Improving computational complexity using I-zag for text image authentication scheme

With the global proliferation of information and communication technologies, digital documents are increasingly used across various sectors like education, military, medical, business, and more. While the ease of access today brings convenience, it also enables easier data manipulation. Thus, authen...

Full description

Bibliographic Details
Main Author: ‘Aqilah, Abd. Ghani
Format: Thesis
Language:English
Published: 2024
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/44083/
http://umpir.ump.edu.my/id/eprint/44083/1/Improving%20computational%20complexity%20using%20I-zag%20for%20text%20image%20authentication%20scheme.pdf
_version_ 1848827027854983168
author ‘Aqilah, Abd. Ghani
author_facet ‘Aqilah, Abd. Ghani
author_sort ‘Aqilah, Abd. Ghani
building UMP Institutional Repository
collection Online Access
description With the global proliferation of information and communication technologies, digital documents are increasingly used across various sectors like education, military, medical, business, and more. While the ease of access today brings convenience, it also enables easier data manipulation. Thus, authentication mechanisms are imperative to secure sensitive user data, especially confidential text images. Most existing authentication schemes for text images are limited to specific image sizes and do not focus on processing time. As processing time is crucial for authentication systems, the primary objective of this thesis is to develop a scheme that improves the computational complexity of text image authentication using a fragile watermarking domain. The proposed scheme incorporates detection, localization, and recovery of tampered areas. A key contribution is utilizing Zigzag SCAN patterns for numbering and mapping prior to watermark embedding, along with Least Significant Bits (LSB) to embed the watermark bits. The authentication watermark bits are generated via average intensity comparison and parity check bits on the original cover image. This embedding approach facilitates hierarchical tamper detection and recovery. The proposed I-ZAG technique yields the fastest processing time and most efficient watermarking for diverse text image types, sizes, and sources. Experiments show I-ZAG averages 28.62 seconds for embedding across formats, with high 58 dB average PSNR and low 0.087% MSE. This surpasses existing schemes, Spiral-LSB and Hilbert-LSB. Detection, localization, and recovery are also fast. I-ZAG achieves ~100% localization accuracy and recovery rates. By enhancing computational complexity, I-ZAG enables rapid processing alongside robust authentication suitable for any text image. Significantly, I-ZAG meets the research objectives and addresses the need for an efficient digital watermarking scheme with low complexity to authenticate confidential text images.
first_indexed 2025-11-15T03:54:11Z
format Thesis
id ump-44083
institution Universiti Malaysia Pahang
institution_category Local University
language English
last_indexed 2025-11-15T03:54:11Z
publishDate 2024
recordtype eprints
repository_type Digital Repository
spelling ump-440832025-03-13T05:12:20Z http://umpir.ump.edu.my/id/eprint/44083/ Improving computational complexity using I-zag for text image authentication scheme ‘Aqilah, Abd. Ghani QA76 Computer software T Technology (General) With the global proliferation of information and communication technologies, digital documents are increasingly used across various sectors like education, military, medical, business, and more. While the ease of access today brings convenience, it also enables easier data manipulation. Thus, authentication mechanisms are imperative to secure sensitive user data, especially confidential text images. Most existing authentication schemes for text images are limited to specific image sizes and do not focus on processing time. As processing time is crucial for authentication systems, the primary objective of this thesis is to develop a scheme that improves the computational complexity of text image authentication using a fragile watermarking domain. The proposed scheme incorporates detection, localization, and recovery of tampered areas. A key contribution is utilizing Zigzag SCAN patterns for numbering and mapping prior to watermark embedding, along with Least Significant Bits (LSB) to embed the watermark bits. The authentication watermark bits are generated via average intensity comparison and parity check bits on the original cover image. This embedding approach facilitates hierarchical tamper detection and recovery. The proposed I-ZAG technique yields the fastest processing time and most efficient watermarking for diverse text image types, sizes, and sources. Experiments show I-ZAG averages 28.62 seconds for embedding across formats, with high 58 dB average PSNR and low 0.087% MSE. This surpasses existing schemes, Spiral-LSB and Hilbert-LSB. Detection, localization, and recovery are also fast. I-ZAG achieves ~100% localization accuracy and recovery rates. By enhancing computational complexity, I-ZAG enables rapid processing alongside robust authentication suitable for any text image. Significantly, I-ZAG meets the research objectives and addresses the need for an efficient digital watermarking scheme with low complexity to authenticate confidential text images. 2024-05 Thesis NonPeerReviewed pdf en http://umpir.ump.edu.my/id/eprint/44083/1/Improving%20computational%20complexity%20using%20I-zag%20for%20text%20image%20authentication%20scheme.pdf ‘Aqilah, Abd. Ghani (2024) Improving computational complexity using I-zag for text image authentication scheme. Masters thesis, Universti Malaysia Pahang Al-Sultan Abdullah (Contributors, Thesis advisor: Syifak, Izhar Hisham).
spellingShingle QA76 Computer software
T Technology (General)
‘Aqilah, Abd. Ghani
Improving computational complexity using I-zag for text image authentication scheme
title Improving computational complexity using I-zag for text image authentication scheme
title_full Improving computational complexity using I-zag for text image authentication scheme
title_fullStr Improving computational complexity using I-zag for text image authentication scheme
title_full_unstemmed Improving computational complexity using I-zag for text image authentication scheme
title_short Improving computational complexity using I-zag for text image authentication scheme
title_sort improving computational complexity using i-zag for text image authentication scheme
topic QA76 Computer software
T Technology (General)
url http://umpir.ump.edu.my/id/eprint/44083/
http://umpir.ump.edu.my/id/eprint/44083/1/Improving%20computational%20complexity%20using%20I-zag%20for%20text%20image%20authentication%20scheme.pdf