A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key
暂无分享,去创建一个
[1] Sushil Jajodia,et al. Fingerprinting relational databases: schemes and specialties , 2005, IEEE Transactions on Dependable and Secure Computing.
[2] Chin-Chen Chang,et al. Adaptive Lossless Data Hiding Scheme for SMVQ-Compressed Images using SOC Coding , 2014, Smart Comput. Rev..
[3] Chin-Chen Chang,et al. A Blind Reversible Robust Watermarking Scheme for Relational Databases , 2013, TheScientificWorldJournal.
[4] Rakesh Agrawal,et al. Watermarking Relational Databases , 2002, Very Large Data Bases Conference.
[5] Shi-Jinn Horng,et al. A blind reversible method for watermarking relational databases based on a time-stamping protocol , 2012, Expert Syst. Appl..
[6] Elisa Bertino,et al. Watermarking Relational Databases Using Optimization-Based Techniques , 2008, IEEE Transactions on Knowledge and Data Engineering.
[7] Radu Sion,et al. Rights protection for categorical data , 2005, IEEE Transactions on Knowledge and Data Engineering.
[8] Chin-Chen Chang,et al. A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images , 2014, KSII Trans. Internet Inf. Syst..
[9] Ali Al-Haj,et al. Robust and Blind Watermarking of Relational Database Systems , 2008 .
[10] Dhiren Patel,et al. Relational Database Watermarking for Ownership Protection , 2012 .
[11] Agostino Cortesi,et al. A Generic Distortion Free Watermarking Technique for Relational Databases , 2009, ICISS.
[12] Sushil Jajodia,et al. Constructing a virtual primary key for fingerprinting relational data , 2003, DRM '03.
[13] Azadeh Mansouri,et al. A Low Complexity Video Watermarking in H.264 Compressed Domain , 2010, IEEE Transactions on Information Forensics and Security.
[14] Rui Yang,et al. Geometric Invariant Audio Watermarking Based on an LCM Feature , 2011, IEEE Transactions on Multimedia.
[15] V. Prasannaku. A Robust Tamperproof Watermarking for Data Integrity in Relational Databases , 2009 .
[16] J. B. Patil,et al. Implementation of Text Watermarking Technique Using Natural Language Watermarks , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[17] Syed Afaq Husain,et al. A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations , 2013, TheScientificWorldJournal.
[18] Li-Yeh Chuang,et al. Natural Products: Bioactivity, Biochemistry, and Biological Effects in Cancer and Disease Therapy , 2013, The Scientific World Journal.
[19] Jeffrey J. Rodríguez,et al. Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.