Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview
Abstract
:1. Introduction
- No additional overhead is added on the wireless frame.
- Data security is always guaranteed.
- Reduce the end-to-end delay.
- Low power consumption is attained due to the utilized lightweight calculations.
- A comprehensive survey is provided on various secure watermarking schemes within the IoT networks that have been proposed to deliver robustness and integrity throughout the watermark and security environments. In particular, the paper highlights the most recent studies in watermarking with different approaches such as: hashing, deep learning, encryption, and fragile.
- Several challenges that can be addressed in IoT network traffic with the help of watermark technology have been examined.
2. The Concept of Watermarking
2.1. Embedding Domain
2.1.1. Singular Value Decomposition
2.1.2. Discrete Wavelet Transform
2.1.3. Discrete Fourier Transform
2.1.4. Edge Detection
2.1.5. Discrete Cosine Transform
2.1.6. Least Significant Bit
2.1.7. Optimal Pixel Adjustment Process
2.1.8. Pixel Pair Matching
2.1.9. Discrete Shearlet Transform
2.2. Extraction Domain
2.3. The Watermarking Performance Metrics
2.3.1. Bit Error Rate (BER)
2.3.2. Peak Signal to Noise Ratio (PSNR)
2.3.3. Signal to Noise Ratio (SNR)
2.3.4. Capacity
2.3.5. Structural Similarity Index (SSIM)
2.3.6. Correlation Coefficient
2.4. The Major Classification of Digital Watermarking Techniques
2.4.1. Application’s Perspective
2.4.2. Human’s Perception
2.4.3. Type of Documents
2.4.4. Watermarking Work Scope
2.5. Watermarking Requirements
2.5.1. Imperceptibility
2.5.2. Robustness
2.5.3. Security
2.5.4. Informed or Blind Detection
2.5.5. Cost of Watermark
2.5.6. Fragility
2.6. Application of Digital Watermarking
2.6.1. Copyright Protection
2.6.2. Copy prevention
2.6.3. Authentication
2.6.4. Fingerprinting
2.6.5. Hidden Annotations
2.6.6. Medical Applications
2.6.7. Tamper Disclosure
2.6.8. Broadcast Monitoring
2.6.9. Covert Communication
2.7. Watermark Challenge
2.7.1. Removal Attack
2.7.2. Compression
2.7.3. Data Injection
2.7.4. Eavesdropping
2.7.5. Forgery Attack
2.7.6. Active Attacks
2.7.7. Passive Attacks
2.7.8. Cryptographic Attacks
3. The Concept of IoT
3.1. Perception Layer’s Limitations
3.2. Perception Layer Security Challenge
4. Related Research: Modified Watermarking Approaches in the IoT Applications
4.1. Robusteness Image
4.2. Deep Learning
4.3. Engryption
4.4. Hashing
4.5. Fragile
4.6. Reversible
4.7. Extra Parameters
4.8. Physical Security
5. Discussion and Issues
6. Conclusions and Future Work
Author Contributions
Funding
Conflicts of Interest
References
- Subba Rao, S. Copyright: Its implications for electronic information. Online Inf. Rev. 2003, 27, 264–275. [Google Scholar] [CrossRef]
- Liu, Y.; Tang, S.; Liu, R.; Zhang, L.; Ma, Z. Secure and robust digital image watermarking scheme using logistic and RSA encryption. Expert Syst. Appl. 2018, 97, 95–105. [Google Scholar] [CrossRef]
- Nikolic, M.; Tuba, E.; Tuba, M. Edge detection in medical ultrasound images using adjusted Canny edge detection algorithm. In Proceedings of the 2016 24th Telecommunications Forum (TELFOR), Belgrade, Serbia, 22–23 November 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1–4. [Google Scholar]
- Alattar, A.M. Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform. IEEE Trans. Image Process. 2004, 13, 1147–1156. [Google Scholar] [CrossRef]
- Petitcolas, F.A.P.; Anderson, R.J.; Kuhn, M.G. Information hiding-a survey. Proc. IEEE 1999, 87, 1062–1078. [Google Scholar] [CrossRef] [Green Version]
- Eskicioglu, A.M.; Delp, E.J. An overview of multimedia content protection in consumer electronics devices. Signal Process. Image Commun. 2001, 16, 681–699. [Google Scholar] [CrossRef] [Green Version]
- Altaay, A.A.J.; Sahib, S.B.; Zamani, M. An Introduction to Image Steganography Techniques. In Proceedings of the 2012 International Conference on Advanced Computer Science Applications and Technologies (ACSAT), Kuala Lumpur, Malaysia, 26–28 November 2012; IEEE: Piscataway, NJ, USA, 2012; pp. 122–126. [Google Scholar]
- Otair, M.A. Security in digital images: From information hiding perspective. In Handbook of Research on Threat Detection and Countermeasures in Network Security; Information Science Reference: Hershey PA, USA, 2014; pp. 381–394. ISBN 9781466665842. [Google Scholar]
