Skip to main content
Erschienen in: Neural Computing and Applications 6/2020

16.05.2019 | Deep Learning for Big Data Analytics

Trusted forensics scheme based on digital watermark algorithm in intelligent VANET

verfasst von: Zhaofeng Ma, Ming Jiang, Weihua Huang

Erschienen in: Neural Computing and Applications | Ausgabe 6/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Trusted forensics is one of the most important problems in VANET, and it often needs continuous video monitoring, once break out emergent vehicle accidents, then specific staff members take steps for forensics to obtain facts and define responsibility. Traditional forensics exists problems of inaccurate information, unfair responsibility definition and risk of leakage of user’s privacy. To solve the above problem, in this paper, we proposed a trusted forensics scheme based on digital image watermark in intelligent VANET, in which we proposed technical and fair algorithms for trusted forensics, and the trusted forensics scheme includes basic forensics parameter data obtaining critical forensics data automatic generation and forensics data extraction. Once there vehicle accident occurred, the forensics system first obtains the location, timestamp, forensics device data as basic forensics parameter data, and then, it embeds the forensics parameter as watermark into the real-time vehicle accident photograph by the proposed digital watermark algorithm, and thus, the real-time and undeniable forensics data are automatic generated as evidence; when necessary, the forensics system can extract the evidence data and watermark data from the critical forensics data. The proposed scheme can detect the content integrity of image data and even find out tampering mark when the image data are tampered. Additionally, we used neural network algorithm for vehicle license plate recognition and rapid vehicle information gathering. Finally, experiments evaluations manifest the proposed is forensics scheme is secure, robust, and efficient in vehicle forensics.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Hartenstein H, Labertaux K (2009) VANET: vehicular applications and inter-networking technologies, vol 1. Wiley, Hoboken Hartenstein H, Labertaux K (2009) VANET: vehicular applications and inter-networking technologies, vol 1. Wiley, Hoboken
2.
Zurück zum Zitat Hartenstein H, Laberteaux KP (2008) A tutorial survey on vehicular ad hoc networks. IEEE Commun Mag 46(6):164–171CrossRef Hartenstein H, Laberteaux KP (2008) A tutorial survey on vehicular ad hoc networks. IEEE Commun Mag 46(6):164–171CrossRef
3.
Zurück zum Zitat Qiu T, Liu J, Si W, Han M, Ning H, Atiquzzaman M (2017) A data-driven robustness algorithm for the internet of things in smart cities. IEEE Commun Mag 55(12):18–23CrossRef Qiu T, Liu J, Si W, Han M, Ning H, Atiquzzaman M (2017) A data-driven robustness algorithm for the internet of things in smart cities. IEEE Commun Mag 55(12):18–23CrossRef
5.
Zurück zum Zitat Cheng N, Zhang N, Lu N, Shen X, Mark JW, Liu F (2014) Opportunistic spectrum access for CR-VANETs: a game-theoretic approach. IEEE Trans Veh Technol 63(1):237–251CrossRef Cheng N, Zhang N, Lu N, Shen X, Mark JW, Liu F (2014) Opportunistic spectrum access for CR-VANETs: a game-theoretic approach. IEEE Trans Veh Technol 63(1):237–251CrossRef
6.
Zurück zum Zitat Chaqfeh M, Lakas A, Jawhar I (2014) A survey on data dissemination in vehicular ad hoc networks. Veh Commun 1(4):214–225 Chaqfeh M, Lakas A, Jawhar I (2014) A survey on data dissemination in vehicular ad hoc networks. Veh Commun 1(4):214–225
7.
Zurück zum Zitat Panichpapiboon S, Pattara-Atikom W (2012) A review of information dissemination protocols for vehicular ad hoc networks. IEEE Commun Surv Tutor 14(3):784–798 Panichpapiboon S, Pattara-Atikom W (2012) A review of information dissemination protocols for vehicular ad hoc networks. IEEE Commun Surv Tutor 14(3):784–798
8.
Zurück zum Zitat Hussain SA, Khan NA, Sadiq A, Ahmad F (2018) Simulation, modeling and analysis of master node election algorithm based on signal strength for VANETs through Colored Petri nets. Neural Comput Appl 29(11):1243–1259CrossRef Hussain SA, Khan NA, Sadiq A, Ahmad F (2018) Simulation, modeling and analysis of master node election algorithm based on signal strength for VANETs through Colored Petri nets. Neural Comput Appl 29(11):1243–1259CrossRef
9.
Zurück zum Zitat Ruj S, Cavenaghi MA, Huang Z, Nayak A, Stojmenovic I (2011) On data-centric misbehavior detection in VANETs. In: Vehicular technology conference, VTC Fall 2011, IEEE, pp 1–5 Ruj S, Cavenaghi MA, Huang Z, Nayak A, Stojmenovic I (2011) On data-centric misbehavior detection in VANETs. In: Vehicular technology conference, VTC Fall 2011, IEEE, pp 1–5
