Robust and Blind Watermarking of Relational Database Systems
暂无分享,去创建一个
[1] Min Huang,et al. A new watermark mechanism for relational data , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..
[2] Peter J. Haas,et al. Watermarking relational data: framework, algorithms and analysis , 2003, The VLDB Journal.
[3] Iwan Setyawan,et al. Watermarking digital image and video data. A state-of-the-art overview , 2000 .
[4] Radu Sion,et al. Proving ownership over categorical data , 2004, Proceedings. 20th International Conference on Data Engineering.
[5] Ioannis Pitas,et al. Robust audio watermarking in the time domain , 1998, 9th European Signal Processing Conference (EUSIPCO 1998).
[6] Min Wu,et al. Data hiding in digital binary image , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).
[7] M. Atallah,et al. Watermarking Relational Databases , 2002 .
[8] Robert H. Deng,et al. Publicly verifiable ownership protection for relational databases , 2006, ASIACCS '06.
[9] Werner Oomen,et al. A temporal domain audio watermarking technique , 2003, IEEE Trans. Signal Process..
[10] Bernd Girod,et al. Watermarking of uncompressed and compressed video , 1998, Signal Process..
[11] Sushil Jajodia,et al. Constructing a virtual primary key for fingerprinting relational data , 2003, DRM '03.
[12] Beng Chin Ooi,et al. Privacy and ownership preserving of outsourced medical data , 2005, 21st International Conference on Data Engineering (ICDE'05).
[13] Radu Sion,et al. Rights protection for relational data , 2003, IEEE Transactions on Knowledge and Data Engineering.
[14] Gunter Saake,et al. User authentication in multidatabase systems , 1998, Proceedings Ninth International Workshop on Database and Expert Systems Applications (Cat. No.98EX130).
[15] Jian-Min Wang,et al. Watermarking relational database using image , 2004, Proceedings of 2004 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.04EX826).
[16] Sushil Jajodia,et al. Fingerprinting relational databases: schemes and specialties , 2005, IEEE Transactions on Dependable and Secure Computing.
[17] Radu Sion,et al. wmdb.*: rights protection for numeric relational data , 2004, Proceedings. 20th International Conference on Data Engineering.
[18] Stephen D. Wolthusen,et al. Techniques and Applications of Digital Watermarking and Content Protection , 2003, Artech House computer security series.
[19] O. Roeva,et al. Information Hiding: Techniques for Steganography and Digital Watermarking , 2000 .
[20] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[21] Michael Arnold. Audio watermarking: features, applications and algorithms , 2000, 2000 IEEE International Conference on Multimedia and Expo. ICME2000. Proceedings. Latest Advances in the Fast Changing World of Multimedia (Cat. No.00TH8532).