Order embed_cg -> Tampering -> restore_cg
Realizing the detection of tampering and data restoration
Paper - Data authentication for wireless sensor networks with high detection efficiency based on reversible watermarking
Order embed_cg -> Tampering -> restore_cg
Realizing the detection of tampering and data restoration
Paper - Data authentication for wireless sensor networks with high detection efficiency based on reversible watermarking