Watermarking technique for wireless multimedia sensor networks: A state of the art
|dc.contributor.editor||Vidyasagar Potdar and Debajyoti Mukhopadhyay|
|dc.identifier.citation||Harjito, Bambang and Potdar, Vidyasagar and Singh, Jaipal. 2012. Watermarking technique for wireless multimedia sensor networks: A state of the art, in Potdar, V. and Debajyoti, M. (ed), Proceedings of the CUBE International Information Technology Conference (CUBE 2012), Sep 3-5 2012, pp. 832-840. Pune, India: Association for Computing Machinery.|
Wireless multimedia sensor networks (WMSNs) are an emerging type of sensor network which contain sensor nodes equipped with microphones, cameras, and other sensors that produce multimedia content. These networks have the potential to enable a large class of applications ranging from military to modern healthcare. Multimedia nodes are susceptible to various types of attack, such as cropping, compression, or even physical capture and sensor replacement. Hence, security becomes an important issue in WMSNs. However, given the fact that sensors are resource constrained, the traditional intensive security algorithms are not well suited for WMSNs. This makes the traditional security techniques, based on data encryption, not very suitable for WMSNs. Watermarking techniques are usually computationally lightweight and do not require much memory resources. These techniques are being considered as an attractive alternative to the traditional techniques, because of their light resource requirements. The objective of this paper is to present a critical analysis of the existing state-of-the-art watermarking algorithms developed for WMSNs.
|dc.subject||wireless sensor networks|
|dc.subject||wireless multimedia sensor networks and digital watermarking techniques|
|dc.title||Watermarking technique for wireless multimedia sensor networks: A state of the art|
|dcterms.source.title||Proceedings of the CUBE International Information Technology Conference|
|dcterms.source.series||Proceedings of the CUBE International Information Technology Conference|
|dcterms.source.conference-start-date||Sep 3 2012|
©2012 ACM. This is the author's version of the work. It is posted here by permission of ACM for your personal use. Not for redistribution. The definitive version was published in Proceedings of the CUBE International Information Technology Conference (CUBE 2012), Sep 3-5 2012.