- Anand, D.; Niranjan, U.C. Watermarking medical images with patient information. In Proceedings of the Proceedings of the 20th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, Hong Kong, China, 1 November 1998; Volume 20 Biomedical Engineering Towards the Year 2000 and Beyond (Cat. No.98CH36286). IEEE: Piscataway, NJ, USA, 1998; Volume 2, pp. 703–706. [Google Scholar]
- Tiwari, A.; Singh, V. Digital Image Watermarking Using DWT and Shift Invariant Edge Detection. Int. J. Comput. Technol. Electron. Eng. 2013, 3, 21–26. [Google Scholar]
- Iwendi, C.; Jalil, Z.; Javed, A.R.; Thippa Reddy, G.; Kaluri, R.; Srivastava, G.; Jo, O. KeySplitWatermark: Zero Watermarking Algorithm for Software Protection against Cyber-Attacks. IEEE Access 2020, 8, 72650–72660. [Google Scholar] [CrossRef]
- Singh, L.; Singh, A.K.; Singh, P.K. Secure data hiding techniques: A survey. Multimed. Tools Appl. 2020, 79, 15901–15921. [Google Scholar] [CrossRef]
- Dagadu, J.C.; Li, J. Context-based watermarking cum chaotic encryption for medical images in telemedicine applications. Multimed. Tools Appl. 2018, 77, 24289–24312. [Google Scholar] [CrossRef]
- Glissa, G.; Meddeb, A. 6LoWPAN multi-layered security protocol based on IEEE 802.15.4 security features. In Proceedings of the 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC), Valencia, Spain, 26–30 June 2017; IEEE: Piscataway, NJ, USA, 2017; pp. 264–269. [Google Scholar]
- Alromih, A.; Al-Rodhaan, M.; Tian, Y. A Randomized Watermarking Technique for Detecting Malicious Data Injection Attacks in Heterogeneous Wireless Sensor Networks for Internet of Things Applications. Sensors 2018, 18, 4346. [Google Scholar] [CrossRef] [Green Version]
- Zhang, G.; Kou, L.; Zhang, L.; Liu, C.; Da, Q.; Sun, J. A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT. Secur. Commun. Netw. 2017, 2017, 1–12. [Google Scholar] [CrossRef] [Green Version]
- Tanha, M.; Torshizi, S.D.S.; Abdullah, M.T.; Hashim, F. An overview of attacks against digital watermarking and their respective countermeasures. In Proceedings of the Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), Kuala Lumpur, Malaysia, 26–28 June 2012; IEEE: Piscataway, NJ, USA, 2012; Volume 4, pp. 265–270. [Google Scholar]
- Song, C.; Sudirman, S.; Merabti, M.; Llewellyn-Jones, D. Analysis of Digital Image Watermark Attacks. In Proceedings of the 2010 7th IEEE Consumer Communications and Networking Conference, Las Vegas, NV, USA, 9–12 January 2010; IEEE: Piscataway, NJ, USA, 2010; pp. 1–5. [Google Scholar]
- Mohanty, S.P.; Sengupta, A.; Guturu, P.; Kougianos, E. Everything You Want to Know About Watermarking: From Paper Marks to Hardware Protection: From paper marks to hardware protection. IEEE Consum. Electron. Mag. 2017, 6, 83–91. [Google Scholar] [CrossRef]
- Begum, M.; Uddin, M.S. Digital Image Watermarking Techniques: A Review. Information 2020, 11, 110. [Google Scholar] [CrossRef] [Green Version]
- Prasetyo, H.; Hsia, C.H.; Liu, C.H. Vulnerability attacks of SVD-based video watermarking scheme in an IoT environment. IEEE Access 2020, 8, 69919–69936. [Google Scholar] [CrossRef]
- Singh, A.K.; Kumar, B.; Dave, M.; Ghrera, S.P.; Mohan, A. Digital Image Watermarking. In Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security; IGI Global: Hershey, PA, USA, 2016; pp. 246–272. [Google Scholar]
- Thapa, M.; Sandeep, D.; Meenakshi, A. Digital Image Watermarking Technique Based on Different Attacks. Int. J. Adv. Comput. Sci. Appl. 2011, 2, 14–19. [Google Scholar] [CrossRef]
- Panchal, U.H.; Srivastava, R. A Comprehensive Survey on Digital Image Watermarking Techniques. In Proceedings of the 2015 Fifth International Conference on Communication Systems and Network Technologies, Gwalior, India, 4–6 April 2015; IEEE: Piscataway, NJ, USA, 2015; Volume 82, pp. 591–595. [Google Scholar]
- Su, J.K.; Hartung, F.; Girod, B. Digital watermarking of text, image, and video documents. Comput. Graph. 1998, 22, 687–695. [Google Scholar] [CrossRef]
- Vasudev, R. A Review on Digital Image Watermarking and Its Techniques. J. Image Graph. 2016, 4, 150–153. [Google Scholar] [CrossRef] [Green Version]
- Anand, A.; Singh, A.K. Watermarking techniques for medical data authentication: A survey. Multimed. Tools Appl. 2020, 17, 1–33. [Google Scholar] [CrossRef]
