An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document

Digital form nowadays has been easily manipulated by many corrupters especially in formal business. PDF document is one of the main digital forms that need to be accessed when dealing with offer letters, scanned documents, digital receipt, etc. Thus, PDF is one of the critical data that needs to be...

Full description

Saved in:
Bibliographic Details
Main Authors: Usop, Nur Alya Afikah, Izhar Hisham, Syifak, Abd Ghani, Aqilah, Mohd Zain, Jasni
Format: Article
Language:English
Published: Engg Journals Publications 2022
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/37258/1/An%20implementing%20of%20zigzag%20pattern.pdf
http://umpir.ump.edu.my/id/eprint/37258/
https://doi.org/10.21817/indjcse/2022/v13i5/221305172
https://doi.org/10.21817/indjcse/2022/v13i5/221305172
Tags: Add Tag
No Tags, Be the first to tag this record!
id my.ump.umpir.37258
record_format eprints
spelling my.ump.umpir.372582023-03-10T00:53:27Z http://umpir.ump.edu.my/id/eprint/37258/ An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document Usop, Nur Alya Afikah Izhar Hisham, Syifak Abd Ghani, Aqilah Mohd Zain, Jasni QA76 Computer software Digital form nowadays has been easily manipulated by many corrupters especially in formal business. PDF document is one of the main digital forms that need to be accessed when dealing with offer letters, scanned documents, digital receipt, etc. Thus, PDF is one of the critical data that needs to be protected from any manipulations of its originality. An experiment is conducted to develop an improved zigzag-LSB watermarking scheme for all characters of text documents in PDF format which proved to have the best embedding system of numbering. The techniques used special numbering manners by spreading the numbered original data as far as possible from the original locations. The schemes embedded authentication data in least significant bits (LSB). These methods have been proven to be effective since it uses an image-based approach with a numbering pattern that is robust to deletion, image splicing, and copy attacks. Results show three types of attacks in PDF documentation managed to detect tamper location after being tampered. Engg Journals Publications 2022-09 Article PeerReviewed pdf en cc_by_nc_nd_4 http://umpir.ump.edu.my/id/eprint/37258/1/An%20implementing%20of%20zigzag%20pattern.pdf Usop, Nur Alya Afikah and Izhar Hisham, Syifak and Abd Ghani, Aqilah and Mohd Zain, Jasni (2022) An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document. Indian Journal of Computer Science and Engineering, 13 (5). 1733 -1751. ISSN 0976-5166 https://doi.org/10.21817/indjcse/2022/v13i5/221305172 https://doi.org/10.21817/indjcse/2022/v13i5/221305172
institution Universiti Malaysia Pahang
building UMP Library
collection Institutional Repository
continent Asia
country Malaysia
content_provider Universiti Malaysia Pahang
content_source UMP Institutional Repository
url_provider http://umpir.ump.edu.my/
language English
topic QA76 Computer software
spellingShingle QA76 Computer software
Usop, Nur Alya Afikah
Izhar Hisham, Syifak
Abd Ghani, Aqilah
Mohd Zain, Jasni
An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
description Digital form nowadays has been easily manipulated by many corrupters especially in formal business. PDF document is one of the main digital forms that need to be accessed when dealing with offer letters, scanned documents, digital receipt, etc. Thus, PDF is one of the critical data that needs to be protected from any manipulations of its originality. An experiment is conducted to develop an improved zigzag-LSB watermarking scheme for all characters of text documents in PDF format which proved to have the best embedding system of numbering. The techniques used special numbering manners by spreading the numbered original data as far as possible from the original locations. The schemes embedded authentication data in least significant bits (LSB). These methods have been proven to be effective since it uses an image-based approach with a numbering pattern that is robust to deletion, image splicing, and copy attacks. Results show three types of attacks in PDF documentation managed to detect tamper location after being tampered.
format Article
author Usop, Nur Alya Afikah
Izhar Hisham, Syifak
Abd Ghani, Aqilah
Mohd Zain, Jasni
author_facet Usop, Nur Alya Afikah
Izhar Hisham, Syifak
Abd Ghani, Aqilah
Mohd Zain, Jasni
author_sort Usop, Nur Alya Afikah
title An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
title_short An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
title_full An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
title_fullStr An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
title_full_unstemmed An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
title_sort implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
publisher Engg Journals Publications
publishDate 2022
url http://umpir.ump.edu.my/id/eprint/37258/1/An%20implementing%20of%20zigzag%20pattern.pdf
http://umpir.ump.edu.my/id/eprint/37258/
https://doi.org/10.21817/indjcse/2022/v13i5/221305172
https://doi.org/10.21817/indjcse/2022/v13i5/221305172
_version_ 1761616613347426304
score 13.211869