Optimized Digital Watermarking for Robust Information Security in Embedded Systems
Abstract
:1. Introduction
2. Materials and Methods
2.1. System Architecture
- (a)
- Acquisition Block:
- (b)
- Processing and Communication Block:
- Watermark Embedding: Neural networks are trained to adaptively embed robust and imperceptible watermarks into images and audio signals while ensuring their fidelity.
- Data Encryption: To secure the watermarked multimedia, the data are encrypted before storage or transmission.
- Communication Module: The system establishes a secure connection to a web server, where the processed data are uploaded. This ensures that the data are accessible remotely for further decryption and validation [16].
- (c)
- Decryption and Validation System:
- Decryption Device: Either another embedded board (e.g., a secondary Raspberry Pi platform) or a smartphone processes the decryption and retrieves the embedded watermark.
- Verification Algorithms: Neural networks are also utilized at this stage to extract and validate the embedded watermark, ensuring robustness against potential attacks.
- (d)
- Supervision and Monitoring System:
2.2. Digital Watermarking Background
2.2.1. Mathematical Principle of Watermarking
- Spatial Methods
- Frequency Methods
- The Fourier transform of the original audio signal:
- 2.
- Embedding the watermark in the frequency domain:
- 3.
- Using the inverse Fourier transform to obtain the watermarked signal:
2.2.2. Application
2.2.3. Performance Requirements in Digital Watermarking
- (a)
- Robustness
- (b)
- Imperceptibility
- The Peak Signal-to-Noise Ratio (PSNR) and Structural Similarity Index Model (SSIM) are common metrics; PSNR values above 40 dB are generally considered imperceptible [28].
- Adaptive techniques, which adjust watermark embedding based on image features, have shown improved imperceptibility, as they use human visual sensitivity to reduce visible distortion [29].
- (c)
- Capacity
- Higher capacities often necessitate trade-offs with imperceptibility and robustness. Multiple watermark systems are increasingly employed to balance these demands [30].
- (d)
- Complexity
- Efficient processing times are crucial, often requiring optimization through hardware implementations or advanced algorithms [31].
- (e)
- Security
- Measures like the NPCR (Number of Changing Pixel Rate) and UACI (Unified Averaged Changed Intensity) are used to assess resilience against tampering [32]. These two measures are used to evaluate the efficiency of image watermarking against potential attacks. They are usually used to analyze the resistance of the watermarked images to pixel-level changes. NPCR and UACI scores should always be close to 1 and 0.33, respectively, to achieve good security. Higher values mean resistance will be better.
2.2.4. Watermarking with Neural Network
2.2.5. Deep Learning-Based Watermark Embedding and Extraction Architecture
3. Results
3.1. Simulation Results
3.1.1. Processing Time
3.1.2. Data Quality
3.1.3. Robustness
- The system is robust to lossless compression (PNG), with minimal degradation in the quality of the extracted audio data.
- Lossy compressions, such as those associated with the JPEG format, significantly reduce the quality of extracted data, especially at high compression ratios.
- Minor geometric transformations (e.g., rotation of less than 5° or partial cropping) do not significantly affect performance. However, major transformations, such as a 90° rotation or excessive cropping, make correct data extraction difficult.
- Finally, the addition of moderate noise in the image slightly affects the extracted audio, but it remains intelligible.
