Sensor Data Hiding Based on Image Watermarking Using Interpolation Technique over Inter-Packet Delays

Article Preview

Abstract:

Large number of application areas, like location-based services, transaction logs, sensor networks are qualified by uninterrupted data stream from many. Sensor data handling of continuous data needs to cover various issues, admitting the storage efficiency, processing throughput, bandwidth conception and secure transmission. This paper addresses the challenges by providing secure and efficient transmission of sensor data by embedding it over the inter-packet delays (IPDs). The embedding of sensor data within a host medium makes this technique reminiscent of watermarking. Interpolation technique is used to hide the sensor data into an image which is send to another node. By enforcing linear enlargement to interpolation-errors, a extremely effective reversible watermarking scheme is achieved, which can ensure high image quality without sacrificing embedding capacity. Time-Based flow watermarking technique is proposed, that avoids data degradation due to traditional watermarking. Sensor data is extracted effectively based on the inter-packet delays that minimizes the probability of decoding error. The outcome of the observation depicts that this system is scalable and highly resilient in sensor data.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

543-548

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Chong S, Skalka C, and Vaughan J A, Self-Identifying Sensor Data, Proc. Information Processing in Sensor Networks (IPSN), pp.82-93, (2010).

DOI: 10.1145/1791212.1791223

Google Scholar

[2] Cox I and Miller M, Electronic Watermarking: The First 50 Years, Proc. IEEE Workshop Multimedia Signal Processing pp.225-230, (2001).

DOI: 10.1109/mmsp.2001.962738

Google Scholar

[3] Dixon R C, Spread Spectrum Systems: With Commercial Applications, third ed. John Wiley and Sons, Inc., (1994).

Google Scholar

[4] Hasan R, Sion R, and Winslett M, The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance, Proc. Conf. File and Storage Technologies (FAST), pp.1-14, (2009).

DOI: 10.1145/1629080.1629082

Google Scholar

[5] Houmansadr A, Kiyavash N, and Borisov N, Multi-Flow Attack Resistant Watermarks for Network Flows, " Proc. IEEE Int, l Conf. Acoustics, Speech and Signal Processing, pp.1497-1500, (2009).

DOI: 10.1109/icassp.2009.4959879

Google Scholar

[6] Kiyavash N, Houmansadr A, and Borisov N, Multi-Flow Attacks against Network Flow Watermarking Schemes, " Proc. USENIX Conf. Security Symp., pp.307-320, 2008. Cabuk S, "IP Covert Timing Channels: Design and Detection, Proc. ACM Conf. Computer and Comm. Security (CCS), pp.178-187, (2004).

DOI: 10.1145/1030083.1030108

Google Scholar

[7] Lim H, Moon Y, and Bertino E, Provenance-Based Trustworthiness Assessment in Sensor Networks, Proc. Workshop Data Management for Sensor Networks, pp.2-7, (2010).

DOI: 10.1145/1858158.1858162

Google Scholar

[8] National Cyber Security Research and Development Challenges, Related to Economics, Physical Infrastructure and Human Behavior, (2009).

Google Scholar

[9] Peng P, Ning P, and Reeves D S, On the Secrecy of Timing- Based Active Watermarking Trace-Back Techniques, Proc. IEEE Symp. Security and Privacy (SP), pp.334-349, (2006).

DOI: 10.1109/sp.2006.28

Google Scholar

[10] Simmhan Y L, Plale B, and Gannon D, A Survey of Data Provenance in E-Science, SIGMOD Record, vol. 34, pp.31-36, (2005).

DOI: 10.1145/1084805.1084812

Google Scholar

[11] Syalim A, Nishide T, and Sakurai K, Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance, Proc. Working Conf. Data and Applications Security and Privacy, pp.311-318, (2010).

DOI: 10.1007/978-3-642-13739-6_22

Google Scholar

[12] Vijayakumar N and Plale B, Towards Low Overhead Provenance Tracking in Near Real-Time Stream Filtering, Provenance and Annotation of Data, vol. 4145, pp.46-54, (2006).

DOI: 10.1007/11890850_6

Google Scholar