Protection of Relational Databases by Means of Watermarking: Recent Advances and Challenges
暂无分享,去创建一个
[1] Nora Cuppens-Boulahia,et al. Reversible Watermarking Based on Invariant Image Classification and Dynamic Histogram Shifting , 2013, IEEE Transactions on Information Forensics and Security.
[2] Peter J. Haas,et al. Watermarking relational data: framework, algorithms and analysis , 2003, The VLDB Journal.
[3] Camélia Constantin,et al. Watermill: An Optimized Fingerprinting System for Databases under Constraints , 2008, IEEE Transactions on Knowledge and Data Engineering.
[4] Christian Roux,et al. A Joint Encryption/Watermarking System for Verifying the Reliability of Medical Images , 2012, IEEE Transactions on Information Technology in Biomedicine.
[5] Gaurav Gupta,et al. Database Relation Watermarking Resilient against Secondary Watermarking Attacks , 2009, ICISS.
[6] Bian Yang,et al. Reversible Watermarking for Relational Database Authentication , 2006 .
[7] Haiqing Wang,et al. A Speech Based Algorithm for Watermarking Relational Databases , 2008, 2008 International Symposiums on Information Processing.
[8] David Gross-Amblard,et al. Query-preserving watermarking of relational databases and XML documents , 2003, PODS '03.
[9] Radu Sion,et al. Rights protection for relational data , 2003, IEEE Transactions on Knowledge and Data Engineering.
[10] Sushil Jajodia,et al. Fingerprinting relational databases: schemes and specialties , 2005, IEEE Transactions on Dependable and Secure Computing.
[11] Radu Sion,et al. Rights protection for categorical data , 2005, IEEE Transactions on Knowledge and Data Engineering.
[12] Agostino Cortesi,et al. A Distortion Free Watermark Framework for Relational Databases , 2009, ICSOFT.
[13] Ali Al-Haj,et al. Robust and Blind Watermarking of Relational Database Systems , 2008 .
[14] Hsien-Chu Wu,et al. Reversible Fragile Database Watermarking Technology using Difference Expansion Based on SVR Prediction , 2012, 2012 International Symposium on Computer, Consumer and Control.
[15] M. Atallah,et al. Watermarking Relational Databases , 2002 .
[16] Christian Roux,et al. Lossless watermarking of categorical attributes for verifying medical data base integrity , 2011, 2011 Annual International Conference of the IEEE Engineering in Medicine and Biology Society.
[17] Adnan M. Alattar,et al. > REPLACE THIS LINE WITH YOUR PAPER IDENTIFICATION NUMBER (DOUBLE-CLICK HERE TO EDIT) < Reversible Watermark Using the Difference Expansion of A Generalized Integer Transform , 2022 .
[18] Junmin Liu,et al. A Novel Relational Database Watermarking Algorithm Based on Clustering and Polar Angle Expansion , 2013 .
[19] Christian Roux,et al. Watermarking Medical Images with Anonymous Patient Identification to Verify Authenticity , 2008, MIE.
[20] Nora Cuppens-Boulahia,et al. Robust Lossless Watermarking of Relational Databases Based on Circular Histogram Modulation , 2014, IEEE Transactions on Information Forensics and Security.
[21] Christophe De Vleeschouwer,et al. Circular interpretation of bijective transformations in lossless watermarking for media asset management , 2003, IEEE Trans. Multim..
[22] David Gross-Amblard,et al. Query-preserving watermarking of relational databases and Xml documents , 2011, TODS.
[23] Shi-Jinn Horng,et al. A blind reversible method for watermarking relational databases based on a time-stamping protocol , 2012, Expert Syst. Appl..
[24] Ingemar J. Cox,et al. Digital Watermarking and Steganography , 2014 .
[25] Elisa Bertino,et al. Watermarking Relational Databases Using Optimization-Based Techniques , 2008, IEEE Transactions on Knowledge and Data Engineering.
[26] Muddassar Farooq,et al. A Formal Usability Constraints Model for Watermarking of Outsourced Datasets , 2013, IEEE Transactions on Information Forensics and Security.
[27] Huiping Guo,et al. Tamper detection and localization for categorical data using fragile watermarks , 2004, DRM '04.
[28] Dan Boneh,et al. Collusion-Secure Fingerprinting for Digital Data , 1998, IEEE Trans. Inf. Theory.
[29] Zhijie Liu,et al. Text format based relational database watermarking for non-numeric data , 2010, 2010 International Conference On Computer Design and Applications.
[30] Gouenou Coatrieux,et al. Robust Watermarking of Relational Databases With Ontology-Guided Distortion Control , 2015, IEEE Transactions on Information Forensics and Security.
[31] Muddassar Farooq,et al. A Robust, Distortion Minimizing Technique for Watermarking Relational Databases Using Once-for-All Usability Constraints , 2013, IEEE Transactions on Knowledge and Data Engineering.
[32] Chin-Chen Chang,et al. A Blind Robust Reversible Watermark Scheme for Textual Relational Databases with Virtual Primary Key , 2014, IWDW.
[33] V. Prasannaku. A Robust Tamperproof Watermarking for Data Integrity in Relational Databases , 2009 .
[34] Ming Zhou,et al. ATBaM: An Arnold Transform Based Method on Watermarking Relational Data , 2008, 2008 International Conference on Multimedia and Ubiquitous Engineering (mue 2008).
[35] Ibrahim Kamel,et al. Toward protecting the integrity of relational databases , 2011, 2011 World Congress on Internet Security (WorldCIS-2011).
[36] Fabian M. Suchanek,et al. Adding fake facts to ontologies , 2012, WWW.
[37] Thomas R. Gruber,et al. A translation approach to portable ontology specifications , 1993, Knowl. Acquis..
[38] Vahab Pournaghshband. A new watermarking approach for relational data , 2008, ACM-SE 46.
[39] Xingming Sun,et al. Query Preserving Relational Database Watermarking , 2011, Informatica.
[40] Ton Kalker,et al. Chapter 12 – Steganography , 2008 .
[41] Asunción Gómez-Pérez,et al. Applications of Ontologies and Problem-Solving Methods , 1999, AI Mag..
[42] Jie Guo,et al. Fragile Watermarking Scheme for Tamper Detection of Relational Database , 2011, 2011 International Conference on Computer and Management (CAMAN).