Abstract

Information security is considered one of the most important issues in various infrastructures related to the field of data communication where most of the modern studies focus on finding effective and low-weight secure approaches. Digital watermarking is a trend in security techniques that hides data by using data embedding and data extraction processes. Watermarking technology is integrated into different frames without adding an overheard as in the conventional encryption. Therefore, it is efficient to be used in data encryption for applications that run over limited resources such as the Internet of Things (IoT). In this paper, different digital watermarking algorithms and approaches are presented. Additionally, watermarking requirements and challenges are illustrated in detail. Moreover, the common architecture of the watermarking system is described. Furthermore, IoT technology and its challenges are highlighted. Finally, the paper provides the motivations, objectives and applications of the recent secure watermarking techniques in IoT and summarises them into one table. In addition, the paper highlights the potential to apply the modified watermark algorithms to secure IoT networks.

Highlights

  • Published: 20 July 2021As the concept of Internet of Things (IoT) has emerged as a powerful and flexible infrastructure for a wide range of services, which in turn significantly increased the volume of generated data

  • An embedded watermark is considered truly imperceptible if the user is not able to distinguish between the original multimedia and its watermarked form

  • A similar way for using the watermark technology in the WSN physical layer is investigated in [82] where a new protocol, namely, the ‘Watermarked-based Blind Physical Layer Security (WBPLSec) protocol is proposed in order to secure the encountered communication among existing nodes

Read more

Summary

Introduction

As the concept of Internet of Things (IoT) has emerged as a powerful and flexible infrastructure for a wide range of services, which in turn significantly increased the volume of generated data. Confidentiality, integrity proach uses a variety of low-cost and low-power internet-connected devices such that and availability are completely supported for sensitive data/information [13] In the same these devices sense their the surrounding from different situations and forward them issues, to context, IoT is widelydata used in the future, and the. These challenging issues make the techniques mechanism relying on public key, private key, digital signature, and digital certification as lightweight security algorithms and watermarking systems a viable choice for these in transport layer sockets is not suitable for such types of devices due to the cost of types of devices These limitations encouraged researchers to study and such in- as encryption and decryption operations. Semi-blind procedure, the secret key is only by means applied for extracting t [34]

Embedding Domain
Discrete Fourier Transform
Discrete
Least Significant Bit
Optimal Pixel Adjustment Process
Pixel Pair Matching
Discrete Shearlet Transform
Extraction
The Watermarking Performance Metrics
Bitwhich
Peak Signal to Noise Ratio
Capacity
Correlation Coefficient
The Major Classification of Digital Watermarking Techniques
Application’s Perspective
Type of Documents
Watermarking Requirements
Imperceptibility
Robustness
Fragility
Copyright Protection
Copy prevention
Authentication
Fingerprinting
Hidden Annotations
Medical Applications
Tamper Disclosure
Watermark
Removal Attack
Compression
Data Injection
Eavesdropping
Active Attacks
Passive Attacks
Cryptographic Attacks
Related Research
Robusteness
Deep Learning
Engryption
Hashing
Fragile
Reversible
Extra Parameters
Physical Security
Discussion and Issues
Conclusions and Future Work
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call