Real-Time Watermarking Techniques for Sensor Networks 4th, December Tae woo Oh Jessica Feng, Miodrag Potkonjak Dept. of Computer Science Univ. of California.

Slides:



Advertisements
Similar presentations
ECG Signal processing (2)
Advertisements

A New Scheme For Robust Blind Digital Video Watermarking Supervised by Prof. LYU, Rung Tsong Michael Presented by Chan Pik Wah, Pat Mar 5, 2002 Department.
Computer Networks Group Universität Paderborn Ad hoc and Sensor Networks Chapter 9: Localization & positioning Holger Karl.
Fifth International Conference on Information
Watermarking in WSNs Anuj Nagar CS 590. Introduction WSNs provide computational and Internet interfaces to the physical world. They also pose a number.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 17th Lecture Christian Schindelhauer.
Watermarking and Steganography Watermarking is the practice of hiding a message about an image, audio clip, video clip, or other work of media within that.
Solve an equation with variables on both sides
Locating Sensors in the Forest: A Case Study in GreenOrbs Tsung-Yun Cheng
Do Now Pass out calculators. Solve the following system by graphing: Graph paper is in the back. 5x + 2y = 9 x + y = -3 Solve the following system by using.
Chapter 4 - Linear Programming: Computer Solution Excel Solver
Quantitative Methods of Management
Sensor Positioning in Wireless Ad-hoc Sensor Networks Using Multidimensional Scaling Xiang Ji and Hongyuan Zha Dept. of Computer Science and Engineering,
Multimedia Copyright Protection Technologies M. A. Suhail, I. A. Niazy
Architectures and Applications for Wireless Sensor Networks ( ) Localization Chaiporn Jaikaeo Department of Computer Engineering.
We can make Product1 and Product2. There are 3 resources; Resource1, Resource2, Resource3. Product1 needs one hour of Resource1, nothing of Resource2,
Technical Seminar Presentation-2004 Presented by : ASHOK KUMAR SAHOO (EI ) NATIONAL INSTITUTE OF SCIENCE & TECHNOLOGY Presented By Ashok Kumar.
Solve each equation. Show your work and check the solution h – 2 = –6x = – = 8 + y.
Adviser: Frank, Yeong-Sung Lin Presenter: Yi-Cin Lin.
Performance Study of Localization Techniques in Zigbee Wireless Sensor Networks Ray Holguin Electrical Engineering Major Dr. Hong Huang Advisor.
by Mitchell D. Swanson, Bin Zhu, and Ahmed H. Tewfik
Do Now (3x + y) – (2x + y) 4(2x + 3y) – (8x – y)
Branch and Bound Algorithms Present by Tina Yang Qianmei Feng.
Use the substitution method
Solve Linear Systems by Substitution January 28, 2014 Pages
Robust Watermarking of 3D Mesh Models. Introduction in this paper, it proposes an algorithm that extracts 2D image from the 3D model and embed watermark.
The Internet Law: 10 Recipes on How to Get Jailed by Using the Internet V. Milutinovic, D. Sunderic, and M. Zivic
Warm-up. Systems of Equations: Substitution Solving by Substitution 1)Solve one of the equations for a variable. 2)Substitute the expression from step.
Efficient Point Coverage in Wireless Sensor Networks Jie Wang and Ning Zhong Department of Computer Science University of Massachusetts Journal of Combinatorial.
Joint Routing and Scheduling Optimization in Wireless Mesh Networks with Directional Antennas A. Capone, I. Filippini, F. Martignon IEEE international.
An Algorithm to Learn the Structure of a Bayesian Network Çiğdem Gündüz Olcay Taner Yıldız Ethem Alpaydın Computer Engineering Taner Bilgiç Industrial.
WARM-UP. SYSTEMS OF EQUATIONS: ELIMINATION 1)Rewrite each equation in standard form, eliminating fraction coefficients. 2)If necessary, multiply one.
Memory Protection through Dynamic Access Control Kun Zhang, Tao Zhang and Santosh Pande College of Computing Georgia Institute of Technology.
Use the elimination method
Presented by Edith Ngai MPhil Term 3 Presentation
Rewrite a linear equation
Operations Research Chapter one.
FAULT TOLERANT TECHNIQUES FOR WIRELESS AD HOC SENSOR NETWORKS
Ikhwannul Kholis Universitas 17 Agustus 1945 Jakarta
Pat P. W. Chan,  Michael R. Lyu, Roland T. Chin*
Computing and Compressive Sensing in Wireless Sensor Networks
Solving Systems of Linear Equations by Addition
Der-Chyuan Lou and Jiang-Lung Liu,
DONE BY S.MURALIRAJAN M.NIRMAL
2 Understanding Variables and Solving Equations.
Solving Systems of Linear Equations by Addition
Watermarking of SAT Using Combinatorial Isolation Lemmas
Presented by Prashant Duhoon
6-3 Solving Systems Using Elimination
2 Understanding Variables and Solving Equations.
2 Understanding Variables and Solving Equations.
Solve Linear Equations by Elimination
Wireless Mesh Networks
Parag Agarwal Digital Watermarking Parag Agarwal
Advisor: Chin-Chen Chang1, 2 Student: Yi-Pei Hsieh2
3.5 Solving Nonlinear Systems
Solving a System of Equations in Two Variables by the Addition Method
Wireless Sensor Networks and Internet of Things
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
2 Equations, Inequalities, and Applications.
Digital Watermarking for Image Authentication with Localization
A Robust and Recoverable Tamper Proofing Technique for Image Authentication Authors: Chin-Chen Chang & Kuo-Lung Hung Speaker : Chin-Chen Chang.
Example 2B: Solving Linear Systems by Elimination
A Self-Reference Watermarking Scheme Based on Wet Paper Coding
Secret image sharing with steganography and authentication
Authors: J.J. Murillo-Fuentes
Solving Linear Systems by Graphing
Presentation transcript:

Real-Time Watermarking Techniques for Sensor Networks 4th, December Tae woo Oh Jessica Feng, Miodrag Potkonjak Dept. of Computer Science Univ. of California 2003 SPIE

Contents 1. Introduction 3. Example 4. Watermark generation 2. Proposed method 6. Conclusion 2/17 5. Experimental Result

Introduction [1/2]  IPP(Intellectual Property protection) in WSN 3/17 WSN has emerged as the major criteria. WSN(Wireless Sensor Network) processes a great deal of information. WSN is more susceptible to attacks. → Urgent need for development of IPP techniques Solution : Watermarking Technique !

Introduction [2/2]  Watermarking Process of embedding hidden data into an object - Hidden data = Watermark = Cryptologically encoded authorship Application - Ownership assertion - Copy prevention or control - Fraud and tamper detection Two groups ① Static domain WM - Using imperfection of the human perceptive system → Video, Audio ② Functional domain WM - Using the fact that there are many solutions of similar quality → Software, WSN 4/17

Proposed Method [1/3]  Watermarking in WSN Embedding watermarks into data and information acquired by wireless embedded sensor networks. Key idea - Imposing additional constraints during the data acquisition or sensor data processing → Constraint = Watermark → It is possible to add constraints, because data acquired by sensor have some errors. - Deciding constraints → Balance between strength of watermark and quality of data 5/17

Proposed Method [2/3]  Watermarking in WSN 6/17 + Constraints(watermark) Solution range before watermarking Solution range after watermarking

Proposed Method [3/3] 7/17 Formulate equations to represent relationships in a particular network Formulate equations to represent relationships in a particular network Rewrite equations in terms of measured values and errors Rewrite equations in terms of measured values and errors Rewrite equations according to non-linear programming format : in terms of an objective and constrains Add/alter constrains or objective functions to embed watermark Solve the equations by using existing non- linear integer programming solver → Watermarked solution  Generic procedure for embedding a WM STEP 1 STEP 2 STEP 3 STEP 4 STEP 5

Obtained data - (x A,y A ), (x B,y B ), (x C,y C ), d XA, d XC, d XB Unknwon data - (x X,y X ) Example [1/6]  Embedding WM during Trilateration process 8/17 → Determining the coordinates of a node X from data obtained by node A,B,C

Example [2/6]  Embedding WM during Trilateration process 9/17 STEP1 : Equation to represent relationships of nodes → From above equation We can get solution (x X,y X ). But, because of noises of measured data, this problem is changed to non-linear problem, minimizing the error of solution. STEP2 : Need to consider several errors → The errors in measurement of. are the errors between Euclidean distance and measured distance.

Example [3/6]  Embedding WM during Trilateration process 10/17 STEP3 : Objective function and Constraints ▶ Objective function ▶ Constraints

Example [4/6]  Embedding WM during Trilateration process 11/17 STEP4 : Adding Watermarking Constraints ▶ Watermark ▶ Assignment of numbers to the variables of the objective function ▶ Divide watermark according to above table number

Example [5/6]  Embedding WM during Trilateration process 12/17 STEP4 : Adding Watermarking Constraints ▶ Add new constraints according to watermark patterns → Adding new constraints c 4, c 5, c 6, c 7. v1, v2, v3, v4 are threshold.

Example [6/6]  Embedding WM during Trilateration process 13/17 STEP5 : Solving the equation by using solvers ▶ Taking objective function and all constraints into account ▶ The solution is watermarked solution ▶ Using non-linear programming solvers Equation Objective FN Constraints Added Constraints Watermarked solution Watermarked solution Equation Objective FN Constraints Added Constraints Watermarked solution Watermarked solution Checking validation of watermark Watermarked solution Watermarked solution Apply Sender node XReceiver node

Watermark Generation  Watermark generation scheme 14/17 Textfile MD5 Hash RSA Seedfile RC4 Watermark Private Key Private Key PGP Software Package

Experimental Result 15/17  Trilateration Watermark Test

Conclusion  Conclusion IPP technique in Wireless Sensor Network Using Watermark ▶ Data obtained by sensor have some error. ▶ Watermarked solution ≒ Original solution Problem ▶ Time overhead problem ▶ Decision of constraints ▶ For accurate solution, need to many overhead ! 16/17

Q & A  Q & A 17/17