- Kumar, C.; Singh, A.K.; Kumar, P. A recent survey on image watermarking techniques and its application in e-governance. Multimed. Tools Appl. 2018, 77, 3597–3622. [Google Scholar] [CrossRef]
- Singh, A.K.; Kumar, B.; Singh, G.; Mohan, A. (Eds.) Medical Image Watermarking; Springer: Cham, Switzerland, 2017; ISBN 978-3-319-57698-5. [Google Scholar]
- Hua, G.; Huang, J.; Shi, Y.Q.; Goh, J.; Thing, V.L.L. Twenty years of digital audio watermarking—A comprehensive review. Signal Process. 2016, 128, 222–242. [Google Scholar] [CrossRef]
- Agarwal, R.; Santhanam, M.S.; Srinivas, K. Digital watermarking: An approach based on Hilbert transform. In Proceedings of the 2016 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India, 29–30 April 2016; IEEE: Piscataway, NJ, USA, 2016; pp. 1035–1042. [Google Scholar]
- Loan, N.A.; Hurrah, N.N.; Parah, S.A.; Lee, J.W.; Sheikh, J.A.; Bhat, G.M. Secure and Robust Digital Image Watermarking Using Coefficient Differencing and Chaotic Encryption. IEEE Access 2018, 6, 19876–19897. [Google Scholar] [CrossRef]
- Singh, D.; Singh, S.K. DCT based efficient fragile watermarking scheme for image authentication and restoration. Multimed. Tools Appl. 2017, 76, 953–977. [Google Scholar] [CrossRef]
- Agarwal, N.; Singh, A.K.; Singh, P.K. Survey of robust and imperceptible watermarking. Multimed. Tools Appl. 2019, 78, 8603–8633. [Google Scholar] [CrossRef]
- Cheddad, A.; Condell, J.; Curran, K.; Mc Kevitt, P. Digital image steganography: Survey and analysis of current methods. Signal Process. 2010, 90, 727–752. [Google Scholar] [CrossRef] [Green Version]
- Yadav, B.; Kumar, A.; Kumar, Y. A Robust Digital Image Watermarking Algorithm Using DWT and SVD. In Advances in Intelligent Systems and Computing; Springer: Singapore, 2018; Volume 583, pp. 25–36. ISBN 9789811056864. [Google Scholar]
- Hu, H.-T.; Hsu, L.-Y. Exploring DWT–SVD–DCT feature parameters for robust multiple watermarking against JPEG and JPEG2000 compression. Comput. Electr. Eng. 2015, 41, 52–63. [Google Scholar] [CrossRef]
- Chang, C.-C.; Tsai, P.; Lin, C.-C. SVD-based digital image watermarking scheme. Pattern Recognit. Lett. 2005, 26, 1577–1586. [Google Scholar] [CrossRef]
- Lai, C.-C.; Tsai, C.-C. Digital Image Watermarking Using Discrete Wavelet Transform and Singular Value Decomposition. IEEE Trans. Instrum. Meas. 2010, 59, 3060–3063. [Google Scholar] [CrossRef]
- Boujelbene, R.; Jemaa, Y.B.; Zribi, M. A comparative study of recent improvements in wavelet-based image coding schemes. Multimed. Tools Appl. 2019, 78, 1649–1683. [Google Scholar] [CrossRef]
- Pun, C. A Novel DFT-based Digital Watermarking System for Images. In Proceedings of the 2006 8th international Conference on Signal Processing, Guilin, China, 16–20 November 2006; IEEE: Piscataway, NJ, USA, 2006; Volume 2, pp. 3–6. [Google Scholar]
- Singh, R.; Rawat, P.; Shukla, P. Robust Medical Image Authentication using 2-D Stationary Wavelet Transform and Edge Detection. In Proceedings of the 2nd IET International Conference on Biomedical Image and Signal Processing (ICBISP 2017), Wuhan, China, 13–14 May 2017; Institution of Engineering and Technology: Stevenage, UK, 2017; Volume 2017, pp. 1–8. [Google Scholar]
- Wang, Y.; Bai, X.; Yan, S. Digital image watermarking based on texture block and edge detection in the discrete wavelet domain. In Proceedings of the 2013 International Conference on Sensor Network Security Technology and Privacy Communication System, Harbin, China, 18–19 May 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 170–174. [Google Scholar]
- Singh, S.P.; Bhatnagar, G. A new robust watermarking system in integer DCT domain. J. Vis. Commun. Image Represent. 2018, 53, 86–101. [Google Scholar] [CrossRef]
- Rai, A.; Singh, H.V. A Robust Watermarking Scheme Using Machine Learning Transmitted Over High-Speed Network for Smart Cities. In Future Generation Computer Systems; Hassanien, A.E., Elhoseny, M., Ahmed, S.H., Singh, A.K., Eds.; Lecture Notes in Intelligent Transportation and Infrastructure; Springer International Publishing: Cham, Switzerland, 2019; Volume 9, pp. 257–277. ISBN 978-3-030-01559-6. [Google Scholar]
- Chan, C.-K.; Cheng, L.M. Hiding data in images by simple LSB substitution. Pattern Recognit. 2004, 37, 469–474. [Google Scholar] [CrossRef]
