Author:
Hodkhasa Sandip,Guo Huiping
Abstract
Watermarking is extensively used in various media for data transfer, content authentication and integrity. The continuous flow of data is always vulnerable to tamper. This research proposes a new watermarking scheme that detects tampering in a stream of data. The stream of data is dynamically divided into different sized groups using synchronization points. A computed watermark is embedded in each group by hashing the concatenating the current group and the next group. A secondary watermark is generated based on the current group that prevents tampering from any attacks in the current group. Watermark verification table is used to determine all possible scenarios for false results. Experiments are performed to show its efficiency. False results decrease as the group size becomes larger. Random burst attacked requires larger group size. The scheme also shows with the increase in grouping parameter ‘m’ which defines the synchronization point, the false positive rate decreases.
Publisher
Academy and Industry Research Collaboration Center (AIRCC)
Reference15 articles.
1. [1] X. Sun, J. Su, B. Wang and Q. Liu, "Digital Watermarking Method for Data Integrity Protection in Wireless Sensor Networks," International Journal of Security and Its Application, vol. 7, no. 4, pp. 407-16, 2013.
2. [2] I. Kamel, O. Al Koky and A. Al Dakkak, "Distortion-Free Watermarking Scheme for Wireless Sensor Networks," in International Conference on Intelligent Networking and Collaborative Systems, Barcelona, Spain, 2009.
3. [3] B. Wang, X. Sun, Z. Ruan and H. Ren, "Multi-mark- Multiple Watermarking Method for Privacy Data Protection in Wireless Sensor Networks," Information Technology Journal, vol. 10, no. 4, pp. 833-40, 2011.
4. [4] I. Kamel and H. Juma, "Simplified watermarking scheme for sensor networks," International Journal of Internet Protocal Technology, vol. 5, no. 1-2, pp. 101-11, 2010.
5. [5] U. Khadam, M. Iqbal, M. Alruily, M. Al Ghamdi, M. Ramzan and S. Almotiri, "Text Data Security and Privacy in the Internet of Things: Threats, Challenges, and Future Directions," Wireless Communications and Mobile Computing, vol. 2020, pp. 1-15, 2020.