Lightweight Cryptographic Watermarking Architecture for Resource-Constrained IoT and Edge Devices

Authors

  • Madhuri Mohanrao Karad

Keywords:

Edge computing security, IoT security, Lightweight cryptography, PRESENT Cypher, Resource-constrained watermarking

Abstract

The proliferation of Internet of Things (IoT) ecosystems and edge computing infrastructures has created an urgent demand for security mechanisms capable of operating within the stringent resource constraints characteristic of embedded platforms—including limited computational capacity, minimal memory footprint, and severe power budgets. Conventional cryptographic watermarking schemes, designed for general-purpose computing environments, impose computational overhead that renders them impractical for deployment on microcontroller-class devices with clock frequencies below 100 MHz and available RAM of 64–512 KB. This paper proposes a novel Lightweight Cryptographic Watermarking Architecture (LCWA) specifically engineered for resource-constrained IoT and edge devices, integrating the PRESENT-80 lightweight block cypher with a computationally efficient Least Significant Bit Frequency Domain (LSBFD) watermarking scheme optimised through bitwise operations and lookup table acceleration. The architecture implements a pipeline processing model that overlaps cryptographic and watermarking operations, significantly reducing total processing latency compared to sequential execution. Hardware-software co-design principles are employed to identify and accelerate the computational hot-spots of both the cypher and watermarking algorithm through dedicated hardware acceleration units. The proposed architecture was implemented on an Xilinx Artix-7 FPGA and an ARM Cortex-M4 microcontroller platform for comprehensive evaluation. Results demonstrate that the proposed scheme achieves 98.7% of the security efficacy of full AES-256-DWT watermarking while consuming only 12.3% of the computational resources, 8.7% of the memory footprint, and 15.4% of the power consumption. The achieved throughput of 3.8 Mbps on the ARM Cortex-M4 platform at 168 MHz is sufficient for real-time protection of IoT sensor data streams.

References

A. Bogdanov et al., “PRESENT: An ultra-lightweight block cipher,” in Cryptographic Hardware and Embedded Systems - CHES 2007, Berlin, Germany: Springer, 2007, pp. 450–466.

M. Turan et al., “Status report on the final round of the NIST lightweight cryptography standardization process,” NIST Interagency/Internal Report 8454, NIST, Gaithersburg, MD, 2023.

M. Barni, F. Bartolini, A. De Rosa, and A. Piva, “Capacity of the watermark channel: How many bits can be hidden within a digital image?,” in Proc. SPIE Security Watermarking Multimedia Contents, vol. 3657, 1999, pp. 437–448.

Y. Zhaoning, L. Yan, and G. Tiegang, “A lossless self-recovery watermarking scheme with JPEG-LS compression,” Journal of Information Security and Applications, vol. 58, May 2021.

C. Paar and J. Pelzl, Understanding cryptography: A textbook for students and practitioners, 1st ed. Berlin, Germany: Springer, 2010.

T. -M. Hoang, V. -H. Bui, N. -L. Vu and D. -H. Hoang, “A lightweight mixed secure scheme based on the watermarking technique for hierarchy wireless sensor networks,” 2020 International Conference on Information Networking (ICOIN), Barcelona, Spain, 2020, pp. 649–653.

M. Usman, I. Ahmed, M. I. Aslam, S. Khan, and U. A. Shah, “SIT: A lightweight encryption algorithm for secure internet of things,” International Journal of Advanced Computer Science and Applications, vol. 8, no. 1, pp. 402–411, 2017.

T. Wollinger, J. Guajardo, and C. Paar, “Security on FPGAs: State-of-the-art implementations and attacks,” ACM Transactions on Embedded Computing System, vol. 3, no. 3, pp. 534–574, Aug. 2004.

Y.-J. Jeong, K.-S. Moon, and J.-N. Kim, “FPGA based implementation of real-time video watermarking chip,” Lecture Notes in Computer Science, vol. 4523, pp. 133–141, 2007.

S. Raza, H. Shafagh, K. Hewage, R. Hummen, and T. Voigt, “Lithe: Lightweight secure CoAP for the Internet of Things,” IEEE Sensors Journal, vol. 13, no. 10, pp. 3711–3720, Oct. 2013.

