Titre : |
An optimal watermarking technique for copyright protection in IoT |
Type de document : |
texte imprimé |
Auteurs : |
Seifeddine Djelili, Auteur ; Oussama Benaziz ; Amira Benaidja, Directeur de thèse |
Editeur : |
Setif:UFA |
Année de publication : |
2024 |
Importance : |
1 vol (42 f .) |
Format : |
29 cm |
Langues : |
Anglais (eng) |
Catégories : |
Thèses & Mémoires:Informatique
|
Mots-clés : |
Digital watermarking
Internet of Things (IoT)
Digital image watermarking
Image quality
Robustness |
Index. décimale : |
004 - Informatique |
Résumé : |
Digital watermarking is a technique used to embed information into digital
content to protect ownership rights, verify integrity, and provide additional
data. The Internet of Things (IoT) is a network of interconnected devices that
collect, exchange, and process data, requiring secure and efficient methods to
ensure data authenticity and integrity. In this context, we focus on digital image
watermarking in the IoT, which specifically embeds data within images. This
embedded information, or watermark, is usually imperceptible to the human eye
but can be detected and extracted using specific algorithms. Watermarking can
be applied in both spatial and frequency domains, providing various levels of
robustness against image processing operations like compression, cropping, and
noise. This field faces challenges such as maintaining image quality, ensuring
robustness against attacks, and minimizing computational overhead.
This work introduces a novel image watermarking technique, PR-SVD, which
combines pseudorandom techniques with Singular Value Decomposition (SVD).
The method enhances security and robustness by applying pseudorandom transformations
to the watermark and randomly inserting it into the host image
post-SVD decomposition. This technique addresses key challenges such as
maintaining image quality, ensuring robustness against attacks, and reducing
computational overhead. Simulations have shown that PR-SVD outperforms
the traditional SVD method in these aspects. |
Note de contenu : |
Sommaire
General Introduction 10
1 Watermarking and IoT 11
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.2 What is Watermarking??? . . . . . . . . . . . . . . . . . . . . . 11
1.2.1 Recent Applications of Watermarking . . . . . . . . . . . 11
1.3 What is Internet of Things (IoT)? . . . . . . . . . . . . . . . . . 12
1.4 Digital image waterking in the IoT . . . . . . . . . . . . . . . . 13
1.4.1 Fundamentals of Digital Image Watermarking . . . . . . 13
1.4.2 Techniques for Digital Image Watermarking . . . . . . . 14
1.5 Applications of Digital Image Watermarking in IoT . . . . . . . 15
1.6 Attacks on Watermarking . . . . . . . . . . . . . . . . . . . . . 15
1.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2 Review on digital image
watermarking techniques 17
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.2 About the history of digital watermarking . . . . . . . . . . . . 17
2.3 Techniques of digital Image Watermarking . . . . . . . . . . . . 17
2.3.1 Watermarking Approaches in Spatial Domain . . . . . . 17
2.3.2 The frequency (or transform) domain watermarking algorithms 18
2.3.3 Hybrid domain watermarking algorithm . . . . . . . . . 20
2.4 Examining Related Works on Copyright Protection and Image
Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2.4.1 Spatial Domain Watermarking Techniques . . . . . . . . 20
2.4.2 Frequency/Transform Watermarking Techniques . . . . . 21
2.4.3 Hybrid Domain Watermarking Techniques . . . . . . . . 22
2.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3 Proposed solution (PR-SVD) 24
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.2 Proposed solution(PR-SVD) . . . . . . . . . . . . . . . . . . . . 24
3.2.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.3 Singular Value Decomposition (SVD) . . . . . . . . . . . . . . . 26
3.3.1 Watermark Embedding . . . . . . . . . . . . . . . . . . . 27
3.3.2 Watermark Extraction . . . . . . . . . . . . . . . . . . . 27
3.4 Pseudorandom . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
4 Performance Evaluation 30
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.2 Experimentation setting . . . . . . . . . . . . . . . . . . . . . . 30
4.3 Experimentation results . . . . . . . . . . . . . . . . . . . . . . 32
4.3.1 Imperceptibility: . . . . . . . . . . . . . . . . . . . . . . 33
4.3.2 Robustness: . . . . . . . . . . . . . . . . . . . . . . . . . 34
4.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 |
Côte titre : |
MAI/0908
|
An optimal watermarking technique for copyright protection in IoT [texte imprimé] / Seifeddine Djelili, Auteur ; Oussama Benaziz ; Amira Benaidja, Directeur de thèse . - [S.l.] : Setif:UFA, 2024 . - 1 vol (42 f .) ; 29 cm. Langues : Anglais ( eng)
Catégories : |
Thèses & Mémoires:Informatique
|
Mots-clés : |
Digital watermarking
Internet of Things (IoT)
Digital image watermarking
Image quality
Robustness |
Index. décimale : |
004 - Informatique |
Résumé : |
Digital watermarking is a technique used to embed information into digital
content to protect ownership rights, verify integrity, and provide additional
data. The Internet of Things (IoT) is a network of interconnected devices that
collect, exchange, and process data, requiring secure and efficient methods to
ensure data authenticity and integrity. In this context, we focus on digital image
watermarking in the IoT, which specifically embeds data within images. This
embedded information, or watermark, is usually imperceptible to the human eye
but can be detected and extracted using specific algorithms. Watermarking can
be applied in both spatial and frequency domains, providing various levels of
robustness against image processing operations like compression, cropping, and
noise. This field faces challenges such as maintaining image quality, ensuring
robustness against attacks, and minimizing computational overhead.
