{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,28]],"date-time":"2026-02-28T23:13:25Z","timestamp":1772320405082,"version":"3.50.1"},"reference-count":39,"publisher":"MDPI AG","issue":"4","license":[{"start":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T00:00:00Z","timestamp":1744934400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>With the exponential growth in transactions and exchanges carried out via the Internet, the risks of the falsification and distortion of information are multiplying, encouraged by widespread access to the virtual world. In this context, digital image watermarking has emerged as an essential solution for protecting digital content by enhancing its durability and resistance to manipulation. However, no current digital watermarking technology offers complete protection against all forms of attack, with each method often limited to specific applications. This field has recently benefited from the integration of deep learning techniques, which have brought significant advances in information security. This article explores the implementation of digital watermarking in embedded systems, addressing the challenges posed by resource constraints such as memory, computing power, and energy consumption. We propose optimization techniques, including frequency domain methods and the use of lightweight deep learning models, to enhance the robustness and resilience of embedded systems. The experimental results validate the effectiveness of these approaches for enhanced image protection, opening new prospects for the development of information security technologies adapted to embedded environments.<\/jats:p>","DOI":"10.3390\/info16040322","type":"journal-article","created":{"date-parts":[[2025,4,18]],"date-time":"2025-04-18T03:27:46Z","timestamp":1744946866000},"page":"322","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Optimized Digital Watermarking for Robust Information Security in Embedded Systems"],"prefix":"10.3390","volume":"16","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5836-1296","authenticated-orcid":false,"given":"Mohcin","family":"Mekhfioui","sequence":"first","affiliation":[{"name":"Green Tech Institute (GTI), Mohammed VI Polytechnic University, Benguerir 43150, Morocco"},{"name":"National School of Applied Sciences, Ibn Tofail University, Kenitra 14000, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4847-294X","authenticated-orcid":false,"given":"Nabil","family":"El Bazi","sequence":"additional","affiliation":[{"name":"Green Tech Institute (GTI), Mohammed VI Polytechnic University, Benguerir 43150, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0039-7581","authenticated-orcid":false,"given":"Oussama","family":"Laayati","sequence":"additional","affiliation":[{"name":"Green Tech Institute (GTI), Mohammed VI Polytechnic University, Benguerir 43150, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8501-9605","authenticated-orcid":false,"given":"Amal","family":"Satif","sequence":"additional","affiliation":[{"name":"National School of Applied Sciences, Ibn Tofail University, Kenitra 14000, Morocco"}]},{"given":"Marouan","family":"Bouchouirbat","sequence":"additional","affiliation":[{"name":"Green Tech Institute (GTI), Mohammed VI Polytechnic University, Benguerir 43150, Morocco"}]},{"given":"Cha\u00efma\u00e2","family":"Kissi","sequence":"additional","affiliation":[{"name":"National School of Applied Sciences, Ibn Tofail University, Kenitra 14000, Morocco"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7144-5144","authenticated-orcid":false,"given":"Tarik","family":"Boujiha","sequence":"additional","affiliation":[{"name":"National School of Applied Sciences, Ibn Tofail University, Kenitra 14000, Morocco"}]},{"given":"Ahmed","family":"Chebak","sequence":"additional","affiliation":[{"name":"Green Tech Institute (GTI), Mohammed VI Polytechnic University, Benguerir 43150, Morocco"}]}],"member":"1968","published-online":{"date-parts":[[2025,4,18]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"1577","DOI":"10.1016\/j.patrec.2005.01.004","article-title":"SVD-based digital image watermarking scheme","volume":"26","author":"Chang","year":"2005","journal-title":"Pattern Recognit. Lett."},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1109\/79.939835","article-title":"Digital watermarking: Algorithms and applications","volume":"18","author":"Podilchuk","year":"2001","journal-title":"IEEE Signal Process. Mag."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"414","DOI":"10.23956\/ijarcsse\/V7I6\/01610","article-title":"Digital watermarking","volume":"7","author":"Sadiku","year":"2017","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"107029","DOI":"10.1016\/j.asoc.2020.107029","article-title":"WSMN: An optimized multipurpose blind watermarking in Shearlet domain using MLP and NSGA-II","volume":"101","author":"Haghighi","year":"2020","journal-title":"Appl. Soft Comput."