CN102946393B - A kind of safety communicating method applied to wireless multimedia sensor network - Google Patents

A kind of safety communicating method applied to wireless multimedia sensor network Download PDF

Info

Publication number
CN102946393B
CN102946393B CN201210469982.XA CN201210469982A CN102946393B CN 102946393 B CN102946393 B CN 102946393B CN 201210469982 A CN201210469982 A CN 201210469982A CN 102946393 B CN102946393 B CN 102946393B
Authority
CN
China
Prior art keywords
node
wavelet
secret information
data
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201210469982.XA
Other languages
Chinese (zh)
Other versions
CN102946393A (en
Inventor
林巧民
王汝传
叶宁
孙力娟
肖甫
黄海平
李鹏
顾翔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201210469982.XA priority Critical patent/CN102946393B/en
Publication of CN102946393A publication Critical patent/CN102946393A/en
Application granted granted Critical
Publication of CN102946393B publication Critical patent/CN102946393B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Editing Of Facsimile Originals (AREA)
  • Computer And Data Communications (AREA)

Abstract

A kind of safety communicating method applied to wireless multimedia sensor network, potential communication security is threatened in being applied for wireless multimedia sensor network, and sensor node technical resource it is limited the problem of, introduce the concept of Distributed Calculation, it is proposed that a kind of distributed network communication topological structure of load balancing;Meanwhile, using the Steganography based on wavelet transform, it is ensured that the invisibility and security of secret information;Perfect hash function is introduced in Information hiding/extraction algorithm, without key management.This method make it that communication process has higher robustness in wireless multimedia sensor network, and each node load balancing reduces the energy consumption of sensing node, extends network life cycle.

