131
Views
0
CrossRef citations to date
0
Altmetric
Research Article

A machine learning approach for digital watermarking

ORCID Icon
Pages 53-63 | Received 22 Feb 2023, Accepted 03 Apr 2023, Published online: 10 Apr 2023
 

ABSTRACT

Recently, machine learning (ML) has been applying in almost all scientific fields to model and simulate the behaviour of complex systems. At the same time, the number of the proposed watermarking techniques have been increasing every year. Although most of the researchers in the watermarking and data hiding field put all their effort to compete each other to develop more efficient algorithm, the selection of the most efficient one is almost impossible for industries or software developers. In other words, comparison among all the watermarking techniques in order to select one watermarking technique would be cumbersome task. Moreover, the computer security is becoming more advanced which a single watermark technique cannot fulfil all the required criteria and there is a chance that an anti-watermarking is developed to remove the embedded watermark from the host data. This gap of knowledge to use the watermarking technology for a highly secure application is a real nightmare for the information security engineers and software designers. In this paper, two new approaches are proposed to train deep learning and shallow learning models based on the state-of-the-arts watermarking techniques. For these proposed approaches, several ML algorithms are applied to model various watermarked data, which are watermarked by different watermarking techniques in various spectrums and domains. An experimental setup is constructed based on several speeches, audios, images and videos beside the Amazon Sagemaker as ML modelling to implement the proposed approach. The experimental results show that apart from an overall effectiveness of the model, it would resolve some ambiguities by applying the proposed ML approach as a general watermarking workflow.

Acknowledgments

The author would like to appreciate the reviewers for all useful and constructive comments on my manuscript. All comments have been considered and the paper is revised accordingly. This research was not financially supported.

Disclosure statement

No potential conflict of interest was reported by the author.

Declarations

Data sharing not applicable to this article as no datasets were generated or analysed during the current study.

Additional information

Notes on contributors

Mohammad Ali Nematollahi

Mohammad Ali Nematollahi received his master's degree in computer engineering (software) at the Islamic Azad University (IAU), Dubai, and holds a Ph.D. in computer and embedded systems engineering from University Putra Malaysia (UPM). His research interests include digital signal/image processing and digital watermarking, Machine learning, and Artificial Intelligent.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.