Hardware approaches for media and information protection and authentication

Hardware approaches for media and information protection and authentication

For access to this article, please select a purchase option:

Buy chapter PDF
(plus tax if applicable)
Buy Knowledge Pack
10 chapters for $120.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Your details
Why are you recommending this title?
Select reason:
IP Core Protection and Hardware-Assisted Security for Consumer Electronics — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

Technology scaling has allowed us to design high-performance devices with a lowpower consumption. The advent of IoT has increased the versatility of data collection and there are many different ways of collecting and transferring data over the Internet. The data that is being collected is also in different forms, that is, text, images, videos, and audios. When they are shared, for a legit use, attackers can break the security and use them for illegible purposes or claim ownership to sell them commercially. This has been the trend lately where many counterfeit products are appearing in the market. This section discusses the digital watermarking, different schemes of digital watermarking, and how a media object can be secured using a watermark. They are also not completely resistant to attacks and measures need to be taken to secure the content that is being watermarked. The chapter also presents different issues with the watermark implementations, attacks and countermeasures to those attacks on watermarking. Section 11.1 presents a broad overview of the IP protection. Section 11.2 discusses the generic overview and components of any watermark system. Section 11.3 summarizes various types of watermarks. Section 11.4 discusses various applications of watermarking. Section 11.5 presents desired characteristics of watermarks. Sections 11.6 discusses the technical challenges of the watermarking. Section 11.7 discusses hardware-based watermarking systems available in the current literature. Section 11.8 discusses about watermarking in smart vehicles. Section 11.9 discusses about medical signal authentication. Section 11.10 highlights side-channel information leakage and its countermeasures. Section 11.11 outlines various forms of attacks on watermarks and watermarking systems. Section 11.12 presents the difficulties involved in making use of them in practice.

Chapter Contents:

  • 11.1 IP Protection—a broad overview
  • 11.1.1 Digital rights management
  • 11.1.2 Copyright protection of multimedia—a brief history
  • 11.1.3 Hardware versus media protection
  • 11.2 General framework for copyright protection
  • 11.2.1 The encoder
  • 11.2.2 The decoder
  • 11.2.3 The comparator
  • 11.3 Types of digital watermarks
  • 11.3.1 Spatial versus frequency domain watermarking
  • 11.3.2 Based on multimedia objects
  • 11.3.3 Based on human perception
  • 11.3.4 From applications point of view
  • 11.3.5 Based on embedding techniques
  • 11.3.6 Hardware-based watermarking systems
  • 11.4 Applications of digital watermarks
  • 11.4.1 Copyright protection
  • 11.4.2 Ownership assertion
  • 11.4.3 Authentication and integrity verification
  • 11.4.4 Fingerprinting
  • 11.4.5 Usage control
  • 11.4.6 Broadcast monitoring
  • 11.4.7 Content labeling
  • 11.4.8 Misappropriation detection
  • 11.4.9 Anti-counterfeiting
  • 11.4.10 UAV safety
  • 11.4.11 Medical signals authentication
  • 11.5 Desired characteristics of watermarks
  • 11.5.1 Perceptibility
  • 11.5.2 Robustness
  • 11.5.3 Tamper resistance
  • 11.5.4 Bit rate
  • 11.5.5 Modifiability, multiplicity, cascadability, and orthogonality
  • 11.5.6 Scalability
  • 11.5.7 Unambiguity and universality
  • 11.5.8 Pixel alteration and human intervention
  • 11.5.9 Reliability
  • 11.5.10 Blindness
  • 11.5.11 Security
  • 11.5.12 Real-time operation
  • 11.5.13 Cost and complexity
  • 11.5.14 Energy consumption
  • 11.5.15 Integrability
  • 11.5.16 Characteristics specific to a watermark
  • Visible watermark
  • Invisible-robust watermark
  • Invisible-fragile watermark
  • Video watermark
  • Watermarking for broadcasting applications
  • Desired characteristics of hardware-based watermarking systems
  • 11.6 Technical challenges for watermarking
  • 11.6.1 Properties of visual signals
  • Nonstationarity
  • Periodicity
  • Power spectral density
  • Properties of color signals
  • 11.6.2 Properties of the human visual system
  • Brightness sensitivity
  • Frequency sensitivity
  • Texture sensitivity
  • JND and minimally noticeable distortion
  • 11.6.3 How much watermark signal to add and where?
  • 11.6.4 Spread spectrum communications
  • 11.7 Hardware-based approaches for watermarking
  • 11.7.1 Image watermarking hardware systems
  • Invisible-robust wavelet domain VLSI architecture
  • Invisible-robust DCT domain chip
  • Invisible-fragile spatial domain chip
  • Invisible-robust-fragile spatial domain chip
  • Invisible-robust wavelet domain module
  • Invisible-robust spatial domain module
  • Visible spatial domain chip
  • Visible wavelet domain chip
  • Low-power chip with DCT domain-invisible-robust and visible functionalities
  • 11.7.2 Video watermarking hardware systems
  • Invisible-robust spatial domain module
  • Invisible-robust spatial domain chip
  • Invisible-robust fractal domain module
  • Invisible-robust wavelet domain chip
  • Visible watermarking hardware
  • 11.7.3 Secure better portable graphics (SBPG)
  • 11.7.4 Trust cam
  • 11.8 Dynamic watermarking in smart car or UAV
  • 11.9 Medical signals authentication
  • 11.10 Side-channel information leakage attacks and countermeasures
  • 11.10.1 An encryption hardware
  • 11.10.2 Side-channel analysis attacks
  • 11.10.3 Side-channel attack countermeasures
  • 11.11 Attacks on watermarks and watermarking systems
  • 11.11.1 Removal and interference attacks
  • 11.11.2 Geometric attacks
  • 11.11.3 Cryptographic attacks
  • 11.11.4 Protocol attacks
  • 11.12 Limitations of watermarks and watermarking
  • 11.13 Conclusion
  • 11.14 Exercises
  • References

Inspec keywords: image coding; image watermarking; Internet of Things; telecommunication security; Internet; message authentication; power aware computing; telecommunication computing

Other keywords: data collection; watermarking systems; media protection; Internet; IoT; digital watermarking; IP protection; information protection; low power consumption; authentication

Subjects: Image and video coding; Communications computing; Electrical/electronic equipment (energy utilisation); Computer communications; Other computer networks; Performance evaluation and testing; Computer vision and image processing techniques; Data security

Preview this chapter:
Zoom in

Hardware approaches for media and information protection and authentication, Page 1 of 2

| /docserver/preview/fulltext/books/cs/pbcs060e/PBCS060E_ch11-1.gif /docserver/preview/fulltext/books/cs/pbcs060e/PBCS060E_ch11-2.gif

Related content

This is a required field
Please enter a valid email address