Description

A kind of safety communicating method applied to wireless multimedia sensor network
Technical field
Wireless multimedia sensor network is applied to the present invention relates to one kind(WirelessMultimediaSensorNetworks,WMSNs)Safety communication technology scheme, particularly a kind of safety communicating method based on distributed image Steganography, belongs to Computer Wireless Communication security technology area.
Background technology
With multimedia sensing equipment(Such as CMOS camera and microphone)And wireless communication system(The communication system that such as IEEE802.11,802.15 standards are proposed)Popularization, wireless multimedia sensor network obtained quick development.So-called wireless multimedia sensor network, the distributed sensing network being made up of one group of multimedia sensing node with calculating, storage and communication capacity, it perceives the media information of place surrounding enviroment by the multi-media sensor on node(Audio stream, video flowing, image, numerical value etc.), data are passed to by converging information center by multi-hop relay mode, then Monitoring Data is analyzed by convergence center.Increasingly complicated and changeable with monitoring of environmental, compared with traditional sensor network, as a kind of brand-new Information acquisition technology, WMSNs more focuses on the collection and processing of the big data quantities such as audio, video, image, large information capacity media.WMSNs not only increases existing sensor network application, such as tracking, environmental monitoring, has also expedited the emergence of increasing new application.For example, indoor/outdoor monitoring system, Traffic monitoring and control system, remote medical service system, industrial manufacturing supervision and control system etc., it all has a wide range of applications in military, civilian and commercial field.
Although with good development prospect, due to need in wireless channel transmitting multimedia data, WMSNs is easier by various security attacks(Distorted including eavesdropping, malice injection and packet).In addition, a large amount of multi-medium datas can be produced in WMSNs, and the transmission bandwidth of each multimedia sensing node, energy supply and computing capability are limited, such inner contradictions cause WMSNs compared with traditional sensors network, when solving Communication Security Problem, more challenges are faced.
Guarantee data integrity and credible traditional approach is to use AES.But, between limited energy resource and computing capability, complicated AES, such as Diffie-Hellman public key encryption algorithms are difficult to realize in wireless multimedia sensor network.In addition, in modern encryption system, the distribution and management of key are most important, and this problem needs further solve.In recent years, steganography art(Stegonagraphy)To ensure that digital communication has safely provided a kind of new thinking.Compared with AES, secret information is not processed as unreadable ciphertext by Steganography, but secret information is hidden in the Digital Media of other forms(Text, audio or image)In, from the attention without causing attacker, it is to avoid secret information is found.In addition, it is without complicated rigorous key management in AES, with more preferable flexibility.The information insertion commonly used in Steganography is divided into spatial domain Shift Method and transpositions domain with extraction algorithm.Spatial domain Shift Method is that the redundancy section in carrier information is replaced with information to be concealed, and such as LSB algorithms replace some inessential positions in carrier with hiding information position.And most information concealing methods all employ conversion field technique at present, information to be concealed is embedded into a transformation space (such as wavelet transformed domain) for carrier, transpositions domain has the advantages that can be compatible with data compression standard, stronger with the robustness of the attack such as some image procossings to compressing, cutting out.Although Steganography has many advantages, such as, the technology is not widely used in WMSNs secure communication.American scholar ClaudeTurner proposes a kind of Information hiding applied to sensor network and calculates normal form, but, the normal form does not consider application of the information concealing method in multi-medium data transmission, and related Information hiding and extraction algorithm are needed to be optimized.
Furthermore, it is contemplated that in WMSNs applied environments various technical resources limitation, the safety and secrecy policy of communication must be combined with the distributed treatment mechanism of content of multimedia.Distributed source coding(DistributedSourceCoding, DSC)Technology is exactly the typical distributed treatment mechanism of one of which.So far, in WMSNs, DSC technique is mainly used in multimedia data compression, and due to reducing the computation burden of coding side, this method has more preferable energy-conservation to show on sensing node.How the technology to be applied in WMSNs communication security, while communication quality is ensured, obtain higher energy efficiency, be worth further research.
The content of the invention