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"4919","DOI":"10.1007\/s00521-020-05634-8","article-title":"A secure and robust color image watermarking using nature-inspired intelligence","volume":"35","author":"Sharma","year":"2021","journal-title":"Neural Comput. Appl."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"107385","DOI":"10.1016\/j.compeleceng.2021.107385","article-title":"Selective encryption and optimization based watermarking for robust transmission of landslide images","volume":"95","author":"Mohan","year":"2021","journal-title":"Comput. Electr. Eng."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1749","DOI":"10.1007\/s11042-020-09769-7","article-title":"An efficient and robust watermarking approach based on single value decompression, multi-level DWT, and wavelet fusion with scrambled medical images","volume":"80","author":"Hemdan","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_8","first-page":"1597","article-title":"Optimized image watermarking with artificial neural networks and histogram shape","volume":"41","author":"Sunesh","year":"2020","journal-title":"J. Inf. Optim. Sci."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"104049","DOI":"10.1016\/j.engappai.2020.104049","article-title":"Digital watermarking with improved SMS applied for QR code","volume":"97","author":"Pan","year":"2021","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Devi, K.J., Singh, P., Dash, J., Thakkar, H., Santamar\u00eda, J., Krishna, M.V.J., and Romero-Manchado, A. (2022). A new robust and secure 3-level digital image watermarking method based on G-BAT hybrid optimization. Mathematics, 10.","DOI":"10.3390\/math10163015"},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"594","DOI":"10.26415\/2572-004X-vol5iss1p594-603","article-title":"An optimized medical image watermarking approach for E-health applications","volume":"5","author":"Abdi","year":"2023","journal-title":"Med. Technol. J."},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Hao, W., Wei, X., Zhang, W., and Xie, R. (2023, January 16\u201318). Live code digital watermarking technology based on chaotic encryption. Proceedings of the 2023 4th International Seminar on Artificial Intelligence, Networking and Information Technology (AINIT), Nanjing, China.","DOI":"10.1109\/AINIT59027.2023.10212884"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2033","DOI":"10.1109\/TCSS.2022.3140862","article-title":"Hybrid nature-inspired optimization and encryption-based watermarking for E-healthcare","volume":"10","author":"Anand","year":"2022","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Rai, M. (2023, January 18\u201320). Robust digital watermarking based on machine learning. Proceedings of the 2023 International Conference on Self Sustainable Artificial Intelligence Systems (ICSSAS), Erode, India.","DOI":"10.1109\/ICSSAS57918.2023.10331660"},{"key":"ref_15","first-page":"291","article-title":"Digital watermarking scheme based on curvelet transform and multiple chaotic maps","volume":"53","author":"Xiao","year":"2023","journal-title":"Opt. Appl."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Mekhfioui, M., Benahmed, A., Chebak, A., Elgouri, R., and Hlou, L. (2024). The Development and Implementation of Innovative Blind Source Separation Techniques for Real-Time Extraction and Analysis of Fetal and Maternal Electrocardiogram Signals. Bioengineering, 11.","DOI":"10.3390\/bioengineering11050512"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1109\/83.736686","article-title":"Hidden digital watermarks in images","volume":"8","author":"Hsu","year":"1999","journal-title":"IEEE Trans. Image Process."},{"key":"ref_18","unstructured":"Swanson, M.D., Zhu, B., and Tewfik, A.H. (1996, January 16\u201319). Transparent robust image watermarking. Proceedings of the International Conference on Image Processing, Lausanne, Switzerland."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1016\/S0165-1684(98)00017-6","article-title":"Robust image watermarking in the spatial domain","volume":"66","author":"Nikolaidis","year":"1998","journal-title":"Signal Process."},{"key":"ref_20","first-page":"32","article-title":"IoT and 5G communication watermarking techniques","volume":"7","author":"Li","year":"2019","journal-title":"Commun. Digit. Secur."},{"key":"ref_21","first-page":"211","article-title":"Digital rights management in cyber systems via watermarking","volume":"15","author":"Smith","year":"2020","journal-title":"Cybersecur. Innov. J."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"1382","DOI":"10.3390\/make5040070","article-title":"When Federated Learning Meets Watermarking: A Comprehensive Overview of Techniques for Intellectual Property Protection","volume":"5","author":"Lansari","year":"2023","journal-title":"Mach. Learn. Knowl. Extr."