RMIT University
Browse

Aggregation-tolerant steganography for data-stream integrity verification

journal contribution
posted on 2024-11-01, 17:12 authored by Arezou Soltani Panah, Ron van Schyndel
Data outsourcing can make data-integrity protection a challenging task, especially when the trustworthiness of a third-party is unproven. A novel auditing process for integrity verification of data stream, whose storage and handling is outsourced to a third-party, is explored. For this purpose, the hidden information within this data that provides support for in-network data aggregation environments, such as sensor networks is masked. This mask is achieved by simultaneous embedding of several shifted watermark patterns into multiple data streams. The nature of this watermark allows it to be aggregated into a single data stream with minimal loss of this information. A great benefit of the proposed scheme is that the embedded watermarks are invariant to linear time-sequential or cross-stream aggregation operations, such as summation or averaging. Therefore, multiple data streams can be merged and at the same time, and the existence of each individual watermark within allowable bounds can still be verified. The simulation results show that the embedded watermarks can successfully be recovered with high confidence if proper hiding codes are chosen.

History

Related Materials

  1. 1.
    DOI - Is published in 10.1049/el.2014.2493
  2. 2.
    ISSN - Is published in 1350911X

Journal

Electronics Letters

Volume

50

Issue

20

Start page

1444

End page

1446

Total pages

3

Publisher

The Institution of Engineering and Technology

Place published

United Kingdom

Language

English

Copyright

© The Institution of Engineering and Technology 2014

Former Identifier

2006049009

Esploro creation date

2020-06-22

Fedora creation date

2014-11-18

Usage metrics

    Scholarly Works

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC