Intelligent Watermarking for Data Security: An Overview

Intelligent Watermarking for Data Security: An Overview

DOI: 10.4018/979-8-3693-0497-6.ch015
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Artificial intelligence has become widely and increasingly used in various advanced applications, notably classification, optimization, object recognition, and segmentation. Recently, it has been extended into watermarking techniques. It brings some approaches implying innovative security means, which are adjusted to new communications and information technologies. As it generally believed that the use of artificial intelligence in digital watermarking schemes could revolutionize the way digital data is protected. This chapter is about an overview of recent developments in artificial intelligence techniques utilized for watermarking. It begins with the watermarking background. Next, it represents a review of machine and deep learning watermarking techniques followed by a delineation of their advantages and disadvantages. In this light, the main problems are pinpointed with a suggestion of some possible discussed and highlighted solutions. The last point of this chapter is about outlining future research directions.
Chapter Preview
Top

Introduction

Artificial intelligence (AI) is the process of developing and implementing a number of techniques designed to enable computers to imitate human intelligence. Artificial intelligence (AI) offers many benefits and can have a significant impact on various sectors for improving efficiency and productivity, and for making faster and more accurate decisions. In this context machine learning and deep learning has become a promising solution for solving various intelligence related problems. It can be actively used for watermarking (Cox,2002) which is defined as a technique that involves inserting a message, logo or signature into digital data. The objective is to make it possible to verify the assertion of ownership, the content authentication or the copy Control. Watermarking techniques based on artificial intelligence algorithms are called Intelligent Watermarking (IW) techniques.

Classic watermarking techniques have been the subject of a great deal of research and overview. (Cox, 2002), (Podilchuk, 2001), (Mahto,2021),(Kumaraswamy,2020). However, a limited number of studies have been concerned with intelligent watermarking. In his book (Pan, 2004), Pan gives a general introduction of digital watermarking by focusing on its areas of use, categories and other various characteristics. He ends with listing a number of classic watermarking methods. Solely, the last part of his book is kept for intelligent watermarking methods in which he covers soft computing and machine learning. Nonetheless, the AI methods were merely recognized within a classic framework. In (Singh, 2022), Singh reviews watermarking properties, applications and attacks. Generally, he reviews various watermarking techniques in the space and frequency domains by pinpointing the transition from the classical techniques into the new ones featuring with soft computing. He investigates grey scale and colour images in addition to a video. Wu (Wu, 2014) examines watermarking techniques by shedding light on the optimization algorithms, also known as soft computing, and by processing the three methods of the genetic algorithms (GA) (Katoch, 2021), the particle swarm optimization (PSO)(Clerc, 2010),and the differential evolution (DE)(Opara, 2019). They are detailed and compared, essentially by showing their advantages and disadvantages, each apart.

The aim of this book chapter is to provide an overview of intelligent watermarking for digital data. This chapter presents a detailed study of watermarking using current and popular technologies, such as artificial intelligence, soft computing, machine learning and deep learning. It also presents a general introduction to watermarking, the type of watermark, the insertion domain, the extraction schema and the most used watermarking applications. The major role and contributions of advanced technologies in watermarking are also underlined. A range of existing WI techniques is presented and the contributions of the studied approaches are discussed and compared. Finally, the book's chapter highlights the advantages and disadvantages of these WI techniques, opening the way to new research directions in this new area.

Key Terms in this Chapter

Rectified Linear Activation Function (RELU): Is the most commonly used activation function in many deep learning networks. It is easy to train and often leads to better performance. If it is positive, it returns the input directly; otherwise it turns back to the zero value.

Arnold Transformation: It is also known as Arnold’s cat map. It is a mathematical transformation, which can be applied to a 2Dimage. It involves an iterative rearranging of the image pixels position in way which preserves the surface but radically alters the appearance. This transformation is often used for encryption purposes.

Batch Normalization (BN): Is a standardization technique used in deep learning network algorithms. It stabilizes the learning process and reduces the number of the learning epochs required to train deep networks.

Complete Chapter List

Search this Book:
Reset