咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Payload Capacity Scheme for Qu... 收藏

Payload Capacity Scheme for Quran Text Watermarking Based on Vowels with Kashida

作     者:Ali A.R.Alkhafaji Nilam Nur Amir Sjarif M.A Shahidan Nurulhuda Firdaus Mohd Azmi Haslina Md Sarkan Suriayati Chuprat Osamah Ibrahim Khalaf Ehab Nabiel Al-Khanak 

作者机构:Razak Faculty of Technology and InformaticsUniversity Teknologi MalaysiaKuala Lumpur54000Malaysia Al-Nahrain UniversityAl-Nahrain Nanorenewable Energy Research CentreBaghdadIraq Department of Transport and PlanningFaculty of Civil Engineering and Geosciences(CiTG)Delft University of TechnologyDelftNetherlands 

出 版 物:《Computers, Materials & Continua》 (计算机、材料和连续体(英文))

年 卷 期:2021年第67卷第6期

页      面:3865-3885页

核心收录:

学科分类:08[工学] 0812[工学-计算机科学与技术(可授工学、理学学位)] 

基  金:This work is conducted at Razak Faculty of Technology and Informatics under cyber physical systems research group and funded by MOHE(FRGS:R.K130000.7856.5F026) Received by Nilam Nur Amir Sjarif 

主  题:Quran text watermarking Arabic text capacity imperceptibility Kashida vowels reversing technique 

摘      要:The most sensitive Arabic text available online is the digital Holy *** sacred Islamic religious book is recited by all Muslims worldwide including non-Arabs as part of their worship ***,it should be protected from any kind of tampering to keep its invaluable meaning *** characteristics of Arabic letters like the vowels(),Kashida(extended letters),and other symbols in the Holy Quran must be secured from *** cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio(PSNR)and Embedding Ratio(ER).A watermarking technique with enhanced attributes must,therefore,be designed for the Quran’s text using Arabic vowels with *** gap addressed by this paper is to improve the security of Arabic text in the Holy Quran by using vowels with *** purpose of this paper is to enhance the Quran text watermarking scheme based on a reversing *** methodology consists of four phases:The first phase is a pre-processing followed by the second phase-the embedding process phase—which will hide the data after the *** is,if the secret bit is“1,then the kashida is inserted;however,the kashida is not inserted if the bit is“0.The third phase is the extraction process and the last phase is to evaluate the performance of the proposed scheme by using PSNR(for the imperceptibility)and ER(for the capacity).The experimental results show that the proposed method of imperceptibility insertion is also optimized with the help of a reversing *** proposed strategy obtains a 90.5%***,the proposed algorithm attained 66.1%which is referred to as imperceptibility.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分