Research Article
Data Authentication for Wireless Sensor Networks with High Detection Efficiency Based on Reversible Watermarking
Table 2
Algorithm comparison with RWAS.
| | Group length | Fake synchronization point | Watermarking |
| DAHDE | Setting the threshold, the group length is appropriate, grouping robustness is strong | Completely avoided | Recycling fixed length watermark | RWAS | Group length is not controllable | Unable to avoid | Sequentially embedding all generated watermarking |
|
|