Databases Traceability by Means of Watermarking with Optimized Detection
暂无分享,去创建一个
[1] Minoru Kuribayashi,et al. A simple tracing algorithm for binary fingerprinting code under averaging attack , 2013, IH&MMSec '13.
[2] Sushil Jajodia,et al. Fingerprinting relational databases: schemes and specialties , 2005, IEEE Transactions on Dependable and Secure Computing.
[3] Huiping Guo,et al. Tamper detection and localization for categorical data using fragile watermarks , 2004, DRM '04.
[4] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[5] Mauro Barni,et al. Optimum decoding and detection of multiplicative watermarks , 2003, IEEE Trans. Signal Process..
[6] Elisa Bertino,et al. Watermarking Relational Databases Using Optimization-Based Techniques , 2008, IEEE Transactions on Knowledge and Data Engineering.
[7] Radu Sion,et al. Rights Protection for Relational Data , 2004, IEEE Trans. Knowl. Data Eng..
[8] Christian Roux,et al. Lossless watermarking of categorical attributes for verifying medical data base integrity , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[9] Hans Georg Schaathun,et al. On error-correcting fingerprinting codes for use with watermarking , 2008, Multimedia Systems.
[10] Camélia Constantin,et al. Watermill: An Optimized Fingerprinting System for Databases under Constraints , 2008, IEEE Transactions on Knowledge and Data Engineering.
[11] Randy H. Katz,et al. A view of cloud computing , 2010, CACM.
[12] Rakesh Agrawal,et al. Watermarking Relational Databases , 2002, Very Large Data Bases Conference.
[13] Gábor Tardos,et al. Optimal probabilistic fingerprint codes , 2003, STOC '03.
[14] H. K. Garg,et al. Maximum-likelihood detection in DWT domain image watermarking using Laplacian modeling , 2005, IEEE Signal Processing Letters.
[15] Nora Cuppens-Boulahia,et al. Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation , 2014, IEEE Transactions on Information Forensics and Security.
[16] Gouenou Coatrieux,et al. Robust Watermarking of Relational Databases With Ontology-Guided Distortion Control , 2015, IEEE Transactions on Information Forensics and Security.
[17] Muddassar Farooq,et al. A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints , 2013, IEEE Transactions on Knowledge and Data Engineering.
[18] Christophe De Vleeschouwer,et al. Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..
[19] Barry Quinn. Phase-only information loss , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.