Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
Information security is considered one of the most important issues in various infrastructures related to the field of data communication where most of the modern studies focus on finding effective and low-weight secure approaches. Digital watermarking is a trend in security techniques that hides da...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2021-07-01
|
Series: | Electronics |
Subjects: | |
Online Access: | https://www.mdpi.com/2079-9292/10/14/1744 |
_version_ | 1797527228779593728 |
---|---|
author | Raniyah Wazirali Rami Ahmad Ahmed Al-Amayreh Mohammad Al-Madi Ala’ Khalifeh |
author_facet | Raniyah Wazirali Rami Ahmad Ahmed Al-Amayreh Mohammad Al-Madi Ala’ Khalifeh |
author_sort | Raniyah Wazirali |
collection | DOAJ |
description | Information security is considered one of the most important issues in various infrastructures related to the field of data communication where most of the modern studies focus on finding effective and low-weight secure approaches. Digital watermarking is a trend in security techniques that hides data by using data embedding and data extraction processes. Watermarking technology is integrated into different frames without adding an overheard as in the conventional encryption. Therefore, it is efficient to be used in data encryption for applications that run over limited resources such as the Internet of Things (IoT). In this paper, different digital watermarking algorithms and approaches are presented. Additionally, watermarking requirements and challenges are illustrated in detail. Moreover, the common architecture of the watermarking system is described. Furthermore, IoT technology and its challenges are highlighted. Finally, the paper provides the motivations, objectives and applications of the recent secure watermarking techniques in IoT and summarises them into one table. In addition, the paper highlights the potential to apply the modified watermark algorithms to secure IoT networks. |
first_indexed | 2024-03-10T09:41:01Z |
format | Article |
id | doaj.art-4dafd71a6e634ad39c5775d4c6bcf3bd |
institution | Directory Open Access Journal |
issn | 2079-9292 |
language | English |
last_indexed | 2024-03-10T09:41:01Z |
publishDate | 2021-07-01 |
publisher | MDPI AG |
record_format | Article |
series | Electronics |
spelling | doaj.art-4dafd71a6e634ad39c5775d4c6bcf3bd2023-11-22T03:39:27ZengMDPI AGElectronics2079-92922021-07-011014174410.3390/electronics10141744Secure Watermarking Schemes and Their Approaches in the IoT Technology: An OverviewRaniyah Wazirali0Rami Ahmad1Ahmed Al-Amayreh2Mohammad Al-Madi3Ala’ Khalifeh4College of Computing and Informatics, Saudi Electronic University, Riyadh 11673, Saudi ArabiaThe School of Information Technology, Sebha University, Sebha 71, LibyaDepartment of Information Technology, University of Technology and Applied Sciences, Suhar 311, OmanFaculty of Computer Studies, Arab Open University, Riyadh 23437, Saudi ArabiaSchool of Electrical Engineering and Information Technology, German Jordanian University, Amman 11180, JordanInformation security is considered one of the most important issues in various infrastructures related to the field of data communication where most of the modern studies focus on finding effective and low-weight secure approaches. Digital watermarking is a trend in security techniques that hides data by using data embedding and data extraction processes. Watermarking technology is integrated into different frames without adding an overheard as in the conventional encryption. Therefore, it is efficient to be used in data encryption for applications that run over limited resources such as the Internet of Things (IoT). In this paper, different digital watermarking algorithms and approaches are presented. Additionally, watermarking requirements and challenges are illustrated in detail. Moreover, the common architecture of the watermarking system is described. Furthermore, IoT technology and its challenges are highlighted. Finally, the paper provides the motivations, objectives and applications of the recent secure watermarking techniques in IoT and summarises them into one table. In addition, the paper highlights the potential to apply the modified watermark algorithms to secure IoT networks.https://www.mdpi.com/2079-9292/10/14/1744watermarking technologyembedding and extractionIoT securityWSN securityperception layer |
spellingShingle | Raniyah Wazirali Rami Ahmad Ahmed Al-Amayreh Mohammad Al-Madi Ala’ Khalifeh Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview Electronics watermarking technology embedding and extraction IoT security WSN security perception layer |
title | Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview |
title_full | Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview |
title_fullStr | Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview |
title_full_unstemmed | Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview |
title_short | Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview |
title_sort | secure watermarking schemes and their approaches in the iot technology an overview |
topic | watermarking technology embedding and extraction IoT security WSN security perception layer |
url | https://www.mdpi.com/2079-9292/10/14/1744 |
work_keys_str_mv | AT raniyahwazirali securewatermarkingschemesandtheirapproachesintheiottechnologyanoverview AT ramiahmad securewatermarkingschemesandtheirapproachesintheiottechnologyanoverview AT ahmedalamayreh securewatermarkingschemesandtheirapproachesintheiottechnologyanoverview AT mohammadalmadi securewatermarkingschemesandtheirapproachesintheiottechnologyanoverview AT alakhalifeh securewatermarkingschemesandtheirapproachesintheiottechnologyanoverview |