On the Properties of Non-Media Digital Watermarking: A Review of State of the Art Techniques

被引:47
作者
Panah, Arezou Soltani [1 ]
Van Schyndel, Ron [1 ]
Sellis, Timos [2 ]
Bertino, Elisa [3 ]
机构
[1] RMTT Univ, Dept Comp Sci & TT, Melbourne, Vic 3001, Australia
[2] Swinburne Univ Technol, Big Data Res Ctr, Melbourne, Vic 3122, Australia
[3] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
关键词
Digital watermarking; information hiding; data mining; data security; big data; RIGHTS PROTECTION; DNA WATERMARKING; SCHEME; SECURE; INTEGRITY; CAPACITY; ATTACK;
D O I
10.1109/ACCESS.2016.2570812
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Over the last 25 years, there has been much work on multimedia digital watermarking. In this domain, the primary limitation to watermark strength has been in its visibility. For multimedia watermarks, invisibility is defined in human terms (that is, in terms of human sensory limitations). In this paper, we review recent developments in the non-media applications of data watermarking, which have emerged over the last decade as an exciting new sub-domain. Since by definition, the intended receiver should be able to detect the watermark, we have to redefine invisibility in an acceptable way that is often application-specific and thus cannot be easily generalized. In particular, this is true when the data is not intended to be directly consumed by humans. For example, a loose definition of robustness might be in terms of the resilience of a watermark against normal host data operations, and of invisibility as resilience of the data interpretation against change introduced by the watermark. In this paper, we classify the data in terms of data mining rules on complex types of data such as time-series, symbolic sequences, data streams, and so forth. We emphasize the challenges involved in non-media watermarking in terms of common watermarking properties, including invisibility, capacity, robustness, and security. With the aid of a few examples of watermarking applications, we demonstrate these distinctions and we look at the latest research in this regard to make our argument clear and more meaningful. As the last aim, we look at the new challenges of digital watermarking that have arisen with the evolution of big data.
引用
收藏
页码:2670 / 2704
页数:35
相关论文
共 110 条
[1]  
Aggarwal C.C., 2015, Data Mining: The Textbook, DOI [10.1007/978-3-319-14142-8, DOI 10.1007/978-3-319-14142-8]
[2]  
[Anonymous], 2015, AUSTR DATA RETENTION
[3]  
[Anonymous], 2004, Proceedings of the 2nd International Conference on Embedded Networked Sensor Systems (SenSys), DOI DOI 10.1145/1031495.1031524
[4]   Capacity of DNA Data Embedding Under Substitution Mutations [J].
Balado, Felix .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (02) :928-941
[5]   On detecting co-resident cloud instances using network flow watermarking techniques [J].
Bates, Adam ;
Mood, Benjamin ;
Pletcher, Joe ;
Pruse, Hannah ;
Valafar, Masoud ;
Butler, Kevin .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (02) :171-189
[6]  
Bertino E, 2005, PROC INT CONF DATA, P521
[7]   A Shape-based Vector Watermark for Digital Mapping [J].
Bird, Stefan ;
Bellman, Chris ;
van Schyndel, Ron .
2009 DIGITAL IMAGE COMPUTING: TECHNIQUES AND APPLICATIONS (DICTA 2009), 2009, :454-+
[8]  
Bivand RS, 2013, HELLO WORLD INTRO SP, P1
[9]   LEARNABILITY AND THE VAPNIK-CHERVONENKIS DIMENSION [J].
BLUMER, A ;
EHRENFEUCHT, A ;
HAUSSLER, D ;
WARMUTH, MK .
JOURNAL OF THE ACM, 1989, 36 (04) :929-965
[10]   A Cross-Layer Watermarking-Based Mechanism for Data Aggregation Integrity in Heterogeneous WSNs [J].
Boubiche, Djallel Eddine ;
Boubiche, Sabrina ;
Bilami, Azeddine .
IEEE COMMUNICATIONS LETTERS, 2015, 19 (05) :823-826