Technical problem:The present invention is directed to the problem of being proposed in background technology, it is contemplated that potential communication security is threatened in WMSNs applications, and sensor node technical resource(Wireless transmission bandwidth, energy supply and computing capability)A kind of limitation, it is proposed that safety communicating method applied to wireless multimedia sensor network.This method reduces the energy ezpenditure of sensing node, extends network life while WMSNs communication securities are ensured.
Technical scheme:The present invention is a kind of safety communicating method applied to wireless multimedia sensor network, and this method introduces the concept of Distributed Calculation, it is proposed that a kind of distributed network communication topological structure of load balancing;Using the image latent writing art based on wavelet transform, it is ensured that the invisibility and security of secret information;Perfect hash function is introduced in information insertion/extraction algorithm, without key management;
In the distributed network topology structure used, the transmitting procedure of secret information is as follows,
Step 1:After the sensing node capture images of source, notify the sensing node in the range of efficient communication, meet desired node and select multiple cluster heads according to low energy consumption self adaptation sub-clustering hierarchical structure LEACH (LowEnergyAdaptiveClusteringHierarchy) clustering route protocol;
Step 2:Cluster head that step 1 is obtained is according to the distance between with source node, and self-organizing forms remaining node in a virtual cluster head link, network and selects respective leader cluster node to set up cluster respectively according to LEACH agreements;
Step 3:It is 3 parts that original secret information O is nbits points by source sensing node:O1For n/2bits, O2For n/4bits, O3For n/4bits, wavelet transformation then is carried out to carrier image, wavelet field sub-bands of frequencies coefficient is respectively obtained:LL1,LH1,HL1,HH1;4 nearest member nodes of chosen distance source node, use Node respectively in cluster residing for source nodeLL1,NodeLH1,NodeHL1,NodeHH1Represent, by O1And LL1It is transferred to NodeLL1Node, by O2And LH1It is transferred to NodeLH1Node, O3And HL1It is transferred to NodeHL1Node, HH1It is transferred to NodeHH1Node;
Step 4:In NodeLH1、NodeHL1At node, using the information embedded mobile GIS proposed in this method by O2、O3It is embedded into LH1、HL1In, wavelet coefficient and Node after insertionLL1O1, the LL1 at place, NodeHH1The HH at place1The leader cluster node of lower cluster is transferred to together;
Step 5:Next leader cluster node is received after data, will have been inserted into the LH of secret information1、HL1And HH13 member nodes storage in the cluster is sent to, to O1And LL1Repeat the operation of step 3- steps 5, embedding operation so is repeated along link direction, until reaching aggregation node;
Step 6:In aggregation node, by wavelet inverse transformation, the wavelet coefficient for being embedded with secret information is subjected to wavelet reconstruction, is finally included the stego image of complete secret information;
Step 7:Stego image is transferred to after destination node, and the information extraction algorithm proposed using this method recovers original secret information, so far, and whole secure communication process terminates.
In described information insertion/extraction algorithm, the discrete wavelet transformer used is changed to Harr wavelet transformations, but not limited to this.
In described information insertion/extraction algorithm, the perfect hash function used, using key value and secret information data total amount as input, is output as binary data sequence.
Described information insertion/extraction algorithm, the perfect hash function used uses the perfect hash function based on gperf, but not limited to this.
Beneficial effect:A kind of limitation of this method for potential Communication Security Problem in WMSNs applications, and sensor node technical resource, it is proposed that safety communicating method based on distributed image Steganography.This method first proposed a kind of network topology agreement based on distributed treatment mechanism.On secret information insertion and extraction algorithm, the transform domain method based on wavelet transformation is employed, and introduce perfect hash function.In brief, this method has advantages below:
(1)By concealed sensing data equiblibrium mass distribution to each sensor node.Each node only handles a part for initial data, and neither one node can know whole initial data.Attacked to obtain complete data, attacker needs the communication investigated between all participation nodes.Therefore the mechanism can obtain higher security.
(2)Due to taking distributed mechanism, substantial amounts of calculating can be transferred to energy and the more abundant aggregation node of computing resource from sensing node.Therefore, the life-span of whole network can extend.
(3)Information hiding and the intermediate frequency coefficient in extraction algorithm selection discrete wavelet domain, can so obtain higher robustness, it is to avoid the security threat that interchannel noise, data compression or malicious attack are brought.In addition, by introducing perfect hash function, the mechanism is without complicated key management.
