2014
DOI: 10.1049/el.2014.2493
|View full text |Cite
|
Sign up to set email alerts
|

Aggregation‐tolerant steganography for data‐stream integrity verification

Abstract: Data outsourcing can make data-integrity protection a challenging task, especially when the trustworthiness of a third-party is unproven. A novel auditing process for integrity verification of data stream, whose storage and handling is outsourced to a third-party, is explored. For this purpose, the hidden information within this data that provides support for in-network data aggregation environments, such as sensor networks is masked. This mask is achieved by simultaneous embedding of several shifted watermark… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2015
2015
2016
2016

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 5 publications
0
2
0
Order By: Relevance
“…Before outsourcing, medical data undergo two consecutive steps ; the binning agent firstly bins the data to satisfy k-anonymity specification and secondly the watermark agent inserts watermark information in a hierarchical manner. Lately, Soltani Panah and van Schyndel [36] described an efficient watermark-based system for private data auditing; instead of delegating the task of data evaluation to a trusted third party, the proposed watermarking method verifies the trustworthiness of data whose storage and handling is outsourced to the cloud, by the entity/person that knows the embedded values.…”
Section: ) Secure Data Outsourcingmentioning
confidence: 99%
See 1 more Smart Citation
“…Before outsourcing, medical data undergo two consecutive steps ; the binning agent firstly bins the data to satisfy k-anonymity specification and secondly the watermark agent inserts watermark information in a hierarchical manner. Lately, Soltani Panah and van Schyndel [36] described an efficient watermark-based system for private data auditing; instead of delegating the task of data evaluation to a trusted third party, the proposed watermarking method verifies the trustworthiness of data whose storage and handling is outsourced to the cloud, by the entity/person that knows the embedded values.…”
Section: ) Secure Data Outsourcingmentioning
confidence: 99%
“…2) Similarly, Soltani Panah and van Schyndel presented a high capacity low complexity watermarking scheme for ECG signals [36]. Given an ECG segment, a time-based sliding window is employed to find the local minimum and maximum data values in the current window to preserve those values during watermark insertion.…”
Section: A Time-seriesmentioning
confidence: 99%