- Hussain, M.; Wahab, A.W.A.; Idris, Y.I.B.; Ho, A.T.S.; Jung, K.-H. Image steganography in spatial domain: A survey. Signal Process. Image Commun. 2018, 65, 46–66. [Google Scholar] [CrossRef]
- Hong, W.; Chen, T. A Novel Data Embedding Method Using Adaptive Pixel Pair Matching. IEEE Trans. Inf. Forensics Secur. 2012, 7, 176–184. [Google Scholar] [CrossRef]
- Ahmaderaghi, B.; Del Rincon, J.M.; Kurugollu, F.; Bouridane, A. Perceptual watermarking for Discrete Shearlet transform. In Proceedings of the 2014 5th European Workshop on Visual Information Processing (EUVIP), Paris, France, 10–12 December 2014; IEEE: Piscataway, NJ, USA, 2014; pp. 1–6. [Google Scholar]
- Gibert, X.; Patel, V.M.; Labate, D.; Chellappa, R. Discrete shearlet transform on GPU with applications in anomaly detection and denoising. EURASIP J. Adv. Signal Process. 2014, 2014, 64. [Google Scholar] [CrossRef]
- Ray, A.; Roy, S. Recent trends in image watermarking techniques for copyright protection: A survey. Int. J. Multimed. Inf. Retr. 2020, 9, 249–270. [Google Scholar] [CrossRef]
- Chang, I.C.; Hu, Y.C.; Chen, W.L.; Lo, C.C. High capacity reversible data hiding scheme based on residual histogram shifting for block truncation coding. Signal Process. 2015, 108, 376–388. [Google Scholar] [CrossRef]
- Singh, A.K.; Kumar, B.; Dave, M.; Mohan, A. Robust and Imperceptible Dual Watermarking for Telemedicine Applications. Wirel. Pers. Commun. 2015, 80, 1415–1433. [Google Scholar] [CrossRef]
- Qasim, A.F.; Meziane, F.; Aspin, R. Digital watermarking: Applicability for developing trust in medical imaging workflows state of the art review. Comput. Sci. Rev. 2018, 27, 45–60. [Google Scholar] [CrossRef]
- Hurrah, N.N.; Parah, S.A.; Sheikh, J.A.; Al-Turjman, F.; Muhammad, K. Secure data transmission framework for confidentiality in IoTs. Ad. Hoc. Netw. 2019, 95, 101989. [Google Scholar] [CrossRef]
- Verma, V.S.; Jha, R.K. An Overview of Robust Digital Image Watermarking. IETE Tech. Rev. 2015, 32, 479–496. [Google Scholar] [CrossRef]
- Mohanty, S.P.; Bhargava, B.K. Invisible watermarking based on creation and robust insertion-extraction of image adaptive watermarks. ACM Trans. Multimed. Comput. Commun. Appl. 2008, 5, 1–22. [Google Scholar] [CrossRef] [Green Version]
- Ahmed, F.; Sattar, F.; Siyal, M.Y.; Yu, D. A Secure Watermarking Scheme for Buyer-Seller Identification and Copyright Protection. EURASIP J. Adv. Signal Process. 2006, 2006, 056904. [Google Scholar] [CrossRef] [Green Version]
- Khan, A.; Jabeen, F.; Naz, F.; Suhail, S.; Ahmed, M.; Nawaz, S. Buyer seller watermarking protocols issues and challenges—A survey. J. Netw. Comput. Appl. 2016, 75, 317–334. [Google Scholar] [CrossRef]
- Artru, R.; Gouaillard, A.; Ebrahimi, T. Digital Watermarking of video streams: Review of the State-Of-The-Art. arXiv 2019, arXiv:1908.02039. [Google Scholar]
- Lee, C.-F.; Shen, J.-J.; Chen, Z.-R.; Agrawal, S. Self-Embedding Authentication Watermarking with Effective Tampered Location Detection and High-Quality Image Recovery. Sensors 2019, 19, 2267. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Coatrieux, G.; Lecornu, L.; Sankur, B.; Roux, C. A Review of Image Watermarking Applications in Healthcare. In Proceedings of the 2006 International Conference of the IEEE Engineering in Medicine and Biology Society, New York, NY, USA, 30 August–3 September 2006; IEEE: Piscataway, NJ, USA, 2006; pp. 4691–4694. [Google Scholar]
- Low, S.H.; Maxemchuk, N.F.; Brassil, J.T.; O’Gorman, L. Document marking and identification using both line and word shifting. In Proceedings of the Proceedings of INFOCOM’95, Boston, MA, USA, 2–6 April 1995; IEEE Comput. Soc. Press: Piscataway, NJ, USA, 1995; Volume 2, pp. 853–860. [Google Scholar]
- Singh, A.K.; Kumar, B.; Singh, G.; Mohan, A. Medical Image Watermarking Techniques: A Technical Survey and Potential Challenges. In Medical Image Watermarking; Springer International Publishing: Cham, Switzerland, 2017; pp. 13–41. ISBN 9783319576992. [Google Scholar]
- Tao, H.; Chongmin, L.; Mohamad Zain, J.; Abdalla, A.N. Robust Image Watermarking Theories and Techniques: A Review. J. Appl. Res. Technol. 2014, 12, 122–138. [Google Scholar] [CrossRef] [Green Version]
- Zhou, X.; Zhang, H.; Wang, C. A Robust Image Watermarking Technique Based on DWT, APDCBT, and SVD. Symmetry 2018, 10, 77. [Google Scholar] [CrossRef] [Green Version]
