2015
DOI: 10.14257/ijsia.2015.9.1.14
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Data Transmission Scheme Based on Information Hiding in Wireless Sensor Networks

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 19 publications
0
2
0
Order By: Relevance
“…The results also prove that the proposed watermarking technique improves both the capacity of the embedded information and robustness without affecting the perceptual quality of the original image. In [9], a novel algorithm to deal with malicious nodes with fake identities is presented and ensures the secure transmission of hidden information. In this scheme, they change the beacon message and routing table of CTP in order to satisfy the need of transmitting and storing identity information of sensors.…”
Section: Related Workmentioning
confidence: 99%
“…The results also prove that the proposed watermarking technique improves both the capacity of the embedded information and robustness without affecting the perceptual quality of the original image. In [9], a novel algorithm to deal with malicious nodes with fake identities is presented and ensures the secure transmission of hidden information. In this scheme, they change the beacon message and routing table of CTP in order to satisfy the need of transmitting and storing identity information of sensors.…”
Section: Related Workmentioning
confidence: 99%
“…In general, information-hiding techniques are categorised into two classes: invisible watermarking [1][2][3] and steganography [4][5][6][7]. Invisible watermarking is employed for copyright protection, traitor tracing, and digital authentication.…”
Section: Introductionmentioning
confidence: 99%