期刊文献+

基于差值扩展的无线传感器网络无损认证水印算法 被引量:4

Lossless authentication watermarking algorithm based on difference expansion in wireless sensor network
下载PDF
导出
摘要 在军事、远程医疗、卫星遥感等领域无线传感器网络数据认证过程中,往往存在对原始数据流的需求。利用差值扩展思想,提出一种适用于无线传感器网络的无损水印方案。水印信息依赖于数据流本身而产生,将经扩频处理后再嵌入到无线传感器网络数据流中,水印检测成功率较高。当含水印WSN数据未遭受攻击时,可无损恢复原始数据流。实验结果表明了该WSN无损水印算法的有效性,算法显示出比同类算法更高的透明性,同时具有较强的窜改识别能力。 To meet the demand of the original data in wireless sensor network (WSN) data authenticity in some sensitive data application scenarios,such as military,remote medicinal,and satellite remote sensing,this paper proposed a reversible watermarking scheme in WSN by using the difference expansion.It generated the watermark from the original data steams itself.To improve the watermark detection reliability,the scheme embeded the spread watermark into the WSN data streams.The original data stream could be losslessly recovered from the unaltered watermarked WSN data streams.Extensive experimental results demonstrate the effectiveness of the proposed scheme.It can achieve better transparency than some existing similar schemes.Meantime,it has good identification ability to illegal tampering.
出处 《计算机应用研究》 CSCD 北大核心 2010年第11期4296-4298,4302,共4页 Application Research of Computers
基金 湖南省科技计划资助项目(2009GK3097) 湖南省教育厅科研项目(09C881)
关键词 无线传感器网络 数据认证 无损水印 差值扩展 wireless sensor network data authentication lossless watermark difference expansion
  • 相关文献

参考文献11

  • 1杨光松,陈朝阳,肖明波.无线传感器网络中的跨层安全设计[J].传感器与微系统,2007,26(2):15-18. 被引量:1
  • 2OZDEMIR S, XIAO Yang. Secure data aggregation in wireless sensor networks: a comprehensive overview [ J ]. Computer Networks, 2009,53 ( 12 ) : 2022 - 2037.
  • 3彭志娟,王汝传,王海艳.基于数字水印技术的无线传感器网络安全机制研究[J].南京邮电大学学报(自然科学版),2006,26(4):69-72. 被引量:10
  • 4董晓梅,赵枋,李晓华,于戈,申德荣.适用于无线传感器网络的数字水印技术[J].武汉大学学报(理学版),2009,55(1):125-128. 被引量:6
  • 5ZHANG Wei, LIU Yong-he, DAS S K, et al. Secure data aggregation in wireless sensor networks: a watermark based authentication supportive approach [ J ]. Pervasive and Mobile Computing, 2008,4 (5) :658-680.
  • 6DONG Xiao-mei, LI Xiao-hua. An authentication method for self nodes based on watermarking in wireless sensor networks [ C ]//Proc of the 5th International Conference on Wireless Communications, Networking and Mobile Computing. 2009:4529-4532.
  • 7FENG J, POTKNJAK M. Real-time watermarking techniques for sensor networks [ C ]//Proc of SPIE Security and Watermarking of Multimedia Contents. Santa Clara: SPIE Press,2003:391-402.
  • 8WANG Hong-gang, PENG Dong-ming, WANG Wei, et al. Energy-aware adaptive watermarking for real-time image delivery in wireless sensor networks [ C ]//Proc of IEEE International Conference on Communications. 2008 : 1479-1483.
  • 9GUO Hui-ping, LI Ying-jiu, JAJODIA S. Chaining watermarks for detecting malicious modifications to streaming data [J]. Information Sciences ,2007,177( 1 ) :281-298.
  • 10曹远福 孙星明 王保卫等.基于关联数字水印的无线传感器网络数据完整性保护.计算机研究与发展,2009,46:71-77.