- Cayre, F.; Fontaine, C.; Furon, T. Watermarking security part one: Theory. In Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VII, San Jose, CA, USA, 17–20 January 2005; 2005; Volume 5681, p. 746. [Google Scholar]
- Bordel, B.; Alcarria, R.; Robles, T.; Iglesias, M.S. Data Authentication and Anonymization in IoT Scenarios and Future 5G Networks Using Chaotic Digital Watermarking. IEEE Access 2021, 9, 22378–22398. [Google Scholar] [CrossRef]
- Sattar, F.; Yu, D. Forensic Watermarking for Secure Multimedia Distribution. In Socioeconomic and Legal Implications of Electronic Intrusion; IGI Global: Hershey, PA, USA, 2009; pp. 261–280. [Google Scholar]
- Parah, S.A.; Sheikh, J.A.; Loan, N.A.; Bhat, G.M. Robust and blind watermarking technique in DCT domain using inter-block coefficient differencing. Digit. Signal Process. 2016, 53, 11–24. [Google Scholar] [CrossRef]
- Umar, M.M.; Mehmood, A.; Song, H.; Choo, K.-K.R. I-Marks: An iris code embedding system for ownership identification of multimedia content. Comput. Electr. Eng. 2017, 63, 209–219. [Google Scholar] [CrossRef]
- Alkawaz, M.H.; Sulong, G.; Saba, T.; Almazyad, A.S.; Rehman, A. Concise analysis of current text automation and watermarking approaches. Secur. Commun. Netw. 2016, 9, 6365–6378. [Google Scholar] [CrossRef]
- Janu, N.; Kumar, A.; Dadheech, P.; Sharma, G.; Kumar, A.; Raja, L. Multiple Watermarking Scheme for Video & Image for Authentication & Copyright Protection. In Proceedings of the IOP Conference Series: Materials Science and Engineering, Jeju Island, Korea, 12–14 March 2021; Volume 1131, p. 012020. [Google Scholar]
- Priya, C.V.L.; Raj, N.R.N. Digital watermarking scheme for image authentication. In Proceedings of the 2017 IEEE International Conference on Communication and Signal Processing (ICCSP), Chennai, India, 6–8 April 2017; pp. 2026–2030. [Google Scholar]
- Chen, L.; Kong, X.; Weng, B.; Yao, Z.; Pan, R. A Novel Robust Mesh Watermarking Based on BNBW. EURASIP J. Adv. Signal Process. 2011, 2011, 216783. [Google Scholar] [CrossRef] [Green Version]
- Korus, P.; Białas, J.; Dziech, A. A new approach to high-capacity annotation watermarking based on digital fountain codes. Multimed. Tools Appl. 2014, 68, 59–77. [Google Scholar] [CrossRef] [Green Version]
- Jadooki, S.; Mohamad, D.; Saba, T.; Almazyad, A.S.; Rehman, A. Fused features mining for depth-based hand gesture recognition to classify blind human communication. Neural Comput. Appl. 2017, 28, 3285–3294. [Google Scholar] [CrossRef]
- Fadhil, M.S.; Alkawaz, M.H.; Rehman, A.; Saba, T. Writers Identification Based on Multiple Windows Features Mining. 3D Res. 2016, 7, 8. [Google Scholar] [CrossRef]
- Su, J.K.; Eggers, J.J.; Girod, B. Analysis of digital watermarks subjected to optimum linear filtering and additive noise. Signal Process. 2001, 81, 1141–1175. [Google Scholar] [CrossRef] [Green Version]
- Zhu, X.-S.; Sun, Y.; Meng, Q.-H.; Sun, B.; Wang, P.; Yang, T. Optimal watermark embedding combining spread spectrum and quantization. EURASIP J. Adv. Signal Process. 2016, 2016, 74. [Google Scholar] [CrossRef] [Green Version]
- Jain, R.; Kumar, M.; Jain, A.K.; Jain, M. Digital Image Watermarking using Hybrid DWT-FFT technique with different attacks. In Proceedings of the 2015 International Conference on Communications and Signal Processing (ICCSP), Melmaruvathur, India, 2–4 April 2015; IEEE: Piscataway, NJ, USA, 2015; pp. 0672–0675. [Google Scholar]
- Soderi, S. Acoustic-Based Security: A Key Enabling Technology for Wireless Sensor Networks. Int. J. Wirel. Inf. Networks 2020, 27, 45–59. [Google Scholar] [CrossRef]
- Cox, I.J.; Linnartz, J.-P.M.G. Some general methods for tampering with watermarks. IEEE J. Sel. Areas Commun. 1998, 16, 587–593. [Google Scholar] [CrossRef] [Green Version]
- Al-Emran, M.; Malik, S.I.; Al-Kabi, M.N. A Survey of Internet of Things (IoT) in Education: Opportunities and Challenges. In Toward Social Internet of Things (SIoT): Enabling Technologies, Architectures and Applications; Springer International Publishing: Berlin/Heidelberg, Germany, 2020; pp. 197–209. ISBN 9783030245139. [Google Scholar]
- Yi, L.; Tong, X.; Wang, Z.; Zhang, M.; Zhu, H.; Liu, J. A Novel Block Encryption Algorithm Based on Chaotic S-Box for Wireless Sensor Network. IEEE Access 2019, 7, 53079–53090. [Google Scholar] [CrossRef]
