Skip to main content

2023 | OriginalPaper | Buchkapitel

Design of an Active Data Watermark Detection System

verfasst von : Lan Zhang, Xiangyang Zhang, Tiejun Yang

Erschienen in: Big Data and Security

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Nowadays, with the rapid development of network technology and the rapid increase of information, the importance of data is becoming more and more obvious, and the requirements of data security are also improving. Using the detection and tracking technology based on data watermarking can quickly and effectively obtain the information of data watermarking, and trace the source of possible attacks, so as to improve the security of data. The traditional passive data watermarking detection and tracking technology has some limitations in the real-time tracking of possible attacks. Therefore, this paper proposed an active data watermark detection system. The related watermark embedding and detection technologies are firstly studied. The system architecture is proposed where primary modules and submodules are described. The proposed system is designed to be integrated into the network nodes and servers in order to embed and detect the watermark information in real time. In addition, the watermarking parameters can be adjusted according to the sensed network environment. The proposed system can be implemented in the industrial departments that own a large amount of sensitive data so that the data transmission can be monitored and traced.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ding, W., Ming, Y., Cao, Z., Lin, C.-T.: A generalized deep neural network approach for digital watermarking analysis. IEEE Trans. Emerg. Top. Comput. Intell. 6(3), 613–627 (2022)CrossRef Ding, W., Ming, Y., Cao, Z., Lin, C.-T.: A generalized deep neural network approach for digital watermarking analysis. IEEE Trans. Emerg. Top. Comput. Intell. 6(3), 613–627 (2022)CrossRef
2.
Zurück zum Zitat Shankar, A., Kannammal, A.: A hybrid of watermark scheme with encryption to improve security of medical images. In: 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), pp. 226–233 (2021) Shankar, A., Kannammal, A.: A hybrid of watermark scheme with encryption to improve security of medical images. In: 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), pp. 226–233 (2021)
3.
Zurück zum Zitat Chen, W., Zeng, B., Zheng, P.: A robust watermarking scheme for encrypted JPEG bitstreams with format-compliant encryption. In: 2019 18th IEEE International Conference on Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pp. 397–403 (2019) Chen, W., Zeng, B., Zheng, P.: A robust watermarking scheme for encrypted JPEG bitstreams with format-compliant encryption. In: 2019 18th IEEE International Conference on Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE), pp. 397–403 (2019)
4.
Zurück zum Zitat Shen, X., Zhang, Y., Wang, T., Sun, Y.: Relational database watermarking for data tracing. In: 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 224–231 (2020) Shen, X., Zhang, Y., Wang, T., Sun, Y.: Relational database watermarking for data tracing. In: 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 224–231 (2020)
5.
Zurück zum Zitat Gavilanes, G.B.: Persons counter through Wi-Fi’s passive sniffing for IoT. In: 2018 IEEE Third Ecuador Technical Chapters Meeting (ETCM), pp. 1–6 (2018) Gavilanes, G.B.: Persons counter through Wi-Fi’s passive sniffing for IoT. In: 2018 IEEE Third Ecuador Technical Chapters Meeting (ETCM), pp. 1–6 (2018)
6.
Zurück zum Zitat Kim, W., Lee, K.: Digital watermarking for protecting audio classification datasets. In: ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2842–2846 (2020) Kim, W., Lee, K.: Digital watermarking for protecting audio classification datasets. In: ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2842–2846 (2020)
7.
Zurück zum Zitat Kim, J., Ko, W.-H., Kumar, P.R.: Cyber-security through dynamic watermarking for 2-rotor aerial vehicle flight control systems. In: 2021 International Conference on Unmanned Aircraft Systems (ICUAS), pp. 1277–1283 (2021) Kim, J., Ko, W.-H., Kumar, P.R.: Cyber-security through dynamic watermarking for 2-rotor aerial vehicle flight control systems. In: 2021 International Conference on Unmanned Aircraft Systems (ICUAS), pp. 1277–1283 (2021)
8.
Zurück zum Zitat Ma, Z., Zhang, W., Fang, H., Dong, X., Geng, L., Yu, N.: Local geometric distortions resilient watermarking scheme based on symmetry. IEEE Trans. Circuits Syst. Video Technol. 31(12), 4826–4839 (2021)CrossRef Ma, Z., Zhang, W., Fang, H., Dong, X., Geng, L., Yu, N.: Local geometric distortions resilient watermarking scheme based on symmetry. IEEE Trans. Circuits Syst. Video Technol. 31(12), 4826–4839 (2021)CrossRef
9.
Zurück zum Zitat Haddad, S., Coatrieux, G., Moreau-Gaudry, A., Cozic, M.: Joint watermarking-encryption-JPEG-LS for medical image reliability control in encrypted and compressed domains. IEEE Trans. Inf. Forensics Secur. 15, 2556–2569 (2020)CrossRef Haddad, S., Coatrieux, G., Moreau-Gaudry, A., Cozic, M.: Joint watermarking-encryption-JPEG-LS for medical image reliability control in encrypted and compressed domains. IEEE Trans. Inf. Forensics Secur. 15, 2556–2569 (2020)CrossRef
10.
Zurück zum Zitat Houmansadr, A., Kiyavash, N., Borisov, N.: Non-blind watermarking of network flows. IEEE/ACM Trans. Netw. 22(4), 1232–1244 (2014)CrossRef Houmansadr, A., Kiyavash, N., Borisov, N.: Non-blind watermarking of network flows. IEEE/ACM Trans. Netw. 22(4), 1232–1244 (2014)CrossRef
11.
Zurück zum Zitat Azizian, B., Ghaemmaghami, S.: Tampering detection and restoration of compressed video. In: 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), pp. 1–5 (2018) Azizian, B., Ghaemmaghami, S.: Tampering detection and restoration of compressed video. In: 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), pp. 1–5 (2018)
12.
Zurück zum Zitat Rakhmawati, L., Wirawan, Suwadi: Image fragile watermarking with two authentication components for tamper detection and recovery. In: 2018 International Conference on Intelligent Autonomous Systems (ICoIAS), pp. 35–38 (2018) Rakhmawati, L., Wirawan, Suwadi: Image fragile watermarking with two authentication components for tamper detection and recovery. In: 2018 International Conference on Intelligent Autonomous Systems (ICoIAS), pp. 35–38 (2018)
Metadaten
Titel
Design of an Active Data Watermark Detection System
verfasst von
Lan Zhang
Xiangyang Zhang
Tiejun Yang
Copyright-Jahr
2023
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-3300-6_43

Premium Partner