Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview

Information security is considered one of the most important issues in various infrastructures related to the field of data communication where most of the modern studies focus on finding effective and low-weight secure approaches. Digital watermarking is a trend in security techniques that hides da...

Full description

Bibliographic Details
Main Authors: Raniyah Wazirali, Rami Ahmad, Ahmed Al-Amayreh, Mohammad Al-Madi, Ala’ Khalifeh
Format: Article
Language:English
Published: MDPI AG 2021-07-01
Series:Electronics
Subjects:
Online Access:https://www.mdpi.com/2079-9292/10/14/1744
_version_ 1797527228779593728
author Raniyah Wazirali
Rami Ahmad
Ahmed Al-Amayreh
Mohammad Al-Madi
Ala’ Khalifeh
author_facet Raniyah Wazirali
Rami Ahmad
Ahmed Al-Amayreh
Mohammad Al-Madi
Ala’ Khalifeh
author_sort Raniyah Wazirali
collection DOAJ
description Information security is considered one of the most important issues in various infrastructures related to the field of data communication where most of the modern studies focus on finding effective and low-weight secure approaches. Digital watermarking is a trend in security techniques that hides data by using data embedding and data extraction processes. Watermarking technology is integrated into different frames without adding an overheard as in the conventional encryption. Therefore, it is efficient to be used in data encryption for applications that run over limited resources such as the Internet of Things (IoT). In this paper, different digital watermarking algorithms and approaches are presented. Additionally, watermarking requirements and challenges are illustrated in detail. Moreover, the common architecture of the watermarking system is described. Furthermore, IoT technology and its challenges are highlighted. Finally, the paper provides the motivations, objectives and applications of the recent secure watermarking techniques in IoT and summarises them into one table. In addition, the paper highlights the potential to apply the modified watermark algorithms to secure IoT networks.
first_indexed 2024-03-10T09:41:01Z
format Article
id doaj.art-4dafd71a6e634ad39c5775d4c6bcf3bd
institution Directory Open Access Journal
issn 2079-9292
language English
last_indexed 2024-03-10T09:41:01Z
publishDate 2021-07-01
publisher MDPI AG
record_format Article
series Electronics
spelling doaj.art-4dafd71a6e634ad39c5775d4c6bcf3bd2023-11-22T03:39:27ZengMDPI AGElectronics2079-92922021-07-011014174410.3390/electronics10141744Secure Watermarking Schemes and Their Approaches in the IoT Technology: An OverviewRaniyah Wazirali0Rami Ahmad1Ahmed Al-Amayreh2Mohammad Al-Madi3Ala’ Khalifeh4College of Computing and Informatics, Saudi Electronic University, Riyadh 11673, Saudi ArabiaThe School of Information Technology, Sebha University, Sebha 71, LibyaDepartment of Information Technology, University of Technology and Applied Sciences, Suhar 311, OmanFaculty of Computer Studies, Arab Open University, Riyadh 23437, Saudi ArabiaSchool of Electrical Engineering and Information Technology, German Jordanian University, Amman 11180, JordanInformation security is considered one of the most important issues in various infrastructures related to the field of data communication where most of the modern studies focus on finding effective and low-weight secure approaches. Digital watermarking is a trend in security techniques that hides data by using data embedding and data extraction processes. Watermarking technology is integrated into different frames without adding an overheard as in the conventional encryption. Therefore, it is efficient to be used in data encryption for applications that run over limited resources such as the Internet of Things (IoT). In this paper, different digital watermarking algorithms and approaches are presented. Additionally, watermarking requirements and challenges are illustrated in detail. Moreover, the common architecture of the watermarking system is described. Furthermore, IoT technology and its challenges are highlighted. Finally, the paper provides the motivations, objectives and applications of the recent secure watermarking techniques in IoT and summarises them into one table. In addition, the paper highlights the potential to apply the modified watermark algorithms to secure IoT networks.https://www.mdpi.com/2079-9292/10/14/1744watermarking technologyembedding and extractionIoT securityWSN securityperception layer
spellingShingle Raniyah Wazirali
Rami Ahmad
Ahmed Al-Amayreh
Mohammad Al-Madi
Ala’ Khalifeh
Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
Electronics
watermarking technology
embedding and extraction
IoT security
WSN security
perception layer
title Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
title_full Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
title_fullStr Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
title_full_unstemmed Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
title_short Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
title_sort secure watermarking schemes and their approaches in the iot technology an overview
topic watermarking technology
embedding and extraction
IoT security
WSN security
perception layer
url https://www.mdpi.com/2079-9292/10/14/1744
work_keys_str_mv AT raniyahwazirali securewatermarkingschemesandtheirapproachesintheiottechnologyanoverview
AT ramiahmad securewatermarkingschemesandtheirapproachesintheiottechnologyanoverview
AT ahmedalamayreh securewatermarkingschemesandtheirapproachesintheiottechnologyanoverview
AT mohammadalmadi securewatermarkingschemesandtheirapproachesintheiottechnologyanoverview
AT alakhalifeh securewatermarkingschemesandtheirapproachesintheiottechnologyanoverview