Research Article
Data Authentication for Wireless Sensor Networks with High Detection Efficiency Based on Reversible Watermarking
| Input: original data stream S | | Output: stream | | while (Stream S is not over) do | | 1. if (spflag ==0) | | 2. G ⟵ S1Si−1 | | 3. . | | 4. for k ⟵1 to i−1 do | | 5. Hk ⟵ hash(Gk, d) | | 6. ⟵ ( + Gk) /2 | | 7. end for | | 8. H=H1⊕H2⊕Hm//H ={Wr, 1 ≤ r ≤ d & Wr =0||1}; | | 9. else if (spflag ==1) | | 10. C ⟵ S1S2Si−1 | | 11. for j ⟵1 to i−1 do | | 12. ⟵ Cj − | | 13. pe' ⟵ pe × 2 + Wj | | 14. Cj' ⟵ + pe' | | 15. ⟵ ( + Cj) /2 | | 16. if (md5(Cj') % m ==0) //Cj' is a fake synchronization point; | | 17. Cj' ⟵ fcb(a) + Cj' //Add fcb(a) to the flag check bit of Cj'; | | 18. else | | 19. b ⟵ rand() & b ≠ a//b is a random number not equal to a; | | 20. Cj' ⟵ fcb(b) + Cj' | | 21. end if | | 22. Sj' ⟵ Cj' | | 23. end for | | 24. end if | | 25. end while |
|