Watermarking-based intellectual property protection for sensor streaming data

被引:2
作者
Xiao, Xiangrong [1 ]
Sun, Xingming [1 ]
Li, Fan [2 ]
Wang, Baowei [1 ]
Xia, Zhihua [1 ]
Liang, Wei [1 ]
机构
[1] Hunan Univ, Sch Comp & Commun, South Rd Lushan St, Changsha, Hunan, Peoples R China
[2] Beijing Inst Technol, Sch Comp Sci, Beijing, Peoples R China
基金
中国国家自然科学基金; 国家高技术研究发展计划(863计划);
关键词
WSNs; wireless sensor networks; intellectual property; streaming data; watermarking; time-varying; embedding; extraction; detection;
D O I
10.1504/IJCAT.2010.036025
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Watermarking is an efficient solution especially in the application of Intellectual Property (IP) in public security and military area. In this paper, we propose a novel algorithm, named Time Varying Watermarking Algorithm (TVWA), for streaming data copyright protection. By adjusting the sequence of data in every packet and keeping the value of the data unchanged, we embed the watermark into streaming data. We apply TVWA on a prototype system, which is developed with TinyOS motes. The results demonstrate that the proposed algorithm is simple but of great efficiency. We can accurately extract the embedded watermark in the real-time mode. We can also verify the IP of the data by only detecting the segment of data in the off-line mode.
引用
收藏
页码:213 / 223
页数:11
相关论文
共 23 条
[1]  
Adrian Angela, 2009, International Journal of Intercultural Information Management, V1, P331, DOI 10.1504/IJIIM.2009.025939
[2]  
Agrawal R, 2003, VLDB J, V12, P157, DOI [10.1007/s00778-003-0097-x, 10.1007/s000778-003-0097-x]
[3]  
Babu S, 2001, SIGMOD REC, V30, P109, DOI 10.1145/603867.603884
[4]  
Buonadonna P., 2001, 20 ANN JOINT C IEEE, P20
[5]  
Defense Advanced Research Projects Agency, 2000, FCS COMM TECHN
[6]  
Feng J, 2003, PROC SPIE, V5020, P391, DOI 10.1117/12.479736
[7]  
Gross-Amblard D., 2003, 22 ACM SIGMOD CAL US
[8]   A fragile watermarking scheme for detecting malicious modifications of database relations [J].
Guo, HP ;
Li, YJ ;
Liu, AY ;
Jajodia, S .
INFORMATION SCIENCES, 2006, 176 (10) :1350-1378
[9]   Chaining watermarks for detecting malicious modifications to streaming data [J].
Guo, Huiping ;
Li, Yingjiu ;
Jajodia, Sushil .
INFORMATION SCIENCES, 2007, 177 (01) :281-298
[10]  
Kleider J. E., 2004, INT C AC SPEECH SIGN