{"title":"一种用于古兰经认证的水印应用","authors":"T. Tuncer, F. Ertam, E. Avci","doi":"10.1109/NOORIC.2013.19","DOIUrl":null,"url":null,"abstract":"Nowadays, with the development of technology transfer to the information transmitted safely started to carry more importance to reach the desired aim. The science of information security is composed of steganography, watermarking, cryptography and authentication. Steganography is one of the subset of information security. In steganography objective data on the desired data to hide any cover. Thus, a computer file that appears cover data and data can be transmitted to the recipient in a hidden way. Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. In this study, the fragile watermarking techniques will use pages of the Quran by using steganography methods. Our aim is to authenticate the raffle and to prevent the unauthorized distribution of printed or modified in establishing the digital samples. XOR, LSB and Border watermarking techniques will be used. The success rates of these techniques, PSNR will be analyzed according to the ratio.","PeriodicalId":328341,"journal":{"name":"2013 Taibah University International Conference on Advances in Information Technology for the Holy Quran and Its Sciences","volume":"59 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2013-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A Watermarking Application for Authentication of Holy Quran\",\"authors\":\"T. Tuncer, F. Ertam, E. Avci\",\"doi\":\"10.1109/NOORIC.2013.19\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Nowadays, with the development of technology transfer to the information transmitted safely started to carry more importance to reach the desired aim. The science of information security is composed of steganography, watermarking, cryptography and authentication. Steganography is one of the subset of information security. In steganography objective data on the desired data to hide any cover. Thus, a computer file that appears cover data and data can be transmitted to the recipient in a hidden way. Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. In this study, the fragile watermarking techniques will use pages of the Quran by using steganography methods. Our aim is to authenticate the raffle and to prevent the unauthorized distribution of printed or modified in establishing the digital samples. XOR, LSB and Border watermarking techniques will be used. The success rates of these techniques, PSNR will be analyzed according to the ratio.\",\"PeriodicalId\":328341,\"journal\":{\"name\":\"2013 Taibah University International Conference on Advances in Information Technology for the Holy Quran and Its Sciences\",\"volume\":\"59 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 Taibah University International Conference on Advances in Information Technology for the Holy Quran and Its Sciences\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/NOORIC.2013.19\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 Taibah University International Conference on Advances in Information Technology for the Holy Quran and Its Sciences","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/NOORIC.2013.19","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Watermarking Application for Authentication of Holy Quran
Nowadays, with the development of technology transfer to the information transmitted safely started to carry more importance to reach the desired aim. The science of information security is composed of steganography, watermarking, cryptography and authentication. Steganography is one of the subset of information security. In steganography objective data on the desired data to hide any cover. Thus, a computer file that appears cover data and data can be transmitted to the recipient in a hidden way. Digital watermarks may be used to verify the authenticity or integrity of the carrier signal or to show the identity of its owners. In this study, the fragile watermarking techniques will use pages of the Quran by using steganography methods. Our aim is to authenticate the raffle and to prevent the unauthorized distribution of printed or modified in establishing the digital samples. XOR, LSB and Border watermarking techniques will be used. The success rates of these techniques, PSNR will be analyzed according to the ratio.