二级参考文献38

  • 1尹浩,林闯,邱锋,丁嵘.数字水印技术综述[J].计算机研究与发展,2005,42(7):1093-1099. 被引量:136
  • 2Agrawal R,Kiernan J. Watermarking Relational Databases[C]//Proceeding of the 28th VLDB Conference. Hong Kong: VLDB Press, 2002: 155-166.
  • 3Sion R,Atallah M, Prabhakar S. Rights Protection for Relational Data[C]//Proceedings of ACM SIGMOD. San Diego : ACM Press, 2003 : 98-109.
  • 4Feng J,Potkonjak M. Real-Time Watermarking Techniques for Sensor Networks[C]//SPIE Security and Watermarking of Multimedia Contents. Santa Clara: SPIE Press, 2003 : 391-402.
  • 5Sion R, Atallah M, Prabhakar S. Resilient Rights Protection for Sensor Streams[C]//Proceeding of the 30th VLDB Conference. Toronto: VLDB Press, 2004 : 732-743.
  • 6Guo Huiping, Li Yingjiu, Jajodia S. Chaining Watermarks for Detecting Malicious Modifications to Streaming Data[J]. Information Sciences, 2007,177 ( 1 ) : 281- 298.
  • 7Xiao Xiangrong, Sun Xingming, Yang Lincong,et al. Secure Data Transmission of Wireless Sensor Network Based on Information Hiding[ C ]/ / Proceedings of the Fourth Annual International Conference on Mobile and Ubiquitous Systems :Computing, Networking and Services. Philadelphia : IEEE Press, 2007 : 1-6.
  • 8HOLMAN R,STANLEY J.Applying Video Sensor Networks to Nearshore Environment Monitoring[J].IEEE Pervasive Computing,2003,2(4):14-21.
  • 9PAN Jianping,HOU Y T.Locating Base-Stations for Video Sensor Networks[C]// Vehicular Technology Conference.2003:3000-3004.
  • 10VENKATARAMAN V,SRINIVASAN S,STEFANIDIS A.Object Color Propagation in Unregistered Distributed Video Sensor Network[C]//International Conference on Image Processing.2004:2853-2856.

共引文献15

同被引文献37

  • 1彭志娟,王汝传,王海艳.基于数字水印技术的无线传感器网络安全机制研究[J].南京邮电大学学报(自然科学版),2006,26(4):69-72. 被引量:10
  • 2曹远福 孙星明 王保卫等.基于关联数字水印的无线传感器网络数据完整性保护.计算机研究与发展,2009,46:71-77.
  • 3Pramoun T, Mettripun N, Amornraksa T. Image watermark retrieval based on majority voting from different color spaces[ C ]. USA:IEEE ,2011:999 - 1002.
  • 4Shi Hongqin, Lti Fangliang. A Blind Digital Watermark Technique for Color Image Based on Integer Wavelet Transform [ C ]. USA : IEEE, 2010:1 -4.
  • 5PROVOS N,HONEYMAN P.Hide and Seek:An Introduction to Steganography[J].IEEE Security and Privacy Magazine,2003,1 (3):32-44.
  • 6HONG Wien,CHEN Tung-shou.Reversible Data Embedding for High Quality Images Using Interpolation and Reference Pixel Distribution Mechanism[J].Journal of Visual Communication and Image Representation,2011,22 (2):131-140.
  • 7TIAN Jun.Reversible Data Embedding Using a Difference Expansion[J].IEEE Trans on Circuits and Systems for Video Technology,2003,9 (8):890-896.
  • 8ZHANG Xin-peng,WANG Shou-zhong.Efficient Steganographic Embedding by Exploiting Modification Direction[J].IEEE Communications Letters,2006,10(11):781-783.
  • 9HONG Wien,CHEN Tungshou,LUO Chihwei.Data Embedding Using Pixel Value Differencing and Diamond Encoding with Multiple-Base Notational System[J].Journal of Systems and Software,2012,85(5):1166-1175.
  • 10NI Zhicheng,SHI Yunqing,ANSARI Nirwan,et al.Reversible Data Hiding[J].IEEE Transactions on Circuits and Systems for Video Technology,2006,16(3):354-362.

引证文献4

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部