{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T19:50:39Z","timestamp":1759693839334,"version":"3.37.3"},"reference-count":77,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"name":"University Malaya","award":["UMRG RP003A-14HNE"],"award-info":[{"award-number":["UMRG RP003A-14HNE"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2017]]},"DOI":"10.1109\/access.2017.2682109","type":"journal-article","created":{"date-parts":[[2017,3,15]],"date-time":"2017-03-15T05:07:43Z","timestamp":1489554463000},"page":"7305-7325","source":"Crossref","is-referenced-by-count":27,"title":["Preserving Content Integrity of Digital Holy Quran: Survey and Open Challenges"],"prefix":"10.1109","volume":"5","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6670-1032","authenticated-orcid":false,"given":"Saqib","family":"Hakak","sequence":"first","affiliation":[]},{"given":"Amirrudin","family":"Kamsin","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Tayan","sequence":"additional","affiliation":[]},{"given":"Mohd. Yamani","family":"Idna Idris","sequence":"additional","affiliation":[]},{"given":"Abdullah","family":"Gani","sequence":"additional","affiliation":[]},{"given":"Saber","family":"Zerdoumi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref73","DOI":"10.1016\/j.aeue.2010.09.008"},{"doi-asserted-by":"publisher","key":"ref72","DOI":"10.1109\/TIM.2010.2066770"},{"year":"2015","journal-title":"Matlab","key":"ref71"},{"year":"2014","author":"saini","journal-title":"Analysis of attacks on hybrid DWT-DCT algorithm for digital image watermarking with MATLAB","key":"ref70"},{"key":"ref76","first-page":"13","article-title":"A classification of SQL-injection attacks and countermeasures","author":"halfond","year":"2006","journal-title":"Proc IEEE Int Symp Secure Softw"},{"year":"2015","journal-title":"ComScore","key":"ref77"},{"doi-asserted-by":"publisher","key":"ref74","DOI":"10.1109\/ICIMT.2009.11"},{"year":"2002","author":"arnold","journal-title":"Techniques and Applications of Digital Watermarking and Content Protection","key":"ref39"},{"doi-asserted-by":"publisher","key":"ref75","DOI":"10.1109\/ICEIT.2010.5607625"},{"doi-asserted-by":"publisher","key":"ref38","DOI":"10.1016\/S1665-6423(14)71612-8"},{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/NOORIC.2013.14"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1016\/j.aci.2015.08.001"},{"key":"ref31","first-page":"41","article-title":"Verification of Qur&#x2019;anic Quotations Embedded in Online Arabic and Islamic Websites","volume":"1","author":"alginahi","year":"2013","journal-title":"Int J Islam Appl Comput Sci Technol"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1016\/j.ins.2015.08.040"},{"doi-asserted-by":"publisher","key":"ref37","DOI":"10.1016\/j.patrec.2013.04.022"},{"doi-asserted-by":"publisher","key":"ref36","DOI":"10.1007\/s11042-007-0154-3"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1109\/ICT4M.2014.7020630"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1109\/INNOVATIONS.2012.6207762"},{"key":"ref60","first-page":"268","article-title":"Multimedia security: Steganography and digital watermarking techniques for protection of intellectual property","author":"lu","year":"2004","journal-title":"Institute of Infor-mation Science Academia Sinica"},{"doi-asserted-by":"publisher","key":"ref62","DOI":"10.1109\/MSP.2006.29"},{"doi-asserted-by":"publisher","key":"ref61","DOI":"10.1109\/ICICTA.2010.625"},{"doi-asserted-by":"publisher","key":"ref63","DOI":"10.1007\/978-3-662-47974-2_2"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/ICIP.2002.1040100"},{"key":"ref64","article-title":"Hiding in plain sight","author":"cole","year":"2003","journal-title":"Steganography and the Art of Covert Communication"},{"year":"2005","author":"ted","article-title":"Video and image watermark synchronization","key":"ref27"},{"key":"ref65","volume":"3","author":"date","year":"1997","journal-title":"A Guide to SQL Standard"},{"doi-asserted-by":"publisher","key":"ref66","DOI":"10.1145\/360825.360855"},{"key":"ref29","first-page":"244","article-title":"Identifying video forgery process using optical flow","author":"wang","year":"2013","journal-title":"Proc Int Workshop Digit Watermark"},{"doi-asserted-by":"publisher","key":"ref67","DOI":"10.1145\/375360.375365"},{"year":"2015","journal-title":"The Search","key":"ref68"},{"year":"2003","author":"welling","journal-title":"PHP and MySQL Web Development","key":"ref69"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1016\/j.ins.2010.08.039"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1142\/5471"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1109\/NOORIC.2013.18"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ICT4M.2014.7020640"},{"key":"ref21","first-page":"2591","article-title":"An enhanced SVD technique for authentication and protection of text-images using a case study on digital Quran content with sensitivity constraints","volume":"10","author":"laouamer","year":"2013","journal-title":"Life