2012 Eighth International Conference on Semantics, Knowledge and Grids 2012
DOI: 10.1109/skg.2012.56
|View full text |Cite
|
Sign up to set email alerts
|

Watermarking Technique for Wireless Sensor Networks: A State of the Art

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…The watermarking process will hide authentication information in original data, and the marks may be visible or not. In a secure context, watermarks must not be detected or removed by attackers, and there are different ways to provide such protection [62].…”
Section: Watermarkingmentioning
confidence: 99%
See 2 more Smart Citations
“…The watermarking process will hide authentication information in original data, and the marks may be visible or not. In a secure context, watermarks must not be detected or removed by attackers, and there are different ways to provide such protection [62].…”
Section: Watermarkingmentioning
confidence: 99%
“…The watermarking process is composed of three general stages: generation, embedding and detection [62]. The generation process depends on the nature of the considered sensed data, and it may require complex computation, where a watermarking key is generally employed.…”
Section: Watermarkingmentioning
confidence: 99%
See 1 more Smart Citation
“…This method dynamically chooses adaptive watermarking positions to embed watermark according to network conditions − the image content, traffic characteristics and transmission strategies − so that the energy efficiency and security can be achieved. B. Harjito et al investigated the possibility of digital watermarking technique as an alternative method for providing security in [6], and presented the analysis of the existing stateof-the-art watermarking algorithms developed for WMSNs in [13]. For more detailed information on watermarking techniques adopted in WMSNs, the reader is referred to [13] [14].…”
Section: B Related Work On Data Authentication In Wmsnsmentioning
confidence: 99%
“…B. Harjito et al investigated the possibility of digital watermarking technique as an alternative method for providing security in [6], and presented the analysis of the existing stateof-the-art watermarking algorithms developed for WMSNs in [13]. For more detailed information on watermarking techniques adopted in WMSNs, the reader is referred to [13] [14].…”
Section: B Related Work On Data Authentication In Wmsnsmentioning
confidence: 99%