This work introduces a novel image watermarking technique, PR-SVD, which
combines pseudorandom techniques with Singular Value Decomposition (SVD).
The method enhances security and robustness by applying pseudorandom transformations
to the watermark and randomly inserting it into the host image
post-SVD decomposition. This technique addresses key challenges such as
maintaining image quality, ensuring robustness against attacks, and reducing
computational overhead. Simulations have shown that PR-SVD outperforms
the traditional SVD method in these aspects. |
Note de contenu : |
Sommaire
General Introduction 10
1 Watermarking and IoT 11
1.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
1.2 What is Watermarking??? . . . . . . . . . . . . . . . . . . . . . 11
1.2.1 Recent Applications of Watermarking . . . . . . . . . . . 11
1.3 What is Internet of Things (IoT)? . . . . . . . . . . . . . . . . . 12
1.4 Digital image waterking in the IoT . . . . . . . . . . . . . . . . 13
1.4.1 Fundamentals of Digital Image Watermarking . . . . . . 13
1.4.2 Techniques for Digital Image Watermarking . . . . . . . 14
1.5 Applications of Digital Image Watermarking in IoT . . . . . . . 15
1.6 Attacks on Watermarking . . . . . . . . . . . . . . . . . . . . . 15
1.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2 Review on digital image
watermarking techniques 17
2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.2 About the history of digital watermarking . . . . . . . . . . . . 17
2.3 Techniques of digital Image Watermarking . . . . . . . . . . . . 17
2.3.1 Watermarking Approaches in Spatial Domain . . . . . . 17
2.3.2 The frequency (or transform) domain watermarking algorithms 18
2.3.3 Hybrid domain watermarking algorithm . . . . . . . . . 20
2.4 Examining Related Works on Copyright Protection and Image
Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
2.4.1 Spatial Domain Watermarking Techniques . . . . . . . . 20
2.4.2 Frequency/Transform Watermarking Techniques . . . . . 21
2.4.3 Hybrid Domain Watermarking Techniques . . . . . . . . 22
2.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
3 Proposed solution (PR-SVD) 24
3.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.2 Proposed solution(PR-SVD) . . . . . . . . . . . . . . . . . . . . 24
3.2.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . 24
3.3 Singular Value Decomposition (SVD) . . . . . . . . . . . . . . . 26
3.3.1 Watermark Embedding . . . . . . . . . . . . . . . . . . . 27
3.3.2 Watermark Extraction . . . . . . . . . . . . . . . . . . . 27
3.4 Pseudorandom . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
3.5 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
4 Performance Evaluation 30
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
4.2 Experimentation setting . . . . . . . . . . . . . . . . . . . . . . 30
4.3 Experimentation results . . . . . . . . . . . . . . . . . . . . . . 32
4.3.1 Imperceptibility: . . . . . . . . . . . . . . . . . . . . . . 33
4.3.2 Robustness: . . . . . . . . . . . . . . . . . . . . . . . . . 34
4.4 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38 |
Côte titre : |
MAI/0908
|
|