Dynamic Watermarking-Based Integrity Protection of Homomorphically Encrypted Databases - Application to Outsourced Genetic Data
暂无分享,去创建一个
Gouenou Coatrieux | Reda Bellafqira | Javier Franco-Contreras | Emmanuelle Génin | David Niyitegeka | E. Génin | G. Coatrieux | Javier Franco-Contreras | David Niyitegeka | R. Bellafqira
[1] C. Yeun,et al. Cloud computing security management , 2010, 2010 Second International Conference on Engineering System Management and Applications.
[2] Nora Cuppens-Boulahia,et al. Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation , 2014, IEEE Transactions on Information Forensics and Security.
[3] Gene Tsudik,et al. Authentication and integrity in outsourced databases , 2006, TOS.
[4] Ibrahim Kamel,et al. Toward protecting the integrity of relational databases , 2011, 2011 World Congress on Internet Security (WorldCIS-2011).
[5] Gouenou Coatrieux,et al. Data hiding in homomorphically encrypted medical images for verifying their reliability in both encrypted and spatial domains , 2016, 2016 38th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).
[6] Salwa K. Abd-El-Hafiz,et al. Symmetric encryption algorithms using chaotic and non-chaotic generators: A review , 2015, Journal of advanced research.
[7] Gwénolé Quellec,et al. Content-based image retrieval in homomorphic encryption domain , 2015, 2015 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society (EMBC).
[8] I-Ling Yen,et al. Security analysis for order preserving encryption schemes , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).
[9] Nasir D. Memon,et al. A buyer-seller watermarking protocol , 2001, IEEE Trans. Image Process..
[10] Christian Roux,et al. Lossless watermarking of categorical attributes for verifying medical data base integrity , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[11] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[12] Rakesh Agrawal,et al. Watermarking Relational Databases , 2002, Very Large Data Bases Conference.
[13] Hsien-Chu Wu,et al. Reversible Fragile Database Watermarking Technology using Difference Expansion Based on SVR Prediction , 2012, 2012 International Symposium on Computer, Consumer and Control.
[14] Sushil Jajodia,et al. A fragile watermarking scheme for detecting malicious modifications of database relations , 2006, Inf. Sci..
[15] Christian Roux,et al. A joint watermarking/encryption algorithm for verifying medical image integrity and authenticity in both encrypted and spatial domains , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[16] Gregory W. Wornell,et al. Quantization index modulation: A class of provably good methods for digital watermarking and information embedding , 2001, IEEE Trans. Inf. Theory.
[17] Shijun Xiang,et al. Database authentication watermarking scheme in encrypted domain , 2017, IET Inf. Secur..
[18] V. Prasannaku. A Robust Tamperproof Watermarking for Data Integrity in Relational Databases , 2009 .
[19] Ming Zhou,et al. ATBaM: An Arnold Transform Based Method on Watermarking Relational Data , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).