipulations. It has successfully overcome                                                       [7] N. R. N. Raj and R. Shreelekshmi, “Blockwise Fragile
various attacks on an image, such as noise that typically                                                     Watermarking Schemes for Tamper Localization in Digital
happens to the picture for different reasons. Additionally, the                                               Images,” 2018 International CET Conference on Control,
embedding procedure in the second bit contributed to the                                                      Communication, and Computing, IC4 2018, pp. 441–446,
                                                                                                              2018. doi: 10.1109/CETIC4.2018.8530950.
   84   85   86   87   88   89   90   91   92   93   94