Brief description of the drawings
The present invention is further described with reference to the accompanying drawings and examples.
Fig. 1 is distributed network topology structure.Wherein S is source node, and C1, C2 are leader cluster node, and Sink is aggregation node, and D is purpose node, and LL1 etc. is the member node of embedded secret information.
Fig. 2 is secret information insertion and extraction process, and wherein C is carrier image, and C ' is stego image, and O is secret information, and LL, LH, HL, HH are wavelet conversion coefficient, and P is digital array, represents the wavelet coefficient position of embedded secret information.
Fig. 3 is that stego image is influenceed by interchannel noise and data cutout is attacked.
Embodiment
In order to ensure the communication security in WMSNs applications, present invention employs a kind of communication security guard method based on distributed image Steganography.Specifically, this method can be usedSuch a five-tuple is represented.Wherein C is carrier image, and O is secret information, EkFor information embedded mobile GIS, DkFor information extraction algorithm, P is distributed network topology agreement.Secret information O is embedded in carrier image C by this method, from the attention without causing attacker, for secret information insertion and extraction algorithm EkAnd Dk, we are employed based on two wavelet transforms(DiscreteWaveletTransform, DWT)Transform-domain algorithm, secret information data are embedded into the intermediate frequency coefficient in image wavelet transform domain by the algorithm, both ensure that invisibility of the secret information in transmitting procedure, turn avoid because compression of images and malicious attack etc. and may caused by information lose.In addition, this method by embedded with introducing perfect hash function in extraction algorithm, it is to avoid complicated rigorous cipher key management procedures in conventional encryption algorithm.Further, in order to solve the problems, such as to limit multimedia-data procession and the resource constraint of transmission in WMSNs all the time, the concept of distributed source coding is introduced, it is proposed that a kind of energy-efficient, load balancing distributed network topology agreement.
First, distributed network topology agreement
The transmitting procedure of secret information in a network is as follows in such as accompanying drawing 1, the agreement:
1. after the sensing node capture images of source, notifying the sensing node in the range of efficient communication, meet desired node and select multiple cluster heads according to LEACH (LowEnergyAdaptiveClusteringHierarchy) clustering route protocol.
2. cluster head that step 1 is obtained is according to the distance between with source node, self-organizing forms remaining node in a virtual cluster head link, network and is selected respective leader cluster node to set up cluster respectively according to LEACH.
3. source sensing node is by original secret information O(nbits)It is divided into 3 parts:O1(n/2bits)、O2(n/4bits)、O3(n/4bits) wavelet transformation then, is carried out to carrier image, wavelet field sub-bands of frequencies coefficient is obtained:LL1,LH1,HL1,HH1.Wherein, LH1, HL1For intermediate frequency coefficient.4 nearest member nodes of chosen distance source node, use Node respectively in cluster residing for source nodeLL1,NodeLH1,NodeHL1,NodeHH1Represent.By O1And LL1It is transferred to NodeLL1Node, by O2And LH1It is transferred to NodeLH1Node, O3And HL1It is transferred to NodeHL1Node, HH1It is transferred to NodeHH1Node.
4. in NodeLH1、NodeHL1At node, using the information embedded mobile GIS proposed in this method by O2、O3It is embedded into LH1、HL1In.Wavelet coefficient and Node after insertionLL1O1, the LL1 at place, NodeHH1The HH at place1The leader cluster node of lower cluster is transferred to together.
5. next leader cluster node is received after data, the LH of secret information will be had been inserted into1、HL1And HH13 nearest member node storages being sent in the cluster, to O1And LL1Repeat the operation of step 3- steps 5.Embedding operation so is repeated along link direction, until reaching convergence(Sink)Node.
6. in aggregation node, by wavelet inverse transformation, the wavelet coefficient for being embedded with secret information is subjected to wavelet reconstruction, is finally included the stego image of complete secret information(Stego).
7. stego image is transferred to after destination node, the information extraction algorithm proposed using this method recovers original secret information.So far, whole secure communication process terminates.
2nd, information insertion/extraction algorithm
Information embedded mobile GIS:
1. input secret information O and carrier image C.
2. secret information O is serialized into Tokenize, 1 byte is a data block, is stored in array L [m].Wherein, the sum of data block is m.
3. couple C carries out two-dimensional discrete wavelet conversion, 4 wavelet sub-band coefficients LL, HL, LH, HH are obtained.
4. producing the binary system pseudo random number of 16 bits using PRNG, keyword h is used as.
5. keyword h and m as input, is produced a data sequence by perfect hash function H, stored with array P [m].The Serial No. represents the wavelet coefficient position of embedded concealed data.
