Optimized Digital Watermarking for Robust Information Security in Embedded Systems
Guardat en:
| Publicat a: | Information vol. 16, no. 4 (2025), p. 322 |
|---|---|
| Autor principal: | |
| Altres autors: | , , , , , , |
| Publicat: |
MDPI AG
|
| Matèries: | |
| Accés en línia: | Citation/Abstract Full Text + Graphics Full Text - PDF |
| Etiquetes: |
Sense etiquetes, Sigues el primer a etiquetar aquest registre!
|
MARC
| LEADER | 00000nab a2200000uu 4500 | ||
|---|---|---|---|
| 001 | 3194615295 | ||
| 003 | UK-CbPIL | ||
| 022 | |a 2078-2489 | ||
| 024 | 7 | |a 10.3390/info16040322 |2 doi | |
| 035 | |a 3194615295 | ||
| 045 | 2 | |b d20250401 |b d20250430 | |
| 084 | |a 231474 |2 nlm | ||
| 100 | 1 | |a Mohcin, Mekhfioui |u Green Tech Institute (GTI), Mohammed VI Polytechnic University, Benguerir 43150, Morocco | |
| 245 | 1 | |a Optimized Digital Watermarking for Robust Information Security in Embedded Systems | |
| 260 | |b MDPI AG |c 2025 | ||
| 513 | |a Journal Article | ||
| 520 | 3 | |a With the exponential growth in transactions and exchanges carried out via the Internet, the risks of the falsification and distortion of information are multiplying, encouraged by widespread access to the virtual world. In this context, digital image watermarking has emerged as an essential solution for protecting digital content by enhancing its durability and resistance to manipulation. However, no current digital watermarking technology offers complete protection against all forms of attack, with each method often limited to specific applications. This field has recently benefited from the integration of deep learning techniques, which have brought significant advances in information security. This article explores the implementation of digital watermarking in embedded systems, addressing the challenges posed by resource constraints such as memory, computing power, and energy consumption. We propose optimization techniques, including frequency domain methods and the use of lightweight deep learning models, to enhance the robustness and resilience of embedded systems. The experimental results validate the effectiveness of these approaches for enhanced image protection, opening new prospects for the development of information security technologies adapted to embedded environments. | |
| 610 | 4 | |a Raspberry Pi Ltd | |
| 653 | |a Digital imaging | ||
| 653 | |a Data integrity | ||
| 653 | |a Embedded systems | ||
| 653 | |a Digital watermarking | ||
| 653 | |a Smartphones | ||
| 653 | |a Tattoos | ||
| 653 | |a Wavelet transforms | ||
| 653 | |a Security | ||
| 653 | |a Artificial intelligence | ||
| 653 | |a Multimedia | ||
| 653 | |a Communication | ||
| 653 | |a Intellectual property | ||
| 653 | |a Optimization techniques | ||
| 653 | |a Signal processing | ||
| 653 | |a Neural networks | ||
| 653 | |a Digital watermarks | ||
| 653 | |a Data encryption | ||
| 653 | |a Deep learning | ||
| 653 | |a Energy consumption | ||
| 653 | |a Optimization algorithms | ||
| 653 | |a Efficiency | ||
| 700 | 1 | |a El Bazi Nabil |u Green Tech Institute (GTI), Mohammed VI Polytechnic University, Benguerir 43150, Morocco | |
| 700 | 1 | |a Laayati Oussama |u Green Tech Institute (GTI), Mohammed VI Polytechnic University, Benguerir 43150, Morocco | |
| 700 | 1 | |a Satif Amal |u National School of Applied Sciences, Ibn Tofail University, Kenitra 14000, Morocco | |
| 700 | 1 | |a Bouchouirbat Marouan |u Green Tech Institute (GTI), Mohammed VI Polytechnic University, Benguerir 43150, Morocco | |
| 700 | 1 | |a Kissi Chaïmaâ |u National School of Applied Sciences, Ibn Tofail University, Kenitra 14000, Morocco | |
| 700 | 1 | |a Boujiha Tarik |u National School of Applied Sciences, Ibn Tofail University, Kenitra 14000, Morocco | |
| 700 | 1 | |a Chebak Ahmed |u Green Tech Institute (GTI), Mohammed VI Polytechnic University, Benguerir 43150, Morocco | |
| 773 | 0 | |t Information |g vol. 16, no. 4 (2025), p. 322 | |
| 786 | 0 | |d ProQuest |t Advanced Technologies & Aerospace Database | |
| 856 | 4 | 1 | |3 Citation/Abstract |u https://www.proquest.com/docview/3194615295/abstract/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text + Graphics |u https://www.proquest.com/docview/3194615295/fulltextwithgraphics/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |
| 856 | 4 | 0 | |3 Full Text - PDF |u https://www.proquest.com/docview/3194615295/fulltextPDF/embedded/7BTGNMKEMPT1V9Z2?source=fedsrch |