},{"key":"ref_23","first-page":"99","article-title":"Protecting patient privacy in medical imaging through watermarking","volume":"5","author":"Jones","year":"2021","journal-title":"Healthc. Data J."},{"key":"ref_24","first-page":"145","article-title":"Smart city data integrity and security with watermarking","volume":"12","author":"Brown","year":"2018","journal-title":"J. Urban Comput."},{"key":"ref_25","first-page":"78","article-title":"Watermarking for secure cloud storage and e-governance applications","volume":"8","author":"Chen","year":"2019","journal-title":"Int. J. Cloud Secur."},{"key":"ref_26","unstructured":"Chen, B., and Wornell, G. (1999, January 7\u201311). Achievable performance of digital watermarking systems. Proceedings of the IEEE International Conference on Multimedia Computing and Systems, Florence, Italy."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1264","DOI":"10.1016\/j.sigpro.2006.11.002","article-title":"A robust content-based digital image watermarking scheme","volume":"87","author":"Qi","year":"2007","journal-title":"Signal Process."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"212","DOI":"10.15623\/ijret.2014.0303039","article-title":"Digital Watermarking with a New Algorithm","volume":"3","author":"Akter","year":"2014","journal-title":"Int. J. Res. Eng. Technol."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1016\/j.sigpro.2007.07.020","article-title":"Human visual system based adaptive digital image watermarking","volume":"88","author":"Qi","year":"2008","journal-title":"Signal Process."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Zhang, F., and Zhang, X. (2007, January 10\u201312). Performance Evaluation of Multiple Watermarks System. Proceedings of the Second Workshop on Digital Media and Its Application in Museum & Heritages (DMAMH 2007), Chongqing, China.","DOI":"10.1109\/DMAMH.2007.4414519"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/TCSVT.2012.2203738","article-title":"Hardware Implementation of a Digital Watermarking System for Video Authentication","volume":"23","author":"Roy","year":"2013","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"25921","DOI":"10.1007\/s11042-020-09262-1","article-title":"Performance comparison of various watermarking techniques","volume":"79","author":"Garg","year":"2020","journal-title":"Multimed. Tools Appl."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"2591","DOI":"10.1109\/TCSVT.2020.3030671","article-title":"Watermarking Neural Networks With Watermarked Images","volume":"31","author":"Wu","year":"2021","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Gu, T., and Li, X. (2008). Dynamic digital watermark technique based on neural network. Independent Component Analyses, Wavelets, Unsupervised Nano-Biomimetic Sensors, and Neural Networks VI, SPIE.","DOI":"10.1117\/12.783953"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Uchida, Y., Nagai, Y., Sakazawa, S., and Satoh, S. (2017, January 6\u20139). Embedding Watermarks into Deep Neural Networks. Proceedings of the ACM International Conference on Multimedia Retrieval, Bucharest, Romania.","DOI":"10.1145\/3078971.3078974"},{"key":"ref_36","unstructured":"Huang, S., Zhang, W., Feng, W., and Yang, H. (2008, January 25\u201327). Blind watermarking scheme based on neural network. Proceedings of the World Congress on Intelligent Control and Automation, Chongqing, China."},{"key":"ref_37","first-page":"4","article-title":"Real-time implementation of a new efficient algorithm for source separation using matlab & arduino due","volume":"9","author":"Mekhfioui","year":"2020","journal-title":"Int. J. Sci. Technol. Res."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Voigt, P., and von dem Bussche, A. (2017). The EU General Data Protection Regulation (GDPR): A Practical Guide, Springer.","DOI":"10.1007\/978-3-319-57959-7"},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"689","DOI":"10.1007\/s11023-018-9482-5","article-title":"AI4People\u2014An Ethical Framework for a Good AI Society: Opportunities, Risks, Principles, and Recommendations","volume":"28","author":"Floridi","year":"2018","journal-title":"Minds Mach."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/16\/4\/322\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:17:01Z","timestamp":1760030221000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/16\/4\/322"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,4,18]]},"references-count":39,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2025,4]]}},"alternative-id":["info16040322"],"URL":"https:\/\/doi.org\/10.3390\/info16040322","relation":{},"ISSN":["2078-2489"],"issn-type":[{"value":"2078-2489","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,4,18]]}}}