6. select HL, LH wavelet sub-band to be embedded in secret information.J ← 1, works as j<During=m, following embedding operation is performed:
Read the data of storage in L [j].
The position of wavelet coefficient is determined according to P [j], the wavelet coefficient at this is replaced with data in L [j].
j←j+1.
7. final output is keyword h, the wavelet coefficient of secret information data volume m and embedded secret information.So far whole information telescopiny terminates.
Information extraction algorithm:
1. inputting keyword h ', secret information data volume m and stego image C ', wherein h ' binary length is n.
2. pair n/16 grades of wavelet transformations of C ' carry out, obtain wavelet coefficient LL at different levelsi、HLi、LHi、HHi, wherein i represents wavelet series.
3.i ← 1, works as i<During=n/16, following operate is performed:
Choose wavelet coefficient HLi、LHi
Extract in h ' [(i-1)* 16+1, i*16] binary data, represented with h ' [i].
Using the perfect hash function H of selection, using h ' [i] and m as input, data sequence P ' [m] is produced.
J ← 1, works as j<During=m, following operate is performed:
From HLi、LHiIn extract wavelet coefficient represented by P ' [m] at position.
j←j+1。
4. the data serializing that will be extracted from wavelet coefficients at different levels, finally gives initial data.So far, information extraction process terminates.
The implementation of technical scheme is described in further detail with reference to embodiment.
In the present embodiment, source node is nearer apart from destination node, and whole process only needs one-level wavelet transformation, as shown in Figure 2.The present embodiment is only illustrative of the invention and is not intended to limit the scope of the invention.In addition, it is to be understood that after present invention has been read, those skilled in the art can make various changes or modifications to the present invention, these equivalent form of values also belong to the application appended claims and limit scope.
Whole communication process of the secret information in WMSNs is as follows:
1. after the sensing node capture images C of source, notifying the sensing node in the range of efficient communication, meet desired node and select cluster head according to LEACH agreements.
2. source sensing node carries out Harr wavelet transformations to carrier image C, wavelet field sub-bands of frequencies coefficient is obtained:LL,LH,HL,HH.Wherein, LH, HL are intermediate frequency coefficient.The nearest member node of chosen distance source node, is represented with Node in cluster residing for source node.Original secret information O and wavelet coefficient are transferred to Node nodes.
3. at Node nodes, secret information O is serialized, 1 byte is a data block, is stored in array L [m].Wherein, the sum of data block is m.The binary system pseudo random number of 16 bits is produced using PRNG, keyword h is used as.Using the perfect hash function H based on GNUgperf using keyword h and m as input, a data sequence is produced, is stored with array P [m].The Serial No. represents the wavelet coefficient position of embedded concealed data.Medium wave coefficient HL, LH is selected to be embedded in secret information.J ← 1, works as j<During=m, following embedding operation is performed:
Read the data of storage in L [i].
The position of wavelet coefficient is determined according to P [i], the wavelet coefficient at this is replaced with data in L [i].
j←j+1。
After whole telescopiny terminates, Node nodes are by the wavelet coefficient after processing and are transferred to aggregation node(Sink).
4. in aggregation node, carry out inverse transformation to the wavelet coefficient received using Harr small echos, obtain the stego image containing secret information, then by and the original information bytes length m and keyword h that receive be transferred to destination node.
5. destination node D is received after data, first to C ' carry out Harr wavelet transformations, wavelet coefficient LL, LH, HL, HH are obtained.Then the perfect hash function H based on GNUgperf is utilized, using h and m as input, data sequence P [m] is produced.J ← 1, works as j<During=m, following operate is performed:
From HLi、LHiIn extract wavelet coefficient represented by P [m] at position.
j←j+1。
So far, complete secret information is extracted, and whole communication process terminates.
To verify the robustness and attack tolerant of this method, we represent similitude therebetween with the normalizated correlation coefficient NC between original secret information O and the secret information O ' received, and NC expression formula is as follows:
Wherein, O (i) represents the i-th bit of raw information, and O ' (i) represents to receive the i-th bit of information, and w is total number of bits of raw information.
As shown in Figure 3, first to stego image C ' addition salt-pepper noises, the influence of noise come during analogue communication, by calculating, its NC value is 0.96.
Then the interception stego image C ' part of the upper left corner 1/4, carrys out the intercepting message behavior of simulated strike person, by calculating, and its NC value is 0.94.
The analog result of embodiment shows that this method is with very strong robustness and attack tolerant, the security threat that can effectively avoid interchannel noise, data compression or malicious attack from bringing.

