Unlock instant, AI-driven research and patent intelligence for your innovation.

Safety communication method applied to wireless multimedia sensor network

A multimedia sensor and secure communication technology, which is applied in the field of secure communication based on distributed image steganography, can solve problems such as the application of information hiding methods, and achieve the effects of no need for key management, avoiding channel noise, and extending life

Inactive Publication Date: 2013-02-27
NANJING UNIV OF POSTS & TELECOMM
View PDF1 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

American scholar Claude Turner proposed an information hiding computing paradigm applied to sensor networks, but this paradigm did not take into account the application of information hiding methods in multimedia data transmission, and the related information hiding and extraction algorithms need to be further optimized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety communication method applied to wireless multimedia sensor network
  • Safety communication method applied to wireless multimedia sensor network
  • Safety communication method applied to wireless multimedia sensor network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to ensure communication security in WMSNs applications, the present invention adopts a communication security protection method based on distributed image steganography. Specifically, this method can be used Such a five-tuple is represented. Where C is the carrier image, O is the hidden information, E k is the information embedding algorithm, D k is an information extraction algorithm, and P is a distributed network topology protocol. This method embeds the secret information O into the carrier image C so as not to attract the attention of the attacker. For the secret information embedding and extraction algorithm E k and D k , we adopted a transform domain algorithm based on a two-bit Discrete Wavelet Transform (DWT), which embeds the secret information data into the intermediate frequency coefficients of the image wavelet transform domain, which not only ensures that the secret information is not transmitted during the transmission process. Visibili...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a safety communication method applied to a wireless multimedia sensor network, which aims at the potential communication safety threat in the application of the wireless multimedia sensor network and the problem of limited resources of a sensor node technology, introduces a distributed calculating concept, provides a load-balanced distributed network communication topological structure, also adopts a steganography on the basis of the discrete wavelet transform so as to ensure the invisibility and the safety of concealed information, introduces a perfect hash function into an information hiding / extracting algorithm and does not require the key management. According to the method, the communication process in the wireless multimedia sensor network has a higher robustness; each node has a balanced load; the energy consumption of each sensing node is reduced; and the life cycle of the network is prolonged.

Description

technical field [0001] The present invention relates to a security communication technical scheme applied to Wireless Multimedia Sensor Networks (WMSNs), in particular to a security communication method based on distributed image steganography, which belongs to the technical field of computer wireless communication security. Background technique [0002] With the popularity of multimedia sensing devices (such as CMOS cameras and microphones) and wireless communication systems (such as those proposed by IEEE 802.11 and 802.15 standards), wireless multimedia sensor networks have developed rapidly. The so-called wireless multimedia sensor network is a distributed sensing network composed of a group of multimedia sensor nodes with computing, storage and communication capabilities. Stream, image, numerical value, etc.), the data is transmitted to the information aggregation center through multi-hop relay, and then the monitoring data is analyzed by the aggregation center. With t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04W84/18
Inventor 林巧民王汝传叶宁孙力娟肖甫黄海平李鹏顾翔
Owner NANJING UNIV OF POSTS & TELECOMM