- Khashan, O.A.; Ahmad, R.; Khafajah, N.M. An automated lightweight encryption scheme for secure and energy-efficient communication in wireless sensor networks. Ad. Hoc. Netw. 2021, 115, 102448. [Google Scholar] [CrossRef]
- Kumar, V.; Tiwari, S. Routing in IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN): A Survey. J. Comput. Netw. Commun. 2012, 2012, 1–10. [Google Scholar] [CrossRef] [Green Version]
- Zhang, X.; Heys, H.M.; Li, C. Energy efficiency of encryption schemes applied to wireless sensor networks. Secur. Commun. Netw. 2012, 5, 789–808. [Google Scholar] [CrossRef] [Green Version]
- Yang, Y.; Wu, L.; Yin, G.; Li, L.; Zhao, H. A Survey on Security and Privacy Issues in Internet-of-Things. IEEE Internet Things J. 2017, 4, 1250–1258. [Google Scholar] [CrossRef]
- Sicari, S.; Rizzardi, A.; Grieco, L.A.; Coen-Porisini, A. Security, privacy and trust in Internet of Things: The road ahead. Comput. Netw. 2015, 76, 146–164. [Google Scholar] [CrossRef]
- Lee, C.-C. Security and Privacy in Wireless Sensor Networks: Advances and Challenges. Sensors 2020, 20, 744. [Google Scholar] [CrossRef] [Green Version]
- Chatzigiannakis, I.; Vitaletti, A.; Pyrgelis, A. A privacy-preserving smart parking system using an IoT elliptic curve based security platform. Comput. Commun. 2016, 89–90, 165–177. [Google Scholar] [CrossRef]
- Sheikh, J.A.; Akhter, S.; Parah, S.A.; Bhat, G.M. Blind digital speech watermarking using filter bank multicarrier modulation for 5G and IoT driven networks. Int. J. Speech Technol. 2018, 21, 715–722. [Google Scholar] [CrossRef]
- Ferdowsi, A.; Saad, W. Deep Learning-Based Dynamic Watermarking for Secure Signal Authentication in the Internet of Things. In Proceedings of the 2018 IEEE International Conference on Communications (ICC), Kansas City, MO, USA, 20–24 May 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 1–6. [Google Scholar]
- Li, D.; Deng, L.; Bhooshan Gupta, B.; Wang, H.; Choi, C. A novel CNN based security guaranteed image watermarking generation scenario for smart city applications. Inf. Sci. 2019, 479, 432–447. [Google Scholar] [CrossRef]
- Sarwar, K.; Yongchareon, S.; Yu, J. Lightweight ECC with Fragile Zero-Watermarking for Internet of Things Security. In Proceedings of the 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), New York, NY, USA, 1–3 August 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 867–872. [Google Scholar]
- Al-Shayea, T.K.; Mavromoustakis, C.X.; Batalla, J.M.; Mastorakis, G.; Mukherjee, M.; Chatzimisios, P. Efficiency-Aware Watermarking using Different Wavelet Families for the Internet of Things. In Proceedings of the ICC 2019—2019 IEEE International Conference on Communications (ICC), Shanghai, China, 20–24 May 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 1–6. [Google Scholar]
- Al-Shayea, T.K.; Mavromoustakis, C.X.; Batalla, J.M.; Mastorakis, G.; Pallis, E.; Markakis, E.K.; Panagiotakis, S.; Khan, I. Medical Image Watermarking in Four Levels Decomposition of DWT Using Multiple Wavelets in IoT Emergence. In Artificial Intelligence and The Environmental Crisis; Springer: Cham, Switzerland, 2020; pp. 15–31. ISBN 9783030449063. [Google Scholar]
- Liang, W.; Huang, W.; Long, J.; Zhang, K.; Li, K.-C.; Zhang, D. Deep Reinforcement Learning for Resource Protection and Real-Time Detection in IoT Environment. IEEE Internet Things J. 2020, 7, 6392–6401. [Google Scholar] [CrossRef]
- Hoang, T.-M.; Bui, V.-H.; Vu, N.-L.; Hoang, D.-H. A Lightweight Mixed Secure Scheme based on the Watermarking Technique for Hierarchy Wireless Sensor Networks. In Proceedings of the 2020 International Conference on Information Networking (ICOIN), Barcelona, Spain, 7–10 January 2020; IEEE: Piscataway, NJ, USA, 2020; pp. 649–653. [Google Scholar]
- Sun, J.; Wang, W.; Kou, L.; Lin, Y.; Zhang, L.; Da, Q.; Chen, L. A data authentication scheme for UAV ad hoc network communication. J. Supercomput. 2020, 76, 4041–4056. [Google Scholar] [CrossRef]
- Babaeer, H.A.; AL-ahmadi, S.A. Efficient and Secure Data Transmission and Sinkhole Detection in a Multi-Clustering Wireless Sensor Network Based on Homomorphic Encryption and Watermarking. IEEE Access 2020, 8, 1. [Google Scholar] [CrossRef]
