{"id":"https://openalex.org/W2005620524","doi":"https://doi.org/10.1109/fskd.2012.6234194","title":"A secure data transmission scheme for wireless sensor networks based on digital watermarking","display_name":"A secure data transmission scheme for wireless sensor networks based on digital watermarking","publication_year":2012,"publication_date":"2012-05-01","ids":{"openalex":"https://openalex.org/W2005620524","doi":"https://doi.org/10.1109/fskd.2012.6234194","mag":"2005620524"},"language":"en","primary_location":{"id":"doi:10.1109/fskd.2012.6234194","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2012.6234194","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 9th International Conference on Fuzzy Systems and Knowledge Discovery","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069123418","display_name":"Lingjing Zhou","orcid":null},"institutions":[{"id":"https://openalex.org/I111599522","display_name":"Jiangnan University","ror":"https://ror.org/04mkzax54","country_code":"CN","type":"education","lineage":["https://openalex.org/I111599522"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Lingjing Zhou","raw_affiliation_strings":["College of IoTs, Engineering Research Centre of IoTs Technology and Applications, Ministry of Education, Jiangnan University, Wuxi, China","College of IoTs, Jiangnan University, Engineering Research Centre of IoTs Technology and Applications, Ministry of Education, Wuxi, China"],"affiliations":[{"raw_affiliation_string":"College of IoTs, Engineering Research Centre of IoTs Technology and Applications, Ministry of Education, Jiangnan University, Wuxi, China","institution_ids":["https://openalex.org/I111599522"]},{"raw_affiliation_string":"College of IoTs, Jiangnan University, Engineering Research Centre of IoTs Technology and Applications, Ministry of Education, Wuxi, China","institution_ids":["https://openalex.org/I111599522"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5061990030","display_name":"Zhengdao Zhang","orcid":"https://orcid.org/0000-0003-1351-0723"},"institutions":[{"id":"https://openalex.org/I111599522","display_name":"Jiangnan University","ror":"https://ror.org/04mkzax54","country_code":"CN","type":"education","lineage":["https://openalex.org/I111599522"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhengdao Zhang","raw_affiliation_strings":["College of IoTs, Engineering Research Centre of IoTs Technology and Applications, Ministry of Education, Jiangnan University, Wuxi, China","College of IoTs, Jiangnan University, Engineering Research Centre of IoTs Technology and Applications, Ministry of Education, Wuxi, China"],"affiliations":[{"raw_affiliation_string":"College of IoTs, Engineering Research Centre of IoTs Technology and Applications, Ministry of Education, Jiangnan University, Wuxi, China","institution_ids":["https://openalex.org/I111599522"]},{"raw_affiliation_string":"College of IoTs, Jiangnan University, Engineering Research Centre of IoTs Technology and Applications, Ministry of Education, Wuxi, China","institution_ids":["https://openalex.org/I111599522"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5069123418"],"corresponding_institution_ids":["https://openalex.org/I111599522"],"apc_list":null,"apc_paid":null,"fwci":0.3546,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.60965737,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"2097","last_page":"2101"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9955000281333923,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.994700014591217,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.8199896216392517},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8110866546630859},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.7564835548400879},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.754229724407196},{"id":"https://openalex.org/keywords/eavesdropping","display_name":"Eavesdropping","score":0.6220894455909729},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.5300611853599548},{"id":"https://openalex.org/keywords/cryptographic-hash-function","display_name":"Cryptographic hash function","score":0.5198119878768921},{"id":"https://openalex.org/keywords/hash-chain","display_name":"Hash chain","score":0.48058247566223145},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.46604764461517334},{"id":"https://openalex.org/keywords/digital-signature","display_name":"Digital signature","score":0.45283058285713196},{"id":"https://openalex.org/keywords/transmission","display_name":"Transmission (telecommunications)","score":0.4311380982398987},{"id":"https://openalex.org/keywords/hash-tree","display_name":"Hash tree","score":0.4121930003166199},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.4118584394454956},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21858644485473633},{"id":"https://openalex.org/keywords/embedding","display_name":"Embedding","score":0.10570165514945984},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10190418362617493},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.07871308922767639},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.07460063695907593}],"concepts":[{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.8199896216392517},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8110866546630859},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.7564835548400879},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.754229724407196},{"id":"https://openalex.org/C2776788033","wikidata":"https://www.wikidata.org/wiki/Q320769","display_name":"Eavesdropping","level":2,"score":0.6220894455909729},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.5300611853599548},{"id":"https://openalex.org/C7608002","wikidata":"https://www.wikidata.org/wiki/Q477202","display_name":"Cryptographic