Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview

View through CrossRef
Information security is considered one of the most important issues in various infrastructures related to the field of data communication where most of the modern studies focus on finding effective and low-weight secure approaches. Digital watermarking is a trend in security techniques that hides data by using data embedding and data extraction processes. Watermarking technology is integrated into different frames without adding an overheard as in the conventional encryption. Therefore, it is efficient to be used in data encryption for applications that run over limited resources such as the Internet of Things (IoT). In this paper, different digital watermarking algorithms and approaches are presented. Additionally, watermarking requirements and challenges are illustrated in detail. Moreover, the common architecture of the watermarking system is described. Furthermore, IoT technology and its challenges are highlighted. Finally, the paper provides the motivations, objectives and applications of the recent secure watermarking techniques in IoT and summarises them into one table. In addition, the paper highlights the potential to apply the modified watermark algorithms to secure IoT networks.
Title: Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
Description:
Information security is considered one of the most important issues in various infrastructures related to the field of data communication where most of the modern studies focus on finding effective and low-weight secure approaches.
Digital watermarking is a trend in security techniques that hides data by using data embedding and data extraction processes.
Watermarking technology is integrated into different frames without adding an overheard as in the conventional encryption.
Therefore, it is efficient to be used in data encryption for applications that run over limited resources such as the Internet of Things (IoT).
In this paper, different digital watermarking algorithms and approaches are presented.
Additionally, watermarking requirements and challenges are illustrated in detail.
Moreover, the common architecture of the watermarking system is described.
Furthermore, IoT technology and its challenges are highlighted.
Finally, the paper provides the motivations, objectives and applications of the recent secure watermarking techniques in IoT and summarises them into one table.
In addition, the paper highlights the potential to apply the modified watermark algorithms to secure IoT networks.

Related Results

A Compressed Domain Robust Video Watermarking Resists Geometric Attack
A Compressed Domain Robust Video Watermarking Resists Geometric Attack
The widespread utilization of mobile devices and the proliferation of video content, facilitated by communication networks, has unfortunately led to issues such as data piracy, ill...
Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery
Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery
Abstract In view of dual watermarking algorithm for dual two value image watermarking, the watermark information there is a gray image watermarking in the expression...
Digital Watermarking for Multimedia Transaction Tracking
Digital Watermarking for Multimedia Transaction Tracking
This chapter focuses on the issue of transaction tracking in multimedia distribution applications through digital watermarking terminology. The existing watermarking schemes are su...
A Robust Digital Speech Watermarking Based on Least Significant Bit
A Robust Digital Speech Watermarking Based on Least Significant Bit
Watermarking is a technique to ensure the original information and to validate the digital content. Watermarking is required because of the rise in the utilization of the internet ...
Robust Digital Image Watermarking in YCbCr Color Space using Hybrid Method
Robust Digital Image Watermarking in YCbCr Color Space using Hybrid Method
The image watermarking is widely used to provide the security. This paper provides the conceptual framework on image watermarking which is widely used for security purpose within t...
Evaluation of a Framework for Robust Image Reversible Watermarking
Evaluation of a Framework for Robust Image Reversible Watermarking
In the literature, robust reversible watermarking schemes (RWSs) allow the extraction of watermarks after the images have suffered attacks; however, the modified images are comprom...
Analysis of Secure Medical Image Communication with Digital Signature and Reversible Watermarking
Analysis of Secure Medical Image Communication with Digital Signature and Reversible Watermarking
<p>Protection of Medical image contents becomes the important issue in computer network security. Digital Watermarking has becomes a promising technique for medical content a...
APLIKASI WATERMARKING DENGAN ALGORITMA AES UNTUK PEMBERIAN DATA HAK CIPTA PADA FILE AUDIO
APLIKASI WATERMARKING DENGAN ALGORITMA AES UNTUK PEMBERIAN DATA HAK CIPTA PADA FILE AUDIO
Watermarking audio files has  recently become the  attention  focus. This is primarily due to faster data transmission rates on the Internet, which has allowed the often illegal pr...

Back to Top