3.2. Real-Time Results
Data Decoding and Validation
4. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
Abbreviations
NC | Normalized cross-correlation |
CNN | Convolutional neural network |
SVD | Singular value decomposition |
DWT | Discrete wavelet transform |
SSIM | Structural Similarity Index Model |
IoT | Internet of Things |
PSNR | Peak Signal-to-Noise Ratio |
SNR | Signal-to-Noise Ratio |
LSB | Least significant bit |
NPCR | Number of Changing Pixel Rate |
UACI | Unified Averaged Changed Intensity |
References
- Chang, C.; Tsai, P.; Lin, C.-C. SVD-based digital image watermarking scheme. Pattern Recognit. Lett. 2005, 26, 1577–1586. [Google Scholar] [CrossRef]
- Podilchuk, C.; Delp, E. Digital watermarking: Algorithms and applications. IEEE Signal Process. Mag. 2001, 18, 33–46. [Google Scholar] [CrossRef]
- Sadiku, M.; Shadare, A.E.; Musa, S. Digital watermarking. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 2017, 7, 414. [Google Scholar] [CrossRef] [PubMed]
- Haghighi, B.B.; Taherinia, A.; Harati, A.; Rouhani, M. WSMN: An optimized multipurpose blind watermarking in Shearlet domain using MLP and NSGA-II. Appl. Soft Comput. 2020, 101, 107029. [Google Scholar] [CrossRef]
- Sharma, S.; Sharma, H.; Sharma, J.B.; Poonia, R. A secure and robust color image watermarking using nature-inspired intelligence. Neural Comput. Appl. 2021, 35, 4919–4937. [Google Scholar] [CrossRef]
- Mohan, A.; Anand, A.; Singh, A.; Dwivedi, R.; Kumar, B. Selective encryption and optimization based watermarking for robust transmission of landslide images. Comput. Electr. Eng. 2021, 95, 107385. [Google Scholar] [CrossRef]
- Hemdan, E.E. An efficient and robust watermarking approach based on single value decompression, multi-level DWT, and wavelet fusion with scrambled medical images. Multimed. Tools Appl. 2020, 80, 1749–1777. [Google Scholar] [CrossRef]
- Sunesh, R.; Kishore, R.; Saini, A. Optimized image watermarking with artificial neural networks and histogram shape. J. Inf. Optim. Sci. 2020, 41, 1597–1613. [Google Scholar] [CrossRef]
- Pan, J.-S.; Sun, X.-X.; Chu, S.; Abraham, A.; Yan, B. Digital watermarking with improved SMS applied for QR code. Eng. Appl. Artif. Intell. 2021, 97, 104049. [Google Scholar] [CrossRef]
- Devi, K.J.; Singh, P.; Dash, J.; Thakkar, H.; Santamaría, J.; Krishna, M.V.J.; Romero-Manchado, A. A new robust and secure 3-level digital image watermarking method based on G-BAT hybrid optimization. Mathematics 2022, 10, 3015. [Google Scholar] [CrossRef]
- Abdi, H.; Boukli Hacene, I. An optimized medical image watermarking approach for E-health applications. Med. Technol. J. 2023, 5, 594–603. [Google Scholar] [CrossRef]
- Hao, W.; Wei, X.; Zhang, W.; Xie, R. Live code digital watermarking technology based on chaotic encryption. In Proceedings of the 2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT), Nanjing, China, 16–18 June 2023. [Google Scholar] [CrossRef]
- Anand, A.; Singh, A.K. Hybrid nature-inspired optimization and encryption-based watermarking for E-healthcare. IEEE Trans. Comput. Soc. Syst. 2022, 10, 2033–2040. [Google Scholar] [CrossRef]
- Rai, M.; Hemlata. Robust digital watermarking based on machine learning. In Proceedings of the 2023 International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS), Erode, India, 18–20 October 2023. [Google Scholar] [CrossRef]
- Xiao, Y.; Xu, Y.-C.; Zhou, N.-R.; Lin, Z.-R. Digital watermarking scheme based on curvelet transform and multiple chaotic maps. Opt. Appl. 2023, 53, 291–305. [Google Scholar] [CrossRef]
- Mekhfioui, M.; Benahmed, A.; Chebak, A.; Elgouri, R.; Hlou, L. The Development and Implementation of Innovative Blind Source Separation Techniques for Real-Time Extraction and Analysis of Fetal and Maternal Electrocardiogram Signals. Bioengineering 2024, 11, 512. [Google Scholar] [CrossRef] [PubMed]