hash function","level":3,"score":0.5198119878768921},{"id":"https://openalex.org/C135783594","wikidata":"https://www.wikidata.org/wiki/Q5678864","display_name":"Hash chain","level":3,"score":0.48058247566223145},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.46604764461517334},{"id":"https://openalex.org/C118463975","wikidata":"https://www.wikidata.org/wiki/Q220849","display_name":"Digital signature","level":3,"score":0.45283058285713196},{"id":"https://openalex.org/C761482","wikidata":"https://www.wikidata.org/wiki/Q118093","display_name":"Transmission (telecommunications)","level":2,"score":0.4311380982398987},{"id":"https://openalex.org/C27353603","wikidata":"https://www.wikidata.org/wiki/Q16948622","display_name":"Hash tree","level":4,"score":0.4121930003166199},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4118584394454956},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21858644485473633},{"id":"https://openalex.org/C41608201","wikidata":"https://www.wikidata.org/wiki/Q980509","display_name":"Embedding","level":2,"score":0.10570165514945984},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10190418362617493},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.07871308922767639},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.07460063695907593},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/fskd.2012.6234194","is_oa":false,"landing_page_url":"https://doi.org/10.1109/fskd.2012.6234194","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2012 9th International Conference on Fuzzy Systems and Knowledge Discovery","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":15,"referenced_works":["https://openalex.org/W1520258924","https://openalex.org/W1973225261","https://openalex.org/W1994418047","https://openalex.org/W2008893850","https://openalex.org/W2026282452","https://openalex.org/W2034882468","https://openalex.org/W2043098576","https://openalex.org/W2052050157","https://openalex.org/W2080765376","https://openalex.org/W2099751474","https://openalex.org/W2100330287","https://openalex.org/W2170247436","https://openalex.org/W2270704869","https://openalex.org/W6670946416","https://openalex.org/W6693800564"],"related_works":["https://openalex.org/W2768195082","https://openalex.org/W2047181319","https://openalex.org/W2014553354","https://openalex.org/W2145932317","https://openalex.org/W2946994802","https://openalex.org/W2982222368","https://openalex.org/W4210289650","https://openalex.org/W2475535869","https://openalex.org/W1554022419","https://openalex.org/W96948003"],"abstract_inverted_index":{"Wireless":[0],"sensor":[1,55,182],"networks":[2],"are":[3,9],"self-organized":[4],"and":[5,15,39,70,105,165,186],"data-centric.":[6],"Sensor":[7],"nodes":[8],"typically":[10],"deployed":[11],"in":[12,27],"unattended":[13],"environment,":[14],"therefore":[16],"the":[17,34,58,73,85,92,96,101,110,114,121,125,129,133,141,147,153,169,181,190],"security":[18],"is":[19,137,163],"a":[20,44,82],"critical":[21],"issue":[22],"that":[23,117,175],"must":[24],"be":[25],"resolved":[26],"many":[28],"applications.":[29],"In":[30],"order":[31],"to":[32,79,100,144,156],"prevent":[33,180],"sensitive":[35,64,74,142],"data":[36,46,65,75,143,148,183,191],"from":[37,95],"eavesdropping":[38],"tampering,":[40],"this":[41],"paper":[42],"proposes":[43],"secure":[45],"transmission":[47],"scheme":[48,177],"based":[49,139],"on":[50,140],"digital":[51,158],"watermarking":[52,159],"technique.":[53],"The":[54,88],"node":[56,90],"calculates":[57],"hash":[59,68,86,97,115,130,134],"value":[60,135],"of":[61,84,113,128,171],"two":[62],"time-adjacent":[63],"using":[66],"one-way":[67],"function,":[69],"then":[71],"takes":[72],"as":[76],"watermark":[77,93,102],"information":[78,94],"embed":[80],"into":[81],"part":[83,112,127],"sequence.":[87],"destination":[89],"extracts":[91],"sequence":[98,116,131],"according":[99],"extraction":[103],"algorithm,":[104],"meanwhile":[106],"we":[107],"could":[108],"get":[109],"remaining":[111,126],"not":[118,167],"changed":[119],"during":[120,152],"extraction.":[122],"Then,":[123],"compared":[124],"with":[132],"which":[136],"recalculated":[138],"verify":[145],"whether":[146,189],"have":[149,192],"been":[150,193],"tampered":[151,194],"transmission.":[154],"Compare":[155],"other":[157],"method,":[160],"our":[161,176],"algorithm":[162],"simple":[164],"does":[166],"increase":[168],"volume":[170],"data.":[172],"Analysis":[173],"shows":[174],"can":[178],"effectively":[179],"being":[184],"intercepted,":[185],"detect":[187],"precisely":[188],"with.":[195]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":2},{"year":2019,"cited_by_count":4},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
