Forwarding-attack-resistance method based on digital watermarking
A technology for digital watermarking and watermark extraction, applied in electrical components, wireless communication, network topology, etc., can solve the problem of inability to effectively detect malicious nodes tampering with data content, and achieve the effect of improving security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0052] specific implementation plan
[0053] Taking the existence of a selective forwarding attack node in the transmission path as an example, the following is a specific implementation plan of the present invention:
[0054] (1) The source node collects the original data, the length of which is l , divide the data into c groups, each group of data is recorded as L[i], i =0,1... c ;
[0055] (2) Generate watermark information:
[0056] a) Calculation key K The hash value of is denoted as Hash(K);
[0057] b) take c data packet L[ i ] The most significant bit, denoted as C[ i ]( i =0,1... c );
[0058] c) take Hash(K) before c bit, denoted as H[ i ] ( i =0,1... c );
[0059] d) Calculate the watermark information W, W[ i ]= H[ i ] C[ i ] ( i =0,1... c ), is an XOR operation.
[0060] (3) Embed watermark information into each group:
[0061] f) Get grouped i The data L[ i ];
[0062] g) If W[ i ] is 0, then it is wrong for L[ i ] for proce...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 