Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview

View through CrossRef
Information security is considered one of the most important issues in various infrastructures related to the field of data communication where most of the modern studies focus on finding effective and low-weight secure approaches. Digital watermarking is a trend in security techniques that hides data by using data embedding and data extraction processes. Watermarking technology is integrated into different frames without adding an overheard as in the conventional encryption. Therefore, it is efficient to be used in data encryption for applications that run over limited resources such as the Internet of Things (IoT). In this paper, different digital watermarking algorithms and approaches are presented. Additionally, watermarking requirements and challenges are illustrated in detail. Moreover, the common architecture of the watermarking system is described. Furthermore, IoT technology and its challenges are highlighted. Finally, the paper provides the motivations, objectives and applications of the recent secure watermarking techniques in IoT and summarises them into one table. In addition, the paper highlights the potential to apply the modified watermark algorithms to secure IoT networks.
Title: Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
Description:
Information security is considered one of the most important issues in various infrastructures related to the field of data communication where most of the modern studies focus on finding effective and low-weight secure approaches.
Digital watermarking is a trend in security techniques that hides data by using data embedding and data extraction processes.
Watermarking technology is integrated into different frames without adding an overheard as in the conventional encryption.
Therefore, it is efficient to be used in data encryption for applications that run over limited resources such as the Internet of Things (IoT).
In this paper, different digital watermarking algorithms and approaches are presented.
Additionally, watermarking requirements and challenges are illustrated in detail.
Moreover, the common architecture of the watermarking system is described.
Furthermore, IoT technology and its challenges are highlighted.
Finally, the paper provides the motivations, objectives and applications of the recent secure watermarking techniques in IoT and summarises them into one table.
In addition, the paper highlights the potential to apply the modified watermark algorithms to secure IoT networks.

Related Results

Mitigation of Geometrical Attack in Digital Image Watermarking using Different Transform Based Functions
Mitigation of Geometrical Attack in Digital Image Watermarking using Different Transform Based Functions
The illegal act of digital multimedia data loss the value of information and integrity. The loss of information and integrity born the process of piracy of digital data. The piracy...
A Compressed Domain Robust Video Watermarking Resists Geometric Attack
A Compressed Domain Robust Video Watermarking Resists Geometric Attack
The widespread utilization of mobile devices and the proliferation of video content, facilitated by communication networks, has unfortunately led to issues such as data piracy, ill...
Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery
Digital Image Watermarking Algorithms Based on Dual Transform Domain and Self-Recovery
Abstract In view of dual watermarking algorithm for dual two value image watermarking, the watermark information there is a gray image watermarking in the express...
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) dalam peningkatan kompetensi siswa multimedia di SMK Perguruan Buddhi
Pelatihan Internet of Things (IoT) menjadi bagian penting dalam pengembangan kompetensi siswa jurusan multimedia di SMK Perguruan Buddhi. Era digital menuntut adanya pemahaman mend...
Digital Watermarking for Multimedia Transaction Tracking
Digital Watermarking for Multimedia Transaction Tracking
This chapter focuses on the issue of transaction tracking in multimedia distribution applications through digital watermarking terminology. The existing watermarking schemes are su...
A Robust Digital Speech Watermarking Based on Least Significant Bit
A Robust Digital Speech Watermarking Based on Least Significant Bit
Watermarking is a technique to ensure the original information and to validate the digital content. Watermarking is required because of the rise in the utilization of the internet ...
Security Authentication of Dual Chaotic Image Watermarking in Spatial Domain with Spatial and Frequency Domain Characteristics Analysis
Security Authentication of Dual Chaotic Image Watermarking in Spatial Domain with Spatial and Frequency Domain Characteristics Analysis
This article presents an advanced dual chaotic watermarking scheme to improve information security. To ensure confidentiality in digital image transmission, a secure dual watermark...
INTEGRATION IOT AND BIM FOR TECHNOLOGY AND IOT ENVIRONMENT
INTEGRATION IOT AND BIM FOR TECHNOLOGY AND IOT ENVIRONMENT
Abstract: This research focuses on technology and integration tools for IoT environments, with an emphasis on three main aspects: the integration of Building Information Modeling (...

Back to Top