Reliable Provenance Information for Multimedia Data Using Invertible Fragile Watermarks
暂无分享,去创建一个
Gunter Saake | Martin Schäler | Sandro Schulze | Ronny Merkel | Jana Dittmann | J. Dittmann | G. Saake | Martin Schäler | Sandro Schulze | R. Merkel
[1] Dinu Coltuc,et al. Very Fast Watermarking by Reversible Contrast Mapping , 2007, IEEE Signal Processing Letters.
[2] Raymond A. Paul,et al. Data provenance in SOA: security, reliability, and integrity , 2007, Service Oriented Computing and Applications.
[3] J. Dillinger. FINGERPRINTS , 1938 .
[4] James Cheney,et al. Provenance in Databases: Why, How, and Where , 2009, Found. Trends Databases.
[5] V. Vianu,et al. Edinburgh Why and Where: A Characterization of Data Provenance , 2017 .
[6] Jeffrey D. Ullman,et al. Principles of Database Systems , 1980 .
[7] Wang Chiew Tan. Provenance in Databases: Past, Current, and Future , 2007, IEEE Data Eng. Bull..
[8] Ronny Merkel,et al. Reversible watermarking with digital signature chaining for privacy protection of optical contactless captured biometric fingerprints - a capacity study for forensic approaches , 2011, 2011 17th International Conference on Digital Signal Processing (DSP).
[9] Klara Nahrstedt,et al. Using Cryptographic and Watermarking Algorithms , 2001, IEEE Multim..
[10] Chandra Shakher,et al. Fingerprint detection using full-field swept-source optical coherence tomography , 2007 .
[11] Frank Hartung,et al. Multimedia watermarking techniques , 1999, Proc. IEEE.
[12] Arnon Rosenthal,et al. Enabling Collaborative Administration and Safety Fences: Factored Privileges in SQL Databases , 2004, IEEE Data Eng. Bull..
[13] Sanjeev Khanna,et al. Edinburgh Research Explorer On the Propagation of Deletions and Annotations through Views , 2013 .
[14] Rakesh Agrawal,et al. Watermarking Relational Databases , 2002, Very Large Data Bases Conference.
[15] Yogesh L. Simmhan,et al. A survey of data provenance techniques , 2005 .
[16] Ling Liu,et al. Encyclopedia of Database Systems , 2009, Encyclopedia of Database Systems.
[17] Kai-Erik Peiponen,et al. Application of a diffractive element-based sensor for detection of latent fingerprints from a curved smooth surface , 2009 .
[18] Edward N Pugh,et al. Polarization-based and specular-reflection-based noncontact latent fingerprint imaging and lifting. , 2006, Journal of the Optical Society of America. A, Optics, image science, and vision.
[19] Michael Gertz,et al. Handbook of Database Security - Applications and Trends , 2007, Handbook of Database Security.
[20] Klaus R. Dittrich,et al. Data Provenance: A Categorization of Existing Approaches , 2007, BTW.
[21] James Cheney,et al. Provenance management in curated databases , 2006, SIGMOD Conference.
[22] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[23] Jennifer Widom,et al. Practical lineage tracing in data warehouses , 2000, Proceedings of 16th International Conference on Data Engineering (Cat. No.00CB37073).
[24] Nader Engheta,et al. Polarization- and Specular-Reflection-Based, Non- contact Latent Fingerprint Imaging and Lifting , 2010 .
[25] A. Murat Tekalp,et al. Lossless generalized-LSB data embedding , 2005, IEEE Transactions on Image Processing.
[26] Sushil Jajodia,et al. Chaining watermarks for detecting malicious modifications to streaming data , 2007, Inf. Sci..
[27] Yogesh L. Simmhan,et al. A survey of data provenance in e-science , 2005, SGMD.
[28] Jennifer Widom,et al. Tracing the lineage of view data in a warehousing environment , 2000, TODS.
[29] Radu Sion,et al. Proving ownership over categorical data , 2004, Proceedings. 20th International Conference on Data Engineering.
[30] Radu Sion,et al. Database Watermarking for Copyright Protection , 2008, Handbook of Database Security.
[31] Wang Chiew Tan,et al. Research Problems in Data Provenance , 2004, IEEE Data Eng. Bull..
[32] Jun Tian,et al. Reversible data embedding using a difference expansion , 2003, IEEE Trans. Circuits Syst. Video Technol..
[33] Iuon-Chang Lin,et al. Reversible Watermarking: Current Status and Key Issues , 2006, Int. J. Netw. Secur..
[34] Richard Hull,et al. Business Artifacts: A Data-centric Approach to Modeling Business Operations and Processes , 2009, IEEE Data Eng. Bull..
[35] Vikrambhai S. Sorathia,et al. Data Provenance , 2009, Encyclopedia of Data Warehousing and Mining.