Research Article
A New Digital Watermarking Method for Data Integrity Protection in the Perception Layer of IoT
Algorithm 3
Watermark extraction algorithm.
Input: input parameters | Output: Integrity verification result | () index ; | () ; | () ; | () for to do | () ; | () ; | () for to do | () ; | () = ; | () for to do | () Data Data ; | () ; | () ; | () Hash(); | () MSB(); | () if then | () Return (Integrity intact); | () else | () Return (Integrity tampered); |
|