C. Manifavas, G. Hatzivasilis, K. Fysarakis, and Y. Papaefstathiou, “A survey of lightweight stream ciphers for embedded systems,” Security and Communication Networks, vol. 9, no. 10, pp. 1226–1246, Jul. 2016.

M. Barari and R. Saifan, “Energy–Aware security protocol for IoT devices,” Pervasive and Mobile Computing, vol. 96, Dec. 2023.

Y.-T. Shiu, S.-Y. Chang, H.-C. Wu, S. C.-H. Huang, and F.-H. Chen, “Physical layer security in wireless networks: A tutorial,” IEEE Wireless Communications, vol. 18, no. 2, pp. 66–74, Apr. 2011.

Z. Yang, W. Huang, and Y.-J. Zhang, “LW-HiDDeN: Lightweight deep watermarking for mobile applications,” in Proceedings of the ACM Multimedia Conference, 2021, pp. 2413–2421.

Y. Hu, M. Zhang, and X. Wang, “Efficient RSA implementation for resource-constrained IoT devices,” IEEE Internet Things Journal, vol. 7, no. 6, pp. 5123–5134, Jun. 2020.

A. O. Mulani, P. B. Mane, “Watermarking and cryptography based image authentication on reconfigurable platform,” Bulletin of Electrical Engineering and Informatics, vol. 6, no. 2, pp. 181–187, Jun. 2017.

A. O. Mulani and P. B. Mane, “Area optimization of cryptographic algorithm on less dense reconfigurable platform,” 2014 International Conference on Smart Structures and Systems (ICSSS), Chennai, India, 2014, pp. 86–89.

A. O. Mulani, V. V. Godase, S. R. Takale, and R. G. Ghodake, “Image authentication using cryptography and watermarking,” International Journal of Image Processing and Smart Sensors, vol. 1, no. 2, pp 27–34, Sep. 2025.

S. Salunkhe, A. O. Mulani, D. Shahane, M. Rana, S. M. Shukla, and M. M. Jadhav, “Secure image transmission using chaotic encryption and DWT watermarking on reconfigurable platform,” Journal of Discrete Mathematical Sciences & Cryptography, vol. 29, no. 1, pp. 349–361, 2026.

K. R. Chaudhari, A. O. Mulani, M. P. Gajare, V. Jadhav, P. Yawle, and A. V. Bang, “Bit error rate analysis of various error correction codes with concatenated RS-convolutional codes,” Journal of Discrete Mathematical Sciences & Cryptography, vol. 29, no. 1, pp. 199–214, 2026.

A. O. Mulani and P. B. Mane, DWT based robust invisible watermarking. Scholars’ Press, 2016.

A. O. Mulani and P. B. Mane, “Area efficient high speed FPGA based invisible watermarking for image authentication,” Indian journal of science and technology, vol. 9, no. 39, pp. 1–6, Oct. 2016.

P. R. Kulkarni, A. O. Mulani, and P. B. Mane, “Robust invisible watermarking for image authentication,” in Emerging Trends in Electrical, Communications and Information Technologies, Springer, Nov. 2016, pp. 193–200.

G. Shinde and A. O. Mulani, “A robust digital image watermarking using DWT -PCA,” International Journal of Innovations in Engineering Research and Technology, vol. 6, no. 4, pp. 1–7, Mar. 2021.

A. O. Mulani, and G. N. Shinde, “An approach for robust digital image watermarking using DWT‐PCA,” Journal of Science and Technology, vol. 6, no. 1, pp. 59–62, Aug. 2021.

A. O. Mulani and P. Mane, “Secure and area efficient implementation of digital image watermarking on reconfigurable platform,” International Journal of Innovative Technology and Exploring Engineering, vol. 8, no. 2, pp. 56–61, 2018.

S. Takale and A. O. Mulani, “DWT-PCA based video watermarking”, Journal of Electronics, Computer Networking and Applied Mathematics, vol. 2, no. 06, pp. 1–7, Nov. 2022.

S. Takale and A. O. Mulani, “Video watermarking system,” International Journal for Research in Applied Science & Engineering Technology, vol. 10, no. 3, pp. 105–107, Mar. 2022.

Published

2026-05-07

Issue

Section

Articles