Sci"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.4304\/jetwi.2.1.48-55"},{"key":"ref23","first-page":"68","article-title":"Improved method of arabic text steganography using the extension &#x2018;Kashida&#x2019; character","volume":"3","author":"gutub","year":"2010","journal-title":"Bahria Univ J Inf Commun Technol"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1145\/1288869.1288876"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/MMSP.2012.6343421"},{"year":"2005","author":"stinson","journal-title":"Cryptography Theory and Practice","key":"ref50"},{"key":"ref51","volume":"2","author":"goldreich","year":"2009","journal-title":"Foundations of Cryptography"},{"key":"ref59","first-page":"65","article-title":"Digital signature approach for image authentication","volume":"86","author":"bausys","year":"2015","journal-title":"Elektronoka Elektrotechnika"},{"year":"2015","journal-title":"Digital Signature","key":"ref58"},{"key":"ref57","first-page":"689","article-title":"Information hiding: A new approach in text steganography","author":"por","year":"2008","journal-title":"Proc Math Comput Sci Eng Int Conf (WSEAS)"},{"doi-asserted-by":"publisher","key":"ref56","DOI":"10.1109\/TIFS.2016.2555281"},{"year":"2007","author":"cox","journal-title":"Digital Watermarking and Steganography","key":"ref55"},{"key":"ref54","first-page":"1","article-title":"Linguistic steganography: Survey, analysis, and robustness concerns for hiding information in text","author":"bennett","year":"2004"},{"year":"2000","author":"katzenbeisser","journal-title":"Information Hiding Techniques for Steganography and Digital Watermarking","key":"ref53"},{"year":"2014","author":"sumathi","journal-title":"A study of various steganographic techniques used for information hiding","key":"ref52"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/NOORIC.2013.24"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1163\/157005810X504518"},{"doi-asserted-by":"publisher","key":"ref40","DOI":"10.1049\/iet-ipr.2014.0965"},{"year":"0","author":"tayan","article-title":"An adaptive zero-watermarking approach for text documents protection","key":"ref12"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ACSAT.2013.55"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/ACSAT.2013.56"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/WCCIT.2013.6618773"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1109\/NOORIC.2013.17"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/MySec.2014.6986038"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/ISBAST.2013.51"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/ISBAST.2014.7013137"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1155\/2014\/514652"},{"year":"2016","key":"ref3"},{"key":"ref6","first-page":"534","article-title":"E-Hafiz: Intelligent system to help muslims in recitation and memorization of Quran","volume":"9","author":"muhammad","year":"2012","journal-title":"Life Sci"},{"key":"ref5","first-page":"54","article-title":"E-halagat: An E-learning system for teaching the Holy Quran","volume":"9","author":"elhadj","year":"2010","journal-title":"Turkish Online J Educ Technol"},{"year":"2015","journal-title":"Qur&#x2019;an Manuscript Public Display","key":"ref8"},{"year":"2006","author":"stallings","journal-title":"Cryptography and Network Security Principles and Practices","key":"ref49"},{"key":"ref7","first-page":"156","article-title":"The holy Quran digitization: Challenges and concerns","volume":"10","author":"khan","year":"2013","journal-title":"Life Sci"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1017\/CCOL0521831601"},{"year":"2007","author":"shih","journal-title":"Digital Watermarking and Steganography Fundamentals and Techniques","key":"ref46"},{"doi-asserted-by":"publisher","key":"ref45","DOI":"10.1111\/phor.12134"},{"doi-asserted-by":"publisher","key":"ref48","DOI":"10.1109\/ACCESS.2015.2428277"},{"key":"ref47","first-page":"307","article-title":"A survey on various cryptography techniques","volume":"3","author":"mitali","year":"2014","journal-title":"Int J Emerg Trends Sci Technol"},{"key":"ref42","first-page":"165","article-title":"A survey of digital watermarking techniques, applications and attacks","volume":"2","author":"singh","year":"2013","journal-title":"International Journal of Engineering and Innovative Technology"},{"doi-asserted-by":"publisher","key":"ref41","DOI":"10.1109\/WAINA.2013.171"},{"doi-asserted-by":"publisher","key":"ref44","DOI":"10.1109\/ACCESS.2016.2556723"},{"doi-asserted-by":"publisher","key":"ref43","DOI":"10.1109\/5.771071"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/7859429\/07878524.pdf?arnumber=7878524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:29:49Z","timestamp":1642004989000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7878524\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"references-count":77,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2682109","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2017]]}}}