- Yaseen, H.A.; Alsalamin, M.; Jarwan, A.; Al-Mistarihi, M.F.; Darabkh, K.A. A Secure Energy-Aware Adaptive Watermarking System for Wireless Image Sensor Networks. In Proceedings of the 2018 15th International Multi-Conference on Systems, Signals & Devices (SSD), Yasmine Hammamet, Tunisia, 19–22 March 2018; IEEE: Piscataway, NJ, USA, 2018; Volume 2, pp. 12–16. [Google Scholar]
- Kamel, I.; Juma, H. A Lightweight Data Integrity Scheme for Sensor Networks. Sensors 2011, 11, 4118–4136. [Google Scholar] [CrossRef]
- Kamel, I.; Juma, H. Simplified watermarking scheme for sensor networks. Int. J. Internet Protoc. Technol. 2010, 5, 101. [Google Scholar] [CrossRef]
- Boubiche, D.E.; Boubiche, S.; Toral-Cruz, H.; Pathan, A.-S.K.; Bilami, A.; Athmani, S. SDAW: Secure data aggregation watermarking-based scheme in homogeneous WSNs. Telecommun. Syst. 2016, 62, 277–288. [Google Scholar] [CrossRef]
- Sivasubramanian, N.; Konganathan, G. A novel semi fragile watermarking technique for tamper detection and recovery using IWT and DCT. Computing 2020, 102, 1365–1384. [Google Scholar] [CrossRef]
- Rajeswari, S.R.; Seenivasagam, V. Comparative Study on Various Authentication Protocols in Wireless Sensor Networks. Sci. World J. 2016, 2016, 1–16. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Kaw, J.A.; Loan, N.A.; Parah, S.A.; Muhammad, K.; Sheikh, J.A.; Bhat, G.M. A reversible and secure patient information hiding system for IoT driven e-health. Int. J. Inf. Manag. 2019, 45, 262–275. [Google Scholar] [CrossRef]
- Shi, X.; Xiao, D. A reversible watermarking authentication scheme for wireless sensor networks. Inf. Sci. 2013, 240, 173–183. [Google Scholar] [CrossRef]
- Hameed, K.; Khan, A.; Ahmed, M.; Goutham Reddy, A.; Rathore, M.M. Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks. Futur. Gener. Comput. Syst. 2018, 82, 274–289. [Google Scholar] [CrossRef]
- Nguyen, V.-T.; Hoang, T.-M.; Duong, T.-A.; Nguyen, Q.-S.; Bui, V.-H. A Lightweight Watermark Scheme Utilizing MAC Layer Behaviors for Wireless Sensor Networks. In Proceedings of the 2019 3rd International Conference on Recent Advances in Signal Processing, Telecommunications & Computing (SigTelCom), Hanoi, Vietnam, 21–22 March 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 176–180. [Google Scholar]
Authors | Technique Type | Medium | Contributions Key | Metrics | Advantages | Attacks |
---|---|---|---|---|---|---|
Al-Shayea et al. [98] | Robust | Image | Four levels of the DWT are used and each level contains different wavelet families. | MSE PSNR SSIM | Improves robustness | Noise, Median, Mean, Gaussian noise, Adjust image, Rotation, and JPEG |
Al-Shayea et al. [97] | Robust | Image | The biorthogonal family is used in the watermarking process. | MSE PSNR SNR | Improves robustness | Noise, Median, Mean, Gaussian noise, Adjust image, and Rotation |
Loan et al. [32] | Robust Secure | Image | The DCT with the Arnold transform and chaotic encryption. | Capacity PSNR SSIM BER | Salt and pepper noise, Gaussian noise, Median, and sharpening | |
Hurrah et al. [55] | Robust Secure | Image | The coefficient and block approach has been implemented for embedding the data. | PSNR BER | Improves data confidentiality | Rotation, Croppinghistogram equalization, and Sharpening |
Ferdowsi and Saad [94] | Secure Deep learning | Any data | Long Short-Term Memory blocks along with the dynamic watermarking algorithm | BER | Improves attack detection | Eavesdropping and Data injection |
Liang et al. [99] | Secure Deep learning | Any type | Combines the neural networks technology and virtual mapping function along with an appropriate watermarking technique. | Detection time Detection speed BER | Improves attack detection Reduces computational overhead. | Hardware |
T. M. Hoang et al. [100] | Secure Privacy | Any data | Two random keys are used along with the watermarking algorithm | BER Complexity | Improves attack detection | Spoofing |
Sarwar et al. [96] | Secure Fragile | Any data | Combination between the ECC algorithm and the fragile zero watermarking algorithm. | Memory cost Computational Cost | Reduces the computational overhead | |
Sun et al. [101] | Secure | Any type | Two different watermarking processes are applied along within a clustering approach. | False positive rate Energy consumption Average delay | Improves data integrity Reduces the computational overhead | Replay, Tamper, and Data forgery |
