2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems: Networking &Amp; Services (MobiQuitous) 2007
DOI: 10.1109/mobiq.2007.4451044
|View full text |Cite
|
Sign up to set email alerts
|

Secure Data Transmission of Wireless Sensor Network Based on Information Hiding

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
10
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
3
3
2

Relationship

2
6

Authors

Journals

citations
Cited by 18 publications
(10 citation statements)
references
References 21 publications
0
10
0
Order By: Relevance
“…This scheme can efficiently detect and locate modifications and ensure the completeness of data streams. In [3], Xiangrong Xiao, et al, proposed a novel secure transmission strategy based on information hiding (IH). They acquire sensitive data security using the advantage of IH technique without encryption.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This scheme can efficiently detect and locate modifications and ensure the completeness of data streams. In [3], Xiangrong Xiao, et al, proposed a novel secure transmission strategy based on information hiding (IH). They acquire sensitive data security using the advantage of IH technique without encryption.…”
Section: Related Workmentioning
confidence: 99%
“…So the digital watermarking technology is introduced. Watermarking has been popularly used in security scheme in WSNs [1][2][3][4][5][6], mainly based on changing the least significant bit or embedding some blank space, which increases the length of the data packet or destructs the accuracy of the original data to some extent. Such changes often do not affect the visual perception and information expression of images or any other multimedia data with high redundancy.…”
Section: Introductionmentioning
confidence: 99%
“…Xiao et al [11] proposed real-time watermarking technique by embedding authorship signature into the sensing data, which imposes error between the expecting distances and ensuring. But embedding information is in some laws, which easily arouses attackers' attention.…”
Section: Information Hiding In Wireless Sensor Networkmentioning
confidence: 99%
“…In this case, information hiding technology is introduced to protect the data in wireless sensor networks [8][9][10][11][12]. Our method is hidding the encrypted sensitive information into other ordinary data by using some information hiding methods.…”
Section: Introductionmentioning
confidence: 99%
“…Reasonable watermarking algorithms can ensure the data security at a low cost of operation, and tolerate effectively the impacts from data processing. Using digital watermarking techniques to solve the security issues in the wireless sensor networks for Smart Grid is a practical and effective solution (Xiao et al, 2007).…”
Section: Digital Watermarkingmentioning
confidence: 99%