Wireless integrated network sensors
Communications of the ACM
Proceedings of the 7th annual international conference on Mobile computing and networking
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition)
Disappearing Cryptography: Information Hiding: Steganography and Watermarking (2nd Edition)
Wireless sensor networks for habitat monitoring
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
SPINS: security protocols for sensor networks
Wireless Networks
Wireless sensor networks: a survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
Computer
Middleware challenges for wireless sensor networks
ACM SIGMOBILE Mobile Computing and Communications Review
A multiresolution watermark for digital images
ICIP '97 Proceedings of the 1997 International Conference on Image Processing (ICIP '97) 3-Volume Set-Volume 1 - Volume 1
A Low-Energy Key Management Protocol for Wireless Sensor Networks
ISCC '03 Proceedings of the Eighth IEEE International Symposium on Computers and Communications
Hide and Seek: An Introduction to Steganography
IEEE Security and Privacy
Wireless Sensor Networks: Architectures and Protocols
Wireless Sensor Networks: Architectures and Protocols
LEAP: efficient security mechanisms for large-scale distributed sensor networks
Proceedings of the 10th ACM conference on Computer and communications security
Modeling of sensor nets in Ptolemy II
Proceedings of the 3rd international symposium on Information processing in sensor networks
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Security for wireless sensor networks
Wireless sensor networks
Security for wireless sensor networks
Wireless sensor networks
Protocols and Architectures for Wireless Sensor Networks
Protocols and Architectures for Wireless Sensor Networks
A holistic approach to secure sensor networks
A holistic approach to secure sensor networks
Digital Watermarking and Steganography
Digital Watermarking and Steganography
Blind statistical steganalysis of additive steganography using wavelet higher order statistics
CMS'05 Proceedings of the 9th IFIP TC-6 TC-11 international conference on Communications and Multimedia Security
The design space of wireless sensor networks
IEEE Wireless Communications
On the limits of steganography
IEEE Journal on Selected Areas in Communications
Hi-index | 0.00 |
This article provides a brief review of steganography, steganalysis and wireless sensor networks (WSNs). It also presents a computational framework for steganography in WSN. The technique uses the concept of redundancy and distributed computing to add robustness to the steganographic embedding and extraction algorithms.