- Hsu, C.T.; Wu, J.L. Hidden digital watermarks in images. IEEE Trans. Image Process. 1999, 8, 58–68. [Google Scholar] [CrossRef]
- Swanson, M.D.; Zhu, B.; Tewfik, A.H. Transparent robust image watermarking. In Proceedings of the International Conference on Image Processing, Lausanne, Switzerland, 16–19 September 1996; Volume 3, pp. 211–214. [Google Scholar] [CrossRef]
- Nikolaidis, A.; Pitas, I. Robust image watermarking in the spatial domain. Signal Process. 1998, 66, 385–403. [Google Scholar] [CrossRef]
- Li, H.; Zhang, W.; Sun, Y. IoT and 5G communication watermarking techniques. Commun. Digit. Secur. 2019, 7, 32–47. [Google Scholar]
- Smith, T.; Williams, M.; Lee, D. Digital rights management in cyber systems via watermarking. Cybersecur. Innov. J. 2020, 15, 211–225. [Google Scholar]
- Lansari, M.; Bellafqira, R.; Kapusta, K.; Thouvenot, V.; Bettan, O.; Coatrieux, G. When Federated Learning Meets Watermarking: A Comprehensive Overview of Techniques for Intellectual Property Protection. Mach. Learn. Knowl. Extr. 2023, 5, 1382–1406. [Google Scholar] [CrossRef]
- Jones, P.; Wang, Q. Protecting patient privacy in medical imaging through watermarking. Healthc. Data J. 2021, 5, 99–112. [Google Scholar]
- Brown, A.; Chen, X.; Zhao, L. Smart city data integrity and security with watermarking. J. Urban Comput. 2018, 12, 145–158. [Google Scholar]
- Chen, L.; Zhao, Y. Watermarking for secure cloud storage and e-governance applications. Int. J. Cloud Secur. 2019, 8, 78–89. [Google Scholar]
- Chen, B.; Wornell, G. Achievable performance of digital watermarking systems. In Proceedings of the IEEE International Conference on Multimedia Computing and Systems, Florence, Italy, 7–11 June 1999; Volume 1, pp. 13–18. [Google Scholar] [CrossRef]
- Qi, X.; Qi, J. A robust content-based digital image watermarking scheme. Signal Process. 2007, 87, 1264–1280. [Google Scholar] [CrossRef]
- Akter, A.; Ullah, M. Digital Watermarking with a New Algorithm. Int. J. Res. Eng. Technol. 2014, 3, 212–217. [Google Scholar] [CrossRef]
- Qi, H.; Zheng, D.; Zhao, J. Human visual system based adaptive digital image watermarking. Signal Process. 2008, 88, 174–188. [Google Scholar] [CrossRef]
- Zhang, F.; Zhang, X. Performance Evaluation of Multiple Watermarks System. In Proceedings of the Second Workshop on Digital Media and Its Application in Museum & Heritages (DMAMH 2007), Chongqing, China, 10–12 December 2007; pp. 15–18. [Google Scholar] [CrossRef]
- Roy, S.; Li, X.; Shoshan, Y.; Fish, A.; Yadid-Pecht, O. Hardware Implementation of a Digital Watermarking System for Video Authentication. IEEE Trans. Circuits Syst. Video Technol. 2013, 23, 289–301. [Google Scholar] [CrossRef]
- Garg, P.; Kishore, R. Performance comparison of various watermarking techniques. Multimed. Tools Appl. 2020, 79, 25921–25967. [Google Scholar] [CrossRef]
- Wu, H.; Liu, G.; Yao, Y.; Zhang, X. Watermarking Neural Networks With Watermarked Images. IEEE Trans. Circuits Syst. Video Technol. 2021, 31, 2591–2601. [Google Scholar] [CrossRef]
- Gu, T.; Li, X. Dynamic digital watermark technique based on neural network. In Independent Component Analyses, Wavelets, Unsupervised Nano-Biomimetic Sensors, and Neural Networks VI; SPIE: Bellingham, WA, USA, 2008. [Google Scholar]
- Uchida, Y.; Nagai, Y.; Sakazawa, S.; Satoh, S. Embedding Watermarks into Deep Neural Networks. In Proceedings of the ACM International Conference on Multimedia Retrieval, Bucharest, Romania, 6–9 June 2017. [Google Scholar]
- Huang, S.; Zhang, W.; Feng, W.; Yang, H. Blind watermarking scheme based on neural network. In Proceedings of the World Congress on Intelligent Control and Automation, Chongqing, China, 25–27 June 2008. [Google Scholar]
