Research Article
Data Authentication for Wireless Sensor Networks with High Detection Efficiency Based on Reversible Watermarking
Input: stream S' | Output: recovered data stream S | 1. while (stream S' is not over) do | 2. if (spflag ==0) | 3. do steps 3~10 in Algorithm 2; | 4. else if (spflag ==1) | 5. C ⟵ S1Si−1 | 6. for j ⟵1 to i−1 do | 7. pe' ⟵ Cj − | 8. wj ⟵ LSB() | 9. if (wj ≠ Wj) | 10. marking G as failed; | 11. G ⟵ C//This failed carrier group becomes a new generator group; | 12. break | 13. else | 14. Sj ⟵ (pe' − wj) /2 + //Restoring the original data; | 15. end if | 16. ⟵ ( + Cj) /2 | 17. end for | 18. end if | 19. end while |
|