A fragile watermarking scheme for detecting malicious modifications of database relations
暂无分享,去创建一个
Sushil Jajodia | Yingjiu Li | Huiping Guo | Anyi Liu | S. Jajodia | Yingjiu Li | Anyi Liu | Huiping Guo
[1] Rakesh Agrawal,et al. Watermarking Relational Databases , 2002, Very Large Data Bases Conference.
[2] Chun-Shien Lu,et al. Multipurpose audio watermarking , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.
[3] Jiri Fridrich,et al. Images with self-correcting capabilities , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[4] Michael Gertz,et al. Authentic Third-party Data Publication , 2000, DBSec.
[5] Shih-Fu Chang,et al. Semifragile watermarking for authenticating JPEG visual content , 2000, Electronic Imaging.
[6] Sushil Jajodia,et al. A Checksum-based Corruption Detection Technique , 2003, J. Comput. Secur..
[7] Deepa Kundur,et al. Dual domain watermarking for authentication and compression of cultural heritage images , 2004, IEEE Transactions on Image Processing.
[8] Kian-Lee Tan,et al. Authenticating query results in edge computing , 2004, Proceedings. 20th International Conference on Data Engineering.
[9] David Gross-Amblard,et al. Query-preserving watermarking of relational databases and XML documents , 2003, PODS '03.
[10] Edward J. Delp,et al. A Review of Fragile Image Watermarks , 2007 .
[11] Pierangela Samarati,et al. Protecting Respondents' Identities in Microdata Release , 2001, IEEE Trans. Knowl. Data Eng..
[12] Sushil Jajodia,et al. Constructing a virtual primary key for fingerprinting relational data , 2003, DRM '03.
[13] Huiping Guo,et al. Tamper detection and localization for categorical data using fragile watermarks , 2004, DRM '04.
[14] Michael Gertz,et al. Authentic Data Publication Over the Internet , 2003, J. Comput. Secur..
[15] Minghua Chen,et al. A fragile watermark error detection scheme for wireless video communications , 2005, IEEE Transactions on Multimedia.
[16] Ioannis Pitas,et al. Robust image watermarking in the spatial domain , 1998, Signal Process..
[17] Radu Sion,et al. Rights protection for relational data , 2003, IEEE Transactions on Knowledge and Data Engineering.
[18] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..