Fingerprinting of Relational Databases for Stopping the Data Theft
暂无分享,去创建一个
Eesa Al Solami | Muhammad Kamran | Mohammed Saeed Alkatheiri | Fouzia Rafiq | Ahmed S. Alghamdi | A. Alghamdi | M. Kamran | Eesa Al Solami | Mohammed Saeed Alkatheiri | Fouzia Rafiq
[1] Pierre Moulin,et al. Performance of Orthogonal Fingerprinting Codes Under Worst-Case Noise , 2009, IEEE Transactions on Information Forensics and Security.
[2] Claudia Feregrino Uribe,et al. HQR-Scheme: A High Quality and resilient virtual primary key generation approach for watermarking relational data , 2019, Expert Syst. Appl..
[3] Muddassar Farooq,et al. A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints , 2013, IEEE Transactions on Knowledge and Data Engineering.
[4] Sushil Jajodia,et al. Fingerprinting relational databases: schemes and specialties , 2005, IEEE Transactions on Dependable and Secure Computing.
[5] Shampa Chakraverty,et al. A generic watermarking model for object relational databases , 2019, Multimedia Tools and Applications.
[6] Binod Kumar Singh,et al. A Recent Survey on Multimedia and Database Watermarking , 2020, Multimedia Tools and Applications.
[7] Abdul Rauf Baig,et al. Relational database security using digital watermarking and evolutionary techniques , 2019, Comput. Intell..
[8] Arti Arun Mohanpurkar,et al. A Traitor Identification Technique for Numeric Relational Databases with Distortion Minimization and Collusion Avoidance , 2016, Int. J. Ambient Comput. Intell..
[9] Radu Sion,et al. Rights Protection for Relational Data , 2004, IEEE Trans. Knowl. Data Eng..
[10] Dan Zhao,et al. A New Robust Approach for Reversible Database Watermarking with Distortion Control , 2019, IEEE Transactions on Knowledge and Data Engineering.
[11] Alexander Barg,et al. Digital fingerprinting codes: problem statements, constructions, identification of traitors , 2003, IEEE Trans. Inf. Theory.
[12] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[13] Madhuri S. Joshi,et al. Fingerprinting Numeric Databases with Information Preservation and Collusion Avoidance , 2015 .
[14] Min Wu,et al. Anti-collusion fingerprinting for multimedia , 2003, IEEE Trans. Signal Process..