{"title":"媒体和信息保护和认证的硬件方法","authors":"A. Sengupta, S. Mohanty","doi":"10.1049/PBCS060E_CH11","DOIUrl":null,"url":null,"abstract":"Technology scaling has allowed us to design high-performance devices with a lowpower consumption. The advent of IoT has increased the versatility of data collection and there are many different ways of collecting and transferring data over the Internet. The data that is being collected is also in different forms, that is, text, images, videos, and audios. When they are shared, for a legit use, attackers can break the security and use them for illegible purposes or claim ownership to sell them commercially. This has been the trend lately where many counterfeit products are appearing in the market. This section discusses the digital watermarking, different schemes of digital watermarking, and how a media object can be secured using a watermark. They are also not completely resistant to attacks and measures need to be taken to secure the content that is being watermarked. The chapter also presents different issues with the watermark implementations, attacks and countermeasures to those attacks on watermarking. Section 11.1 presents a broad overview of the IP protection. Section 11.2 discusses the generic overview and components of any watermark system. Section 11.3 summarizes various types of watermarks. Section 11.4 discusses various applications of watermarking. Section 11.5 presents desired characteristics of watermarks. Sections 11.6 discusses the technical challenges of the watermarking. Section 11.7 discusses hardware-based watermarking systems available in the current literature. Section 11.8 discusses about watermarking in smart vehicles. Section 11.9 discusses about medical signal authentication. Section 11.10 highlights side-channel information leakage and its countermeasures. Section 11.11 outlines various forms of attacks on watermarks and watermarking systems. Section 11.12 presents the difficulties involved in making use of them in practice.","PeriodicalId":14528,"journal":{"name":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2019-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Hardware approaches for media and information protection and authentication\",\"authors\":\"A. Sengupta, S. Mohanty\",\"doi\":\"10.1049/PBCS060E_CH11\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Technology scaling has allowed us to design high-performance devices with a lowpower consumption. The advent of IoT has increased the versatility of data collection and there are many different ways of collecting and transferring data over the Internet. The data that is being collected is also in different forms, that is, text, images, videos, and audios. When they are shared, for a legit use, attackers can break the security and use them for illegible purposes or claim ownership to sell them commercially. This has been the trend lately where many counterfeit products are appearing in the market. This section discusses the digital watermarking, different schemes of digital watermarking, and how a media object can be secured using a watermark. They are also not completely resistant to attacks and measures need to be taken to secure the content that is being watermarked. The chapter also presents different issues with the watermark implementations, attacks and countermeasures to those attacks on watermarking. Section 11.1 presents a broad overview of the IP protection. Section 11.2 discusses the generic overview and components of any watermark system. Section 11.3 summarizes various types of watermarks. Section 11.4 discusses various applications of watermarking. Section 11.5 presents desired characteristics of watermarks. Sections 11.6 discusses the technical challenges of the watermarking. Section 11.7 discusses hardware-based watermarking systems available in the current literature. Section 11.8 discusses about watermarking in smart vehicles. Section 11.9 discusses about medical signal authentication. Section 11.10 highlights side-channel information leakage and its countermeasures. Section 11.11 outlines various forms of attacks on watermarks and watermarking systems. Section 11.12 presents the difficulties involved in making use of them in practice.\",\"PeriodicalId\":14528,\"journal\":{\"name\":\"IP Core Protection and Hardware-Assisted Security for Consumer Electronics\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-01-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IP Core Protection and Hardware-Assisted Security for Consumer Electronics\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1049/PBCS060E_CH11\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IP Core Protection and Hardware-Assisted Security for Consumer Electronics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1049/PBCS060E_CH11","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Hardware approaches for media and information protection and authentication
Technology scaling has allowed us to design high-performance devices with a lowpower consumption. The advent of IoT has increased the versatility of data collection and there are many different ways of collecting and transferring data over the Internet. The data that is being collected is also in different forms, that is, text, images, videos, and audios. When they are shared, for a legit use, attackers can break the security and use them for illegible purposes or claim ownership to sell them commercially. This has been the trend lately where many counterfeit products are appearing in the market. This section discusses the digital watermarking, different schemes of digital watermarking, and how a media object can be secured using a watermark. They are also not completely resistant to attacks and measures need to be taken to secure the content that is being watermarked. The chapter also presents different issues with the watermark implementations, attacks and countermeasures to those attacks on watermarking. Section 11.1 presents a broad overview of the IP protection. Section 11.2 discusses the generic overview and components of any watermark system. Section 11.3 summarizes various types of watermarks. Section 11.4 discusses various applications of watermarking. Section 11.5 presents desired characteristics of watermarks. Sections 11.6 discusses the technical challenges of the watermarking. Section 11.7 discusses hardware-based watermarking systems available in the current literature. Section 11.8 discusses about watermarking in smart vehicles. Section 11.9 discusses about medical signal authentication. Section 11.10 highlights side-channel information leakage and its countermeasures. Section 11.11 outlines various forms of attacks on watermarks and watermarking systems. Section 11.12 presents the difficulties involved in making use of them in practice.