- Mekhfioui, M.; Elgouri, R.; Satif, A.; Hlou, L. Real-time implementation of a new efficient algorithm for source separation using matlab & arduino due. Int. J. Sci. Technol. Res. 2020, 9, 4. [Google Scholar]
- Voigt, P.; von dem Bussche, A. The EU General Data Protection Regulation (GDPR): A Practical Guide; Springer: Berlin/Heidelberg, Germany, 2017. [Google Scholar] [CrossRef]
- Floridi, L.; Cowls, J.; Beltrametti, M.; Chatila, R.; Chazerand, P.; Dignum, V.; Luetge, C.; Madelin, R.; Pagallo, U.; Rossi, F.; et al. AI4People—An Ethical Framework for a Good AI Society: Opportunities, Risks, Principles, and Recommendations. Minds Mach. 2018, 28, 689–707. [Google Scholar] [CrossRef]
Reference | Year | Techniques | Strengths | Limitations |
---|---|---|---|---|
Podilchuk & Delp [2] | 2001 | Algorithm taxonomy, applications | Foundational framework for watermarking systems | No empirical algorithm proposals |
Chang et al. [1] | 2005 | SVD-based embedding | High imperceptibility and robustness to compression | Sensitive to geometric distortions |
Sadiku et al. [3] | 2017 | Overview of watermarking types | General classification and use cases | No technical innovation or testing |
Haghighi et al. [4] | 2020 | Shearlet, MLP, NSGA-II | Optimized blind and multipurpose watermarking | High computational complexity |
Hemdan [7] | 2020 | SVD, DWT, wavelet fusion | High fidelity, secure for medical images | Increased processing due to scrambling |
Sunesh et al. [8] | 2020 | ANN, histogram shape | Content-adaptive watermarking | Performance varies by image type |
Sharma et al. [5] | 2021 | Nature-inspired optimization | Secure and robust for color images | Not ideal for grayscale images |
Mohan et al. [6] | 2021 | Selective encryption, optimization | Robust transmission for natural images | Focused on landslide image applications |
Pan et al. [9] | 2021 | Improved SMS, QR code embedding | Effective QR-specific watermarking | Not suitable for general images |
Devi et al. [10] | 2022 | G-BAT hybrid optimization | Robust 3-level watermarking | Complex parameter tuning |
Anand & Singh [13] | 2022 | Hybrid optimization and encryption | Tailored for E-healthcare | Highly domain-specific |
Abdi & Boukli Hacene [11] | 2023 | Medical image optimization | Efficient and secure for E-health | Limited to medical data |
Hao et al. [12] | 2023 | Chaotic encryption, live code | Real-time secure watermarking | Experimental; lacks benchmarks |
Rai et al. [14] | 2023 | Machine learning | Adaptable, robust watermarking | Needs quality training data |
Xiao et al. [15] | 2023 | Curvelet transform + multiple chaotic maps | High imperceptibility and precise localization | Complexity in implementation and parameter tuning |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Mekhfioui, M.; El Bazi, N.; Laayati, O.; Satif, A.; Bouchouirbat, M.; Kissi, C.; Boujiha, T.; Chebak, A. Optimized Digital Watermarking for Robust Information Security in Embedded Systems. Information 2025, 16, 322. https://doi.org/10.3390/info16040322
Mekhfioui M, El Bazi N, Laayati O, Satif A, Bouchouirbat M, Kissi C, Boujiha T, Chebak A. Optimized Digital Watermarking for Robust Information Security in Embedded Systems. Information. 2025; 16(4):322. https://doi.org/10.3390/info16040322
Chicago/Turabian StyleMekhfioui, Mohcin, Nabil El Bazi, Oussama Laayati, Amal Satif, Marouan Bouchouirbat, Chaïmaâ Kissi, Tarik Boujiha, and Ahmed Chebak. 2025. "Optimized Digital Watermarking for Robust Information Security in Embedded Systems" Information 16, no. 4: 322. https://doi.org/10.3390/info16040322
APA StyleMekhfioui, M., El Bazi, N., Laayati, O., Satif, A., Bouchouirbat, M., Kissi, C., Boujiha, T., & Chebak, A. (2025). Optimized Digital Watermarking for Robust Information Security in Embedded Systems. Information, 16(4), 322. https://doi.org/10.3390/info16040322