Claims (1)

1. a kind of safety communicating method applied to wireless multimedia sensor network, it is characterised in that:This method introduces the concept of Distributed Calculation, it is proposed that a kind of distributed network communication topological structure of load balancing;Using the image latent writing art based on wavelet transform, it is ensured that the invisibility and security of secret information;Perfect hash function is introduced in information insertion/extraction algorithm, without key management;
In the distributed network topology structure used, the transmitting procedure of secret information is as follows,
Step 1:After the sensing node capture images of source, the sensing node in the range of efficient communication is notified, desired node is met and selects multiple cluster heads according to low energy consumption self adaptation sub-clustering hierarchical structure LEACH clustering route protocols;
Step 2:Cluster head that step 1 is obtained is according to the distance between with source node, and self-organizing forms remaining node in a virtual cluster head link, network and selects respective leader cluster node to set up cluster respectively according to LEACH agreements;
Step 3:It is 3 parts that original secret information O is nbits points by source sensing node:O1For n/2bits, O2For n/4bits, O3For n/4bits, wavelet transformation then is carried out to carrier image, wavelet field sub-bands of frequencies coefficient is respectively obtained:LL1,LH1,HL1,HH1;4 nearest member nodes of chosen distance source node, use Node respectively in cluster residing for source nodeLL1,NodeLH1,NodeHL1,NodeHH1Represent, by O1And LL1It is transferred to NodeLL1Node, by O2And LH1It is transferred to NodeLH1Node, O3And HL1It is transferred to NodeHL1Node, HH1It is transferred to NodeHH1Node;
Step 4:In NodeLH1、NodeHL1At node, using the information embedded mobile GIS proposed in this method by O2、O3It is embedded into LH1、HL1In, wavelet coefficient and Node after insertionLL1The O at place1, LL1, NodeHH1The HH at place1The leader cluster node of lower cluster is transferred to together;
Step 5:Next leader cluster node is received after data, will have been inserted into the LH of secret information1、HL1And HH13 member nodes storage in the cluster is sent to, to O1And LL1Repeat the operation of step 3- steps 5, embedding operation so is repeated along link direction, until reaching aggregation node;
Step 6:In aggregation node, by wavelet inverse transformation, the wavelet coefficient for being embedded with secret information is subjected to wavelet reconstruction, is finally included the stego image of complete secret information;
Step 7:Stego image is transferred to after destination node, and the information extraction algorithm proposed using this method recovers original secret information, so far, and whole secure communication process terminates;
Wherein:Information embedded mobile GIS is:
1.1) inputs secret information O and carrier image C;
1.2) secret information O is serialized Tokenize by, and 1 byte is a data block, is stored in array L [m], wherein, the sum of data block is m;
1.3) carries out two-dimensional discrete wavelet conversion to C, obtains 4 wavelet sub-band coefficients LL, HL, LH, HH;
1.4) produces the binary system pseudo random number of 16 bits using PRNG, is used as keyword h;
1.5) perfect hash functions H produces a data sequence using keyword h and m as input, is stored with array P [m], and the data sequence represents the wavelet coefficient position of embedded concealed data;
1.6) selects HL, LH wavelet sub-band to be embedded in secret information, and j is worked as in j ← 1<During=m, following embedding operation is performed:
The data of storage in L [j] are read,
The position of wavelet coefficient is determined according to P [j], the wavelet coefficient at this is replaced with data in L [j],
j←j+1;
1.7) final outputs are keyword h, secret information data volume m and embedded secret information wavelet coefficient, and so far whole information telescopiny terminates;
Information extraction algorithm is:
2.1) inputs keyword h ', secret information data volume m and stego image C ', and wherein h ' binary length is n;
2.2) obtains wavelet coefficient LL at different levels to n/16 grades of wavelet transformations of C ' carry outi、HLi、LHi、HHi, wherein i represents wavelet series;
2.3) .i ← 1, works as i<During=n/16, following operate is performed:
Choose wavelet coefficient HLi、LHi,
The binary data of [(i-1) * 16+1, i*16] in h ' is extracted, is represented with h ' [i],
Using the perfect hash function H of selection, using h ' [i] and m as input, data sequence P ' [m] is produced,
J ← 1, works as j<During=m, following operate is performed:
From HLi、LHiIn extract wavelet coefficient represented by P ' [m] at position;
j←j+1;
2.4) data serializing that will be extracted from wavelet coefficients at different levels, finally gives initial data, and so far, information extraction process terminates.
CN201210469982.XA 2012-11-20 2012-11-20 A kind of safety communicating method applied to wireless multimedia sensor network Expired - Fee Related CN102946393B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210469982.XA CN102946393B (en) 2012-11-20 2012-11-20 A kind of safety communicating method applied to wireless multimedia sensor network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210469982.XA CN102946393B (en) 2012-11-20 2012-11-20 A kind of safety communicating method applied to wireless multimedia sensor network

