Research Article

Data Authentication for Wireless Sensor Networks with High Detection Efficiency Based on Reversible Watermarking

Table 2

Algorithm comparison with RWAS.

Group lengthFake synchronization pointWatermarking

DAHDESetting the threshold, the group length is appropriate, grouping robustness is strongCompletely avoidedRecycling fixed length watermark
RWASGroup length is not controllableUnable to avoidSequentially embedding all generated watermarking