A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations
暂无分享,去创建一个
[1] Radu Sion,et al. Proving ownership over categorical data , 2004, Proceedings. 20th International Conference on Data Engineering.
[2] Azhar Rauf,et al. Self-Constructing Fragile Watermark Algorithm for Relational Database Integrity Proof , 2012 .
[3] Xingming Sun,et al. An Image-Adaptive Semi-fragile Watermarking for Image Authentication and Tamper Detection , 2007, ICCSA.
[4] Shiguo Lian,et al. Commutative Encryption and Watermarking in Video Compression , 2007, IEEE Transactions on Circuits and Systems for Video Technology.
[5] Gang Chen,et al. GARWM: Towards a Generalized and Adaptive Watermark Scheme for Relational Data , 2005, WAIM.
[6] Bin Han,et al. Fragile audio watermarking scheme based on sample mean sequence , 2011, 2011 International Conference on Multimedia Technology.
[7] Hassan Rashidi,et al. A Novel Watermarking Scheme for Detecting and Recovering Distortions in Database Tables , 2010, ArXiv.
[8] Camélia Constantin,et al. Watermill: An Optimized Fingerprinting System for Databases under Constraints , 2008, IEEE Transactions on Knowledge and Data Engineering.
[9] V. Prasannaku. A Robust Tamperproof Watermarking for Data Integrity in Relational Databases , 2009 .
[10] Hongxia Wang,et al. Centroid-based semi-fragile audio watermarking in hybrid domain , 2010, Science China Information Sciences.
[11] Huiping Guo,et al. Tamper detection and localization for categorical data using fragile watermarks , 2004, DRM '04.
[12] Ming Zhou,et al. ATBaM: An Arnold Transform Based Method on Watermarking Relational Data , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).
[13] Xiang Huazheng,et al. A new fragile watermarking scheme for text documents authentication , 2006, Wuhan University Journal of Natural Sciences.
[14] Jörg Schwenk,et al. Combining digital watermarks and collusion secure fingerprints for digital images , 2000, J. Electronic Imaging.
[15] Alex ChiChung Kot,et al. Semi-fragile watermarking for text document images authentication , 2005, 2005 IEEE International Symposium on Circuits and Systems.
[16] Dongning Zhao,et al. A Method of Protecting Relational Databases Copyright with Cloud Watermark , 2007 .
[17] Jianmin Wang,et al. Fingerprinting relational databases , 2006, SAC '06.
[18] Gaurav Gupta,et al. Database Relation Watermarking Resilient against Secondary Watermarking Attacks , 2009, ICISS.
[19] Chang-Tsun Li,et al. Oblivious fragile watermarking scheme for image authentication , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[20] Jiwu Huang,et al. Image fragile watermarking based on fusion of multi-resolution tamper detection , 2002 .
[21] Ibrahim Kamel. A schema for protecting the integrity of databases , 2009, Comput. Secur..
[22] Jianmin Wang,et al. An Improved Algorithm to Watermark Numeric Relational Data , 2005, WISA.
[23] Xingming Sun,et al. A Fragile Zero-Watermarking Technique for Authentication of Relational Databases , 2011 .
[24] Min Huang,et al. A new watermark mechanism for relational data , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..
[25] Sushil Jajodia,et al. A fragile watermarking scheme for detecting malicious modifications of database relations , 2006, Inf. Sci..
[26] Peter J. Haas,et al. Watermarking relational data: framework, algorithms and analysis , 2003, The VLDB Journal.
[27] Luis E. Anido-Rifón,et al. A Restful Approach for Managing Citizen profiles Using A Semantic Support , 2010, ArXiv.
[28] Edward J. Delp,et al. Temporal synchronization in video watermarking , 2004, IEEE Transactions on Signal Processing.
[29] Radu Sion,et al. Rights protection for categorical data , 2005, IEEE Transactions on Knowledge and Data Engineering.
[30] Agostino Cortesi,et al. A Distortion Free Watermark Framework for Relational Databases , 2009, ICSOFT.
[31] Ali Al-Haj,et al. Robust and Blind Watermarking of Relational Database Systems , 2008 .
[32] Minghua Chen,et al. A fragile watermark error detection scheme for wireless video communications , 2005, IEEE Transactions on Multimedia.
[33] Robert H. Deng,et al. A Block Oriented Fingerprinting Scheme in Relational Database , 2004, ICISC.
[34] Peter Eisert,et al. Digital watermarking of MPEG-4 facial animation parameters , 1998, Comput. Graph..
[35] Haiqing Wang,et al. A Speech Based Algorithm for Watermarking Relational Databases , 2008, 2008 International Symposiums on Information Processing.
[36] Xiang Zhou,et al. An additive-attack-proof watermarking mechanism for databases' copyrights protection using image , 2007, SAC '07.
[37] Sushil Jajodia,et al. Fingerprinting relational databases: schemes and specialties , 2005, IEEE Transactions on Dependable and Secure Computing.