Publications (2)

Publication Number Publication Date
CN102946393A CN102946393A (en) 2013-02-27
CN102946393B true CN102946393B (en) 2015-12-09

Family

ID=47729300

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210469982.XA Expired - Fee Related CN102946393B (en) 2012-11-20 2012-11-20 A kind of safety communicating method applied to wireless multimedia sensor network

Country Status (1)

Country Link
CN (1) CN102946393B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103973937B (en) * 2014-04-29 2016-08-17 南京邮电大学 Information concealing method based on wireless multimedia sensor network
CN107103630B (en) * 2017-03-03 2019-11-26 中国科学院信息工程研究所 A kind of carrier-free concealed communication method based on GIF attribute interval division mapping code
CN109889331B (en) * 2019-01-11 2021-11-05 广州大学 Key information hiding and extracting method and system based on compressed file

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102316456A (en) * 2011-08-10 2012-01-11 南京邮电大学 Forwarding-attack-resistance method based on digital watermarking

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102316456A (en) * 2011-08-10 2012-01-11 南京邮电大学 Forwarding-attack-resistance method based on digital watermarking

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
A Steganographic Computational Paradigm for Wireless Sensor Networks;Claude Turner;《Innovations in Information Technology, 2009》;20091217;全文 *
Authenticated Wireless Image Sensor Secret;Thanikaiselvan V 等;《IEEE-International Conference On Advances In Engineering, Science And Management (ICAESM -2012)》;20120331;全文 *
Secure Communication in Wireless Multimedia Sensor Networks using Watermarking;Bambang Harjito 等;《4th IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST 2010)》;20100416;全文 *
WMSN 的半依赖基站密钥管理方案;陈昊 等;《信息化研究》;20111031;全文 *

Also Published As

Publication number Publication date
CN102946393A (en) 2013-02-27

Similar Documents

Publication Publication Date Title
Alhayani et al. RETRACTED ARTICLE: Visual sensor intelligent module based image transmission in industrial manufacturing for monitoring and manipulation problems
Panah et al. On the properties of non-media digital watermarking: a review of state of the art techniques
Li et al. Efficient and secure image communication system based on compressed sensing for IoT monitoring applications
Wazirali et al. Secure watermarking schemes and their approaches in the IoT technology: an overview
Abood et al. Audio steganography with enhanced LSB method for securing encrypted text with bit cycling
Patel et al. Lazy wavelet transform based steganography in video
Muttoo et al. A multilayered secure, robust and high capacity image steganographic algorithm
CN102800042B (en) Multi-image encryption method based on log-polar transform
CN111615106B (en) Encryption method and device for voice data packet
CN102946393B (en) A kind of safety communicating method applied to wireless multimedia sensor network
CN103973937A (en) Information hiding method based on wireless multimedia sensor network
Elbaşı et al. Secure data aggregation in wireless multimedia sensor networks via watermarking
Shankar et al. Data hiding in encrypted images using Arnold transform
Abuadbba et al. Wavelet based steganographic technique to protect household confidential information and seal the transmitted smart grid readings
Denis et al. Evolutionary computing assisted visually-imperceptible hybrid cryptography and steganography model for secure data communication over cloud environment
Xiang et al. Degradative encryption: An efficient way to protect SPIHT compressed images
Hraini et al. Joint crypto-compression based on selective encryption for WMSNs
CN105979548A (en) Time-space compression network coding based data transmission method in wireless sensor network
Yang et al. Smart home privacy protection based on the improved LSB information hiding
CN103327363A (en) System and method for realizing control over video information encryption on basis of semantic granularity
Zhou et al. Blockchain-Based Encryption Method for Internal and External Health Privacy Data of University Physical Education Class
Tiwari et al. Secure data aggregation using irreversible watermarking in WSNs
Bremnavas et al. Medical image security using LSB and chaotic logistic map
Wang et al. A secure reversible chaining watermark scheme with hidden group delimiter for WSNs
Wazirali et al. Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview. Electronics 2021, 10, 1744

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20130227

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: 2016320000208

Denomination of invention: Safety communication method applied to wireless multimedia sensor network

Granted publication date: 20151209

License type: Common License

Record date: 20161110

LICC Enforcement, change and cancellation of record of contracts on the licence for exploitation of a patent or utility model
EC01 Cancellation of recordation of patent licensing contract
EC01 Cancellation of recordation of patent licensing contract

Assignee: Jiangsu Nanyou IOT Technology Park Ltd.

Assignor: NANJING University OF POSTS AND TELECOMMUNICATIONS

Contract record no.: 2016320000208

Date of cancellation: 20180116

CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20151209

Termination date: 20211120