Research Article

A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT

Algorithm 3

Watermark extraction algorithm.
Input: input parameters
Output: Integrity verification result
() index ;
()  ;
() ;
() for to do
()    ;
()    ;
() for to do
()    ;
()    = ;
() for to do
()   Data Data ;
()  ;
()  ;
()  Hash();
()  MSB();
() if then
()   Return (Integrity intact);
() else
()   Return (Integrity tampered);