Data Authenticity and Integrity in Wireless Sensor Networks Based on a Watermarking Approach
暂无分享,去创建一个
Lamri Laouamer | Laurent Nana | Anca Pascu | Ahcène Bounceur | Reinhardt Euler | Farid Lalem | Muath AlShaikh
[1] B. Kumar,et al. Identification of Packet Dropping and Modification in Wireless Sensor Networks , 2013 .
[2] M. Tahar Kechadi,et al. CupCarbon: a multi-agent and discrete event wireless sensor network design and simulation tool , 2014, SimuTools.
[3] Xing Xin,et al. A singular-value-based semi-fragile watermarking scheme for image content authentication with tamper localization , 2015, J. Vis. Commun. Image Represent..
[4] Ibrahim Kamel,et al. A Lightweight Data Integrity Scheme for Sensor Networks , 2011, Sensors.
[5] Xingming Sun,et al. A Reversible Watermarking Scheme Based on Difference Expansion for Wireless Sensor Networks , 2015 .
[6] Vipul Gupta,et al. Energy analysis of public-key cryptography for wireless sensor networks , 2005, Third IEEE International Conference on Pervasive Computing and Communications.
[7] Vidyasagar Potdar,et al. Secure Transmission in Wireless Sensor Networks Data Using Linear Kolmogorov Watermarking Technique , 2014, ArXiv.
[8] Jaipal Singh,et al. Watermarking technique for wireless multimedia sensor networks: a state of the art , 2012, CUBE.
[9] Jian Shen,et al. A Copyright Protection Method for Wireless Sensor Networks Based on Digital Watermarking , 2015 .
[10] Xiaohua Li,et al. An Authentication Method for Self Nodes Based on Watermarking in Wireless Sensor Networks , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[11] Ioan-Catalin Dragoi,et al. On Local Prediction Based Reversible Watermarking , 2015, IEEE Transactions on Image Processing.
[12] R. Bulli Babu,et al. Digital Data Theft Detection using Watermarking , 2015 .
[13] Xingming Sun,et al. Multi-mark: Multiple Watermarking Method for Privacy Data Protection in Wireless Sensor Networks , 2011 .
[14] Lamri Laouamer,et al. A Semi-Blind Robust DCT Watermarking Approach for Sensitive Text Images , 2015 .
[15] Xingming Sun,et al. Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks , 2013 .
[16] Miodrag Potkonjak,et al. Security in sensor networks: watermarking techniques , 2004 .
[17] Lamri Laouamer,et al. New Images Watermarking Scheme Based on Singular Value Decomposition , 2013, J. Inf. Hiding Multim. Signal Process..