RRW—A Robust and Reversible Watermarking Technique for Relational Data
暂无分享,去创建一个
[1] Jeffrey J. Rodríguez,et al. Prediction-error based reversible watermarking , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[2] J.J. Rodriguez,et al. Reversible watermarking by prediction-error expansion , 2004, 6th IEEE Southwest Symposium on Image Analysis and Interpretation, 2004..
[3] Muddassar Farooq,et al. An Information-Preserving Watermarking Scheme for Right Protection of EMR Systems , 2012, IEEE Transactions on Knowledge and Data Engineering.
[4] Fabien A. P. Petitcolas,et al. Watermarking schemes evaluation , 2000, IEEE Signal Process. Mag..
[5] Shi-Jinn Horng,et al. A blind reversible method for watermarking relational databases based on a time-stamping protocol , 2012, Expert Syst. Appl..
[6] Gui-Sheng Chen,et al. A method for trust management in cloud computing: Data coloring by cloud watermarking , 2011, Int. J. Autom. Comput..
[7] Steven H. Low,et al. Copyright protection for the electronic distribution of text documents , 1999, Proc. IEEE.
[8] Ling Yang,et al. An intelligent watermarking method based on particle swarm optimization , 2011, Expert Syst. Appl..
[9] Bian Yang,et al. Reversible Watermarking for Relational Database Authentication , 2006 .
[10] Lai-Wan Chan,et al. Biased Minimax Probability Machine for Medical Diagnosis , 2004, ISAIM.
[11] Michael A. Saunders,et al. SNOPT: An SQP Algorithm for Large-Scale Constrained Optimization , 2002, SIAM J. Optim..
[12] Gaurav Gupta,et al. Reversible and blind database watermarking using difference expansion , 2008, e-Forensics '08.
[13] Setsuo Ohsuga,et al. INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES , 1977 .
[14] Ingemar J. Cox,et al. Digital Watermarking , 2003, Lecture Notes in Computer Science.
[15] Shi-Jinn Horng,et al. A Novel Blind Reversible Method for Watermarking Relational Databases , 2010, International Symposium on Parallel and Distributed Processing with Applications.
[16] Ingemar J. Cox,et al. Secure spread spectrum watermarking for multimedia , 1997, IEEE Trans. Image Process..
[17] Didier Stricker,et al. Introducing a New Benchmarked Dataset for Activity Monitoring , 2012, 2012 16th International Symposium on Wearable Computers.
[18] Jeffrey J. Rodríguez,et al. Expansion Embedding Techniques for Reversible Watermarking , 2007, IEEE Transactions on Image Processing.
[19] Asifullah Khan,et al. Genetic algorithm and difference expansion based reversible watermarking for relational databases , 2013, J. Syst. Softw..
[20] Tieyong Zeng,et al. Efficient Reversible Watermarking Based on Adaptive Prediction-Error Expansion and Pixel Selection , 2011, IEEE Transactions on Image Processing.
[21] Dorothea Heiss-Czedik,et al. An Introduction to Genetic Algorithms. , 1997, Artificial Life.
[22] Thomas M. Cover,et al. Elements of Information Theory , 2005 .
[23] Hsien-Chu Wu,et al. Reversible Fragile Database Watermarking Technology using Difference Expansion Based on SVR Prediction , 2012, 2012 International Symposium on Computer, Consumer and Control.
[24] Nasir Memon,et al. Secret and public key image watermarking schemes for image authentication and ownership verification , 2001, IEEE Trans. Image Process..
[25] O. Weck,et al. A COMPARISON OF PARTICLE SWARM OPTIMIZATION AND THE GENETIC ALGORITHM , 2005 .
[26] Dirk Günnewig,et al. Digital Rights Management , 2005, Wirtsch..
[27] Radu Sion,et al. Rights protection for categorical data , 2005, IEEE Transactions on Knowledge and Data Engineering.
[28] G. Pillai,et al. SVM Based Decision Support System for Heart Disease Classification with Integer-Coded Genetic Algorithm to Select Critical Features , 2009 .
[29] Rynson W. H. Lau,et al. Knowledge and Data Engineering for e-Learning Special Issue of IEEE Transactions on Knowledge and Data Engineering , 2008 .
[30] M. Atallah,et al. Watermarking Relational Databases , 2002 .
[31] Adnan M. Alattar. Reversible watermark using difference expansion of triplets , 2003, Proceedings 2003 International Conference on Image Processing (Cat. No.03CH37429).
[32] E. Sonnleitner,et al. A robust watermarking approach for large databases , 2012, 2012 IEEE First AESS European Conference on Satellite Telecommunications (ESTEL).
[33] Ping Wah Wong,et al. A public key watermark for image verification and authentication , 1998, Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat. No.98CB36269).
[34] John Kieffer,et al. Elements of Information Theory (Thomas M. Cover and Joy A. Thomas) , 1994, SIAM Rev..
[35] Gaurav Gupta,et al. Database Relation Watermarking Resilient against Secondary Watermarking Attacks , 2009, ICISS.
[36] Michael N. Vrahatis,et al. Particle Swarm Optimization Method for Constrained Optimization Problems , 2002 .