Babaeer and Al-Ahmadi [102] | Secure | Any type | The homomorphic and random watermarking methods are embedded with each block of data. | Delay Packet delivery ratio Energy consumption | Improves data integrity Reduces energy consumption | Modification, Replay, and Insertion |
Yaseen et al. [103] | Secure | Image | The DCT, DFT and DWT are used in the embedding phase along with the hash function. | NC PSNR BER | Improves data integrity | Tamper attack |
Kamel and Juma [105] | Fragile | Any type | Grouping delimiters and hash function are used along with the chained watermarks. | Average embedding time Average extraction time | Reduces the computational overhead Improves attack detection. | Insertion, Modification, and Deletion. |
Zhang et al. [16] | Fragile | Any type | Hash function along with its dynamic random watermark position. | Capacity Positive rateEnergy consumption | Improves data integrity Reduces the computational overhead. | Tampering, Data forgery, Deletion, and Replay |
Boubiche et al. [106] | Fragile | Any type | The MAC address and hashed data are xored with the original data in the embedding phase. | Energy consumption Average delay False positive rate | Improves data integrity | Modification |
Sivasubramanian and Konganathan. [107] | Semi-fragile | Image | Uses semi-fragile IWT and DCT methods for recovery and tamper detection by using the IWT. | PSNR | Improves attack detection | Tampering, Salt, Gaussian blur, and Gamma correction |
Lee et al. [61] | Fragile Secure | Image | Block-wise and pixel-wise methods have been implemented for the watermarking algorithm. | False positive rate False negative rate Error rate PNSR | Improves attacks detection and recovery | Clipping, Baboon, and Tampering |
Kaw et al. [109] | Reversible Secure | Image | Implements methods like the optimal pixel repetition method where the pixel permutation is reversibly embedded within the data. | PSNR | Improves data integrity | Statistical attacks |
Shi and Xiao [110] | Reversible Secure | Image | A reversible watermark technique that is based on the prediction-error expansion. | False positive rate False negative rate | Improves data integrity Reduces computational overhead | Tampering, Deletion, and Insertion |
Alromih et al. [15] | Secure | Any type | The randomised watermarking filtering algorithm to achieve data filtering on traffic instead of an end-to-end filtering. | Energy consumption Average of filtered packet. | Improves data integrity Reduces the computational overhead | Injection and Physical attacks |
Hameed et al. [111] | Secure | Any type | Length of data, frequency of digits and time of captured data are all used along with the original data for the embedding process. | Energy consumption Computational time | Improves data integrity | Eavesdropping and Malicious node |
Rai and Singh. [45] | Robust | Image | The SVM classification and hybrid watermarking technique (DWT and SVD) have been implemented in the embedding process. | BER SNR PSNR SSIM | Improves robustness | Salt, Gaussian noise, speckle, Median, and Crop |
Soderi [82] | Blind Secure Robust | Audio | Combines a blind watermark algorithm with the jamming technique over the acoustic channel for embedding the data | SNR BER | Improves data integrity Improves robustness | Eavesdropping and confidentiality |
Nguyen et al. [112] | Secure | Any type | The MAC layer parameters are used along with the DWT and DCT methods for embedding existing watermarks. | Detection probability | Improves attack detection | Clone |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Wazirali, R.; Ahmad, R.; Al-Amayreh, A.; Al-Madi, M.; Khalifeh, A. Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview. Electronics 2021, 10, 1744. https://doi.org/10.3390/electronics10141744
Wazirali R, Ahmad R, Al-Amayreh A, Al-Madi M, Khalifeh A. Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview. Electronics. 2021; 10(14):1744. https://doi.org/10.3390/electronics10141744
Chicago/Turabian StyleWazirali, Raniyah, Rami Ahmad, Ahmed Al-Amayreh, Mohammad Al-Madi, and Ala’ Khalifeh. 2021. "Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview" Electronics 10, no. 14: 1744. https://doi.org/10.3390/electronics10141744
APA StyleWazirali, R., Ahmad, R., Al-Amayreh, A., Al-Madi, M., & Khalifeh, A. (2021). Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview. Electronics, 10(14), 1744. https://doi.org/10.3390/electronics10141744