Relational Database, XML, and Ontology Watermarking

Today, digital watermarking technology has emerged as an effective tool for relational databases and eXtensible Mark-up Language (XML) data in order to protect the copyright, detect tamper, trace traitor, and maintain the integrity of the data.

[1]  Le Jiajin,et al.  Watermark Based Copyright Protection of Outsourced Database , 2006 .

[2]  Ibrahim Kamel A schema for protecting the integrity of databases , 2009, Comput. Secur..

[3]  Ernesto Damiani,et al.  Robust XML Watermarking Using Fuzzy Queries , 2012, 2012 IEEE 36th Annual Computer Software and Applications Conference Workshops.

[4]  Min Huang,et al.  A new watermark mechanism for relational data , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..

[5]  Hsien-Chu Wu,et al.  Fragile Database Watermarking for Malicious Tamper Detection Using Support Vector Regression , 2007 .

[6]  Agostino Cortesi,et al.  A Generic Distortion Free Watermarking Technique for Relational Databases , 2009, ICISS.

[7]  V. Prasannaku A Robust Tamperproof Watermarking for Data Integrity in Relational Databases , 2009 .

[8]  Peter J. Haas,et al.  Watermarking relational data: framework, algorithms and analysis , 2003, The VLDB Journal.

[9]  Eugene Xavier XML based security for e-commerce applications , 2001, Proceedings. Eighth Annual IEEE International Conference and Workshop On the Engineering of Computer-Based Systems-ECBS 2001.

[10]  Ming Zhou,et al.  ATBaM: An Arnold Transform Based Method on Watermarking Relational Data , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).

[11]  Rakesh Agrawal,et al.  Watermarking Relational Databases , 2002, Very Large Data Bases Conference.

[12]  Vahab Pournaghshband A new watermarking approach for relational data , 2008, ACM-SE 46.

[13]  Maria Teresa Pazienza,et al.  Linguistic Watermark 3.0: An RDF Framework and a Software Library for Bridging Language and Ontologies in the Semantic Web , 2008, SWAP.

[14]  Yingjiu Li,et al.  Database Watermarking: A Systematic View , 2008, Handbook of Database Security.

[15]  David Gross-Amblard,et al.  Query-preserving watermarking of relational databases and Xml documents , 2011, TODS.

[16]  Kian-Lee Tan,et al.  WmXML: A System for Watermarking XML Data , 2005, VLDB.

[17]  Robert H. Deng,et al.  Publicly verifiable ownership protection for relational databases , 2006, ASIACCS '06.

[18]  Peter J. Haas,et al.  A system for watermarking relational databases , 2003, SIGMOD '03.

[19]  Agostino Cortesi,et al.  A Distortion Free Watermark Framework for Relational Databases , 2009, ICSOFT.

[20]  Ali Al-Haj,et al.  Robust and Blind Watermarking of Relational Database Systems , 2008 .

[21]  Nora Cuppens-Boulahia,et al.  Ontology-guided distortion control for robust-lossless database watermarking: Application to inpatient hospital stay records , 2014, 2014 36th Annual International Conference of the IEEE Engineering in Medicine and Biology Society.

[22]  Shaowen Yao,et al.  Techniques for OWL-based Ontology Watermarking , 2009, 2009 WRI Global Congress on Intelligent Systems.

[23]  Sushil Jajodia,et al.  Constructing a virtual primary key for fingerprinting relational data , 2003, DRM '03.

[24]  Fabian M. Suchanek,et al.  Watermarking for Ontologies , 2011, International Semantic Web Conference.

[25]  Dongning Zhao,et al.  A Method of Protecting Relational Databases Copyright with Cloud Watermark , 2007 .

[26]  Jianhua Sun,et al.  An Image Based Algorithm for Watermarking Relational Databases , 2009, 2009 International Conference on Measuring Technology and Mechatronics Automation.

[27]  Dongning Zhao,et al.  Relational Databases Watermark Technique Based on Content Characteristic , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).

[28]  A. A. Zaidan,et al.  A review of audio based steganography and digital watermarking , 2011 .

[29]  Huiping Guo,et al.  Tamper detection and localization for categorical data using fragile watermarks , 2004, DRM '04.

[30]  Agostino Cortesi,et al.  Watermarking Techniques for Relational Databases: Survey, Classification and Comparison , 2010 .