10.
Zurück zum Zitat Petit J, Schaub F, Feiri M (2015) Pseudonym schemes in vehicular networks: a survey. IEEE Commun Surv Tutor 17(1):228–255CrossRef Petit J, Schaub F, Feiri M (2015) Pseudonym schemes in vehicular networks: a survey. IEEE Commun Surv Tutor 17(1):228–255CrossRef
11.
Zurück zum Zitat Wu Q, Domingo-Ferrer J, González-Nicolás U (2010) Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications. IEEE Trans Veh Technol 59(2):559–573CrossRef Wu Q, Domingo-Ferrer J, González-Nicolás U (2010) Balanced trustworthiness, safety, and privacy in vehicle-to-vehicle communications. IEEE Trans Veh Technol 59(2):559–573CrossRef
12.
Zurück zum Zitat Wei Y, Chen Y, Shan H (2011) Beacon-based trust management for location privacy enhancement VANETs. In: 13th Asia–Pacific IEEE network operations and management symposium, APNOMS 2011, pp 1–8 Wei Y, Chen Y, Shan H (2011) Beacon-based trust management for location privacy enhancement VANETs. In: 13th Asia–Pacific IEEE network operations and management symposium, APNOMS 2011, pp 1–8
13.
Zurück zum Zitat Harit SK, Singh G, Tyagi N (2012) Fox-hole model for data-centric misbehaviour detection in VANETs. In: 2012 third international conference on computer and communication technology (ICCCT), pp 271–277 Harit SK, Singh G, Tyagi N (2012) Fox-hole model for data-centric misbehaviour detection in VANETs. In: 2012 third international conference on computer and communication technology (ICCCT), pp 271–277
14.
Zurück zum Zitat Huang Z, Ruj S, Cavenaghi MA, Stojmenovic M, Nayak A (2014) A social network approach to trust management in VANETs. Peer-to-Peer Netw Appl 7(3):229–242CrossRef Huang Z, Ruj S, Cavenaghi MA, Stojmenovic M, Nayak A (2014) A social network approach to trust management in VANETs. Peer-to-Peer Netw Appl 7(3):229–242CrossRef
15.
Zurück zum Zitat Bißmeyer N, Stresing C, Bayarou KM (2010) Intrusion detection in vanets through verification of vehicle movement data. In: Vehicular networking conference, VNC 2010, IEEE, pp 166–173 Bißmeyer N, Stresing C, Bayarou KM (2010) Intrusion detection in vanets through verification of vehicle movement data. In: Vehicular networking conference, VNC 2010, IEEE, pp 166–173
16.
Zurück zum Zitat Minhas UF, Zhang J, Tran T, Cohen R (2010) Towards expanded trust management for agents in vehicular ad-hoc networks. Int J Comput Intell Theory Pract 5:3–15 Minhas UF, Zhang J, Tran T, Cohen R (2010) Towards expanded trust management for agents in vehicular ad-hoc networks. Int J Comput Intell Theory Pract 5:3–15
17.
Zurück zum Zitat Bouslimi D, Coatrieux G, Cozic M, Roux C (2012) A joint encryption/watermarking system for verifying the reliability of medical images’. IEEE Trans Inf Technol Biomed 16(5):891–899CrossRef Bouslimi D, Coatrieux G, Cozic M, Roux C (2012) A joint encryption/watermarking system for verifying the reliability of medical images’. IEEE Trans Inf Technol Biomed 16(5):891–899CrossRef
18.
Zurück zum Zitat Bravo-Solorio S, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localisation and selfrecovery capabilities. Signal Process 91(4):728–739CrossRef Bravo-Solorio S, Nandi AK (2011) Secure fragile watermarking method for image authentication with improved tampering localisation and selfrecovery capabilities. Signal Process 91(4):728–739CrossRef
19.
Zurück zum Zitat Zeng Y-J, Xu X, Shen S-Y et al (2017) Traffic sign recognition using kernel extreme learning machine with deep perceptual features. IEEE Trans Intell Transp Syst 18(6):1647–1653 Zeng Y-J, Xu X, Shen S-Y et al (2017) Traffic sign recognition using kernel extreme learning machine with deep perceptual features. IEEE Trans Intell Transp Syst 18(6):1647–1653
20.
Zurück zum Zitat Huang G-B, Zhu Q-Y, Siew C-K (2004) Extreme learning machine: a new learning scheme of feedforward neural networks. In: Proceedings of the international joint conference neural networks, Budapest, pp 985–990 Huang G-B, Zhu Q-Y, Siew C-K (2004) Extreme learning machine: a new learning scheme of feedforward neural networks. In: Proceedings of the international joint conference neural networks, Budapest, pp 985–990
Metadaten
Titel
Trusted forensics scheme based on digital watermark algorithm in intelligent VANET
verfasst von
Zhaofeng Ma
Ming Jiang
Weihua Huang
Publikationsdatum
16.05.2019
Verlag
Springer London
Erschienen in
Neural Computing and Applications / Ausgabe 6/2020
Print ISSN: 0941-0643
Elektronische ISSN: 1433-3058
DOI
https://doi.org/10.1007/s00521-019-04246-1

Weitere Artikel der Ausgabe 6/2020

Neural Computing and Applications 6/2020 Zur Ausgabe

Deep Learning for Big Data Analytics

Research on sound classification based on SVM

Premium Partner