Watermarking Techniques for Royalty Accounts in Content Management Websites for IoT Image Association
Authors/Creators
- 1. Software Engineer II, Xandr, AT&T Services Inc., New York, USA
- 2. Department of Electrical & Electronic Engineering, East Delta University, Chattogram, Bangladesh
- 3. Department of Accounting & Information System, Jagannath University, Dhaka, Bangladesh
- 4. School of Accounting, Jiujiang University, Jiujiang, Jiangxi, China
- 5. Kulliyyah of Economics and Management Sciences, International Islamic University Malaysia (IIUM), Kuala Lumpur, MALAYSIA
Description
Utilizing IoT associations has been trending recently. They have been used in numerous fields of life, comprising protected and subtle segments like the healthcare and military. Images that are used across IoT platforms infringe copyright strategies and rescind the authenticity of the images taken with hard work by a human. Thus, the objective of this study is to provide IoT association of images (pictures/photos) to pages across content management websites with unique watermarks to account for Royalty to the person/association owning the camera. This model indulges in emerging and registering a distinctive number that exclusively ties up the human and the camera which is getting used in such a way that the photo taken by the person will leave a unique identifier or mark which will make the image copyrighted and uploads to cloud for direct usage on any pages in IoT so that direct revenue of the copyrighted photograph goes to the person who clicked the photo. Our results presented the watermarking method to account for royalty in content management websites for IoT association of images contrary to the work's existing result. Our result assumed that with the watermarking method, royalty can be accounted to the rightful owner of the image during the IoT-associated image.
Files
Watermarking-Techniques-For-Royalty-Accounts-In-1528-2678-25-4-440.pdf
Files
(257.3 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:df7e56084b264035f3780c5c1f427556
|
257.3 kB | Preview Download |
Additional details
References
- Ahmadi, H.; Arji, G.; Shahmoradi, L.; Safdari, R.; Nilashi, M. and Alizadeh, M. (2018). The Application of Internet of Things in Healthcare: A Systematic Literature Review and Classification. Univers. Access Inf. Soc., 1–33.
- Ahmed, A. A. A.; Paruchuri, H.; Vadlamudi, S.; & Ganapathy, A. (2021). Cryptography in Financial Markets: Potential Channels for Future Financial Stability. Academy of Accounting and Financial Studies Journal, 25(4), 1–9. https://doi.org/10.5281/zenodo.4774829
- Al-Garadi, M. A.; Mohamed, A.; Al-Ali, A.; Du, X. and Guizani, M. (2018). A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security. arXiv 2018, arXiv:1807.11023.
- Amin, R., & Vadlamudi, S. (2021). Opportunities and Challenges of Data Migration in Cloud. Engineering International, 9(1), 41-50. https://doi.org/10.18034/ei.v9i1.529
- Ammar, M.; Russello, G. and Crispo, B. (2018). Internet of Things: A Survey on the Security of Iot Frameworks. J. Inf. Secur. Appl., 38, 8–27.
- Azad, M. M., Ganapathy, A., Vadlamudi, S., Paruchuri, H. (2021). Medical Diagnosis using Deep Learning Techniques: A Research Survey. Annals of the Romanian Society for Cell Biology, 25(6), 5591–5600. Retrieved from https://www.annalsofrscb.ro/index.php/journal/article/view/6577
- Bartariya, S. and Rastogi, A. (2016). Security in Wireless Sensor Networks: Attacks and Solutions. Environment, 5, 214–220.
- Boubiche, D.E.; Boubiche, S. and Bilami, A. (2015). A Cross-Layer Watermarking-Based Mechanism for Data Aggregation Integrity in Heterogeneous Wsns. IEEE Commun. Lett. 2015, 19, 823–826.
- Castelluccia, C.; Chan, A.C.-F.; Mykletun, E. and Tsudik, G. (2009). Efficient and Provably Secure Aggregation of Encrypted Data in Wireless Sensor Networks. ACM Trans. Sen. Netw. 2009, 5, 3.
- Cui, J., Shao, L., Zhong, H., Xu, Y. and Liu, L. (2018). Data aggregation with end-to-end confidentiality and integrity for large-scale wireless sensor networks. Peer-to-Peer Netw. Appl. 11, 1022–1037. https://doi.org/10.1007/s12083-017-0581-5
- Ding, Q.; Wang, B.; Sun, X.; Wang, J. and Shen, J. (2015). A Reversible Watermarking Scheme Based on Difference Expansion for Wireless Sensor Networks. Int. J. Grid Distrib. Comput., 8, 143–154.
- Fang, J. and Potkonjak, M. (2003). Real-Time Watermarking Techniques for Sensor Networks. In Proceedings of the Electronic Imaging 2003, Santa Clara, CA, USA, 21–24 January 2003; pp. 391–402.
- Ganapathy, A. (2019). Image Association to URLs across CMS Websites with Unique Watermark Signatures to Identify Who Owns the Camera. American Journal of Trade and Policy, 6(3), 101-106. https://doi.org/10.18034/ajtp.v6i3.543
- Ganapathy, A., Redwanuzzaman, M., Rahaman, M. M., & Khan, W. (2020). Artificial Intelligence Driven Crypto Currencies. Global Disclosure of Economics and Business, 9(2), 107-118. https://doi.org/10.18034/gdeb.v9i2.557
- Granjal, J.; Monteiro, E. and Silva, J. S. 2015. Security in the Integration of Low-Power Wireless Sensor Networks with the Internet: A Survey. Ad Hoc Netw., 24, 264–287.
- Guan, T. and Chen, Y. (2016). A Node Clone Attack Detection Scheme Based on Digital Watermark in WSNs. In Proceedings of the IEEE International Conference on Computer Communication and the Internet (ICCCI), Wuhan, China, 13–15 October 2016; pp. 257–260.
