2007
DOI: 10.1016/j.ins.2006.03.014
|View full text |Cite
|
Sign up to set email alerts
|

Chaining watermarks for detecting malicious modifications to streaming data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
69
0
2

Year Published

2011
2011
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 86 publications
(71 citation statements)
references
References 16 publications
0
69
0
2
Order By: Relevance
“…The algorithm can apply to the real-time requirements in WSN and not affect the normal use of perception data as long as the error introduced by the embedded hidden information is in a limited range. In [2], Guo, et al, proposed a novel fragile watermarking algorithm which verifies the integrity of streaming data at the application layer. The data are divided into groups based on synchronization points, so each group can be synchronized and any modifications made to one group only affect no more than two groups.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The algorithm can apply to the real-time requirements in WSN and not affect the normal use of perception data as long as the error introduced by the embedded hidden information is in a limited range. In [2], Guo, et al, proposed a novel fragile watermarking algorithm which verifies the integrity of streaming data at the application layer. The data are divided into groups based on synchronization points, so each group can be synchronized and any modifications made to one group only affect no more than two groups.…”
Section: Related Workmentioning
confidence: 99%
“…So the digital watermarking technology is introduced. Watermarking has been popularly used in security scheme in WSNs [1][2][3][4][5][6], mainly based on changing the least significant bit or embedding some blank space, which increases the length of the data packet or destructs the accuracy of the original data to some extent. Such changes often do not affect the visual perception and information expression of images or any other multimedia data with high redundancy.…”
Section: Introductionmentioning
confidence: 99%
“…H.P Guo et al [10] used the watermarking method to verify the integrity of streaming data. The watermark is generated and embedded into the data, which are grouped on synchronization points.…”
Section: Information Hiding In Wireless Sensor Networkmentioning
confidence: 99%
“…In this case, information hiding technology is introduced to protect the data in wireless sensor networks [8][9][10][11][12]. Our method is hidding the encrypted sensitive information into other ordinary data by using some information hiding methods.…”
Section: Introductionmentioning
confidence: 99%
“…Huiping Guo, Yingjiu Li, Sushil Jajodia in [15], the authors implemented chaining of watermarks wherein the data were divided to form groups of synchronization points which insisted modifications made to one group affected other two groups. Watermarks are embedded unique to each group to save communications bandwidth henceforth making flexible the process of detection and location of modifications if any made to the data stream.…”
Section: Watermark Chainingmentioning
confidence: 99%