On the properties of non-media digital watermarking: a review of state of the art techniques

AS Panah, R Van Schyndel, T Sellis, E Bertino - IEEE Access, 2016 - ieeexplore.ieee.org
Over the last 25 years, there has been much work on multimedia digital watermarking. In this
domain, the primary limitation to watermark strength has been in its visibility. For multimedia …

Taxonomy and challenges in machine learning-based approaches to detect attacks in the internet of things

O Faraj, D Megías, AM Ahmad… - Proceedings of the 15th …, 2020 - dl.acm.org
The insecure growth of Internet-of-Things (IoT) can threaten its promising benefits to our
daily life activities. Weak designs, low computational capabilities, and faulty protocol …

TrailChain: Traceability of data ownership across blockchain-enabled multiple marketplaces

P Gupta, V Dedeoglu, SS Kanhere, R Jurdak - Journal of Network and …, 2022 - Elsevier
Today massive amounts of data are generated from Internet-of-Things (IoT) sensors that can
be streamed in real-time and utilized for building valuable services. As the demand for data …

Towards a formally verified zero watermarking scheme for data integrity in the Internet of Things based-wireless sensor networks

K Hameed, A Khan, M Ahmed, AG Reddy… - Future Generation …, 2018 - Elsevier
Abstract The Internet of Things (IoT) is an emerging paradigm in which billions of devices
communicate, thus producing and exchanging information related to real world objects …

A data authentication scheme for UAV ad hoc network communication

J Sun, W Wang, L Kou, Y Lin, L Zhang, Q Da… - The Journal of …, 2020 - Springer
In this paper, we propose an efficient and energy-saving distributed network architecture
based on clustering stratification to solve the information security problem of unmanned …

A new digital watermarking method for data integrity protection in the perception layer of IoT

G Zhang, L Kou, L Zhang, C Liu… - Security and …, 2017 - Wiley Online Library
Since its introduction, IoT (Internet of Things) has enjoyed vigorous support from
governments and research institutions around the world, and remarkable achievements …

[PDF][PDF] A Dual-Chaining Watermark Scheme for Data Integrity Protection in Internet of Things.

B Wang, W Kong, W Li, NN **ong - Computers, Materials & …, 2019 - cdn.techscience.cn
Chaining watermark is an effective way to verify the integrity of streaming data in wireless
network environment, especially in resource-constrained sensor networks, such as the …

[HTML][HTML] An authentication scheme for FANET packet payload using data hiding

D Mallikarachchi, KS Wong, JMY Lim - Journal of Information Security and …, 2023 - Elsevier
Flying ad hoc networks (FANETs) are gaining much traction in recent years due to their wide
range of applications, resulting in the emergence of a number of studies on the facilitation of …

Image complexity and feature mining for steganalysis of least significant bit matching steganography

Q Liu, AH Sung, B Ribeiro, M Wei, Z Chen, J Xu - Information Sciences, 2008 - Elsevier
The information-hiding ratio is a well-known metric for evaluating steganalysis performance.
In this paper, we introduce a new metric of image complexity to enhance the evaluation of …

A reversible watermarking authentication scheme for wireless sensor networks

X Shi, D **ao - Information Sciences, 2013 - Elsevier
Authentication is a very important demand in wireless sensor networks (WSNs), especially in
some critical applications. Previous watermarking-based approaches always make …