- Gubbi, J.; Buyya, R.; Marusic, S. and Palaniswami, M. (2013). Internet of Things (IoT): A Vision, Architectural Elements, and Future Directions. Future Gener. Comput. Syst., 29, 1645–1660.
- Hameed, K.; Khan, A.; Ahmed, M.; Reddy, A. G. and Rathore, M. M. (2018). Towards a Formally Verified Zero Watermarking Scheme for Data Integrity in the Internet of Things Based-Wireless Sensor Networks. Future Gener. Comput. Syst., 82, 274–289.
- Hameed, K.; Khan, M. S.; Ahmed, I.; Ahmad, Z. U.; Khan, A.; Haider, A. and Javaid, N. (2016). A Zero-Watermarking Scheme for Data Integrity in Wireless Sensor Networks. In Proceedings of the 19th International Conference on Network-Based Information Systems (NBiS), Ostrava, Czech Republic, 7–9 September 2016; pp. 119–126.
- Illiano, V. P. and Lupu, E. C. (2015). Detecting Malicious Data Injections in Wireless Sensor Networks: A Survey. ACM Comput. Surv., 48, 1–33.
- Khan, M. A. and Salah, K. (2018). Iot Security: Review, Blockchain Solutions, and Open Challenges. Future Gener. Comput. Syst., 82, 395–411.
- Knuth, D. E. (1997). The Art of Computer Programming; Addison-Wesley: Boston, MA, USA, 1997; Volume 2.
- Kui, R.; Wenjing, L. and Yanchao, Z. (2008). Leds: Providing Location-Aware End-to-End Data Security in Wireless Sensor Networks. IEEE Trans. Mob. Comput., 7, 585–598.
- Lalem, F.; Muath, A.; Bounceur, A.; Euler, R.; Laouamer, L.; Nana, L. and Pascu, A.C. (2016). Data Authenticity and Integrity in Wireless Sensor Networks Based on a Watermarking Approach. In Proceedings of the 29th International Florida Artificial Intelligence Research Society, Key Largo, FL, USA, 16–18 May 2016.
- Lazarescu, M. T. (2017). Wireless Sensor Networks for the Internet of Things: Barriers and Synergies. In Components and Services for Iot Platforms; Springer: Berlin/Heidelberg, Germany; pp. 155–186.
- Mahgoub, I. and Ilyas, M. (2016). Sensor Network Protocols; CRC press: Boca Raton, FL, USA.
- Manikandan, N. and Subha, S. (2018). Parallel Aes Algorithm for Performance Improvement in Data Analytics Security for Iot. Int. J. Netw. Virtual Organ., 18, 112–129.
- Paruchuri, H. (2020). The Impact of Machine Learning on the Future of Insurance Industry. American Journal of Trade and Policy, 7(3), 85-90. https://doi.org/10.18034/ajtp.v7i3.537
- Paruchuri, H. (2021). Conceptualization of Machine Learning in Economic Forecasting. Asian Business Review, 11(1), 51-58. https://doi.org/10.18034/abr.v11i1.532
- Paruchuri, H.; Vadlamudi, S.; Ahmed, A. A. A.; Eid, W.; Donepudi, P. K. (2021). Product Reviews Sentiment Analysis using Machine Learning: A Systematic Literature Review. Turkish Journal of Physiotherapy and Rehabilitation, 23(2), 2362-2368, https://turkjphysiotherrehabil.org/pub/pdf/322/32-2-316.pdf
- Pawar, M. and Agarwal, J. (2017). A Literature Survey on Security Issues of WSN and Different Types of Attacks in Network. Indian J. Comput. Sci. Eng., 8, 80–83.
- Ren, Y.; Cheng, Y.; Wang, J. and Fang, L. (2015). Data Protection Based on Multifunction Digital Watermark in Wireless Sensor Network. In Proceedings of the International Carnahan Conference on Security Technology (ICCST), Taipei, Taiwan, 21–24 September 2015; pp. 37–41.
- Rouissi, N. and Gharsellaoui, H. (2017). Improved Hybrid Leach Based Approach for Preserving Secured Integrity in Wireless Sensor Networks. Procedia Comput. Sci., 112, 1429–1438.
- Shi, X. and Xiao, D. (2013). A Reversible Watermarking Authentication Scheme for Wireless Sensor Networks. Inf. Sci., 240, 173–183.
- Sun, X.; Su, J.; Wang, B. and Liu, Q. (2013). Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks. Int. J. Secur. Appl., 7, 407–416.
- Tiwari, A.; Chakraborty, S. and Mishra, M. K. (2013). Secure Data Aggregation Using Irreversible Watermarking in WSNs. In Proceedings of the Confluence 2013: The Next Generation Information Technology Summit (4th International Conference), Noida, India, 26–27 September 2013; pp. 330–336.
- Vadlamudi, S. (2021a). The Economics of Internet of Things: An Information Market System. Asian Business Review, 11(1), 35-40. https://doi.org/10.18034/abr.v11i1.523
- Vadlamudi, S. (2021b). The Internet of Things (IoT) and Social Interaction: Influence of Source Attribution and Human Specialization. Engineering International, 9(1), 17-28. https://doi.org/10.18034/ei.v9i1.526
- Vadlamudi, S.; Paruchuri, H.; Ahmed, A. A. A.; Hossain, M. S.; & Donepudi, P. K. (2021). Rethinking Food Sufficiency with Smart Agriculture using Internet of Things. Turkish Journal of Computer and Mathematics Education, 12(9), 2541–2551. https://turcomat.org/index.php/turkbilmat/article/view/3738