메뉴 건너뛰기




Volumn 12, Issue 2, 2003, Pages 157-169

Watermarking relational data: Framework, algorithms and analysis

Author keywords

Database; Information hiding; Steganography; Watermarking

Indexed keywords

ALGORITHMS; DIGITAL WATERMARKING; MULTIMEDIA SYSTEMS;

EID: 0041513205     PISSN: 10668888     EISSN: None     Source Type: Journal    
DOI: 10.1007/s00778-003-0097-x     Document Type: Conference Paper
Times cited : (198)

References (19)
  • 2
    • 0029464112 scopus 로고
    • Techniques for data hiding
    • storage and retrieval for image and video databases III, San Jose, CA, USA, February 1995
    • Bender W, Gruhl D, Morimoto N (1995) Techniques for data hiding. In: Proceedings of the SPIE 2420 (storage and retrieval for image and video databases III), San Jose, CA, USA, February 1995, pp 164-173
    • (1995) Proceedings of the SPIE , vol.2420 , pp. 164-173
    • Bender, W.1    Gruhl, D.2    Morimoto, N.3
  • 4
    • 0041916251 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation - Tools for software protection
    • University of Arizona
    • Collberg CS, Thomborson C (2000) Watermarking, tamper-proofing, and obfuscation - tools for software protection. Technical report 2000-03, University of Arizona
    • (2000) Technical Report , vol.2000 , Issue.3
    • Collberg, C.S.1    Thomborson, C.2
  • 5
    • 58849141394 scopus 로고    scopus 로고
    • A review of watermarking and the importance of perceptual modeling
    • Human Vision and Electronic Imaging II, San Jose, CA, USA, February 1997
    • Cox IJ, Miller ML (1997) A review of watermarking and the importance of perceptual modeling. In: Proceedings of SPIE (Human Vision and Electronic Imaging II, San Jose, CA, USA, February 1997
    • (1997) Proceedings of SPIE
    • Cox, I.J.1    Miller, M.L.2
  • 7
    • 0032074580 scopus 로고    scopus 로고
    • Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
    • Craver S, Memon N, Yeo BL, Yeung MM (1998) Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications. IEEE J Selected Areas Commun 16(4):573-586
    • (1998) IEEE J Selected Areas Commun , vol.16 , Issue.4 , pp. 573-586
    • Craver, S.1    Memon, N.2    Yeo, B.L.3    Yeung, M.M.4
  • 9
    • 0032072064 scopus 로고    scopus 로고
    • Watermarking of uncompressed and compressed video
    • Hartung F, Girod B (1998) Watermarking of uncompressed and compressed video. Signal Process 66(3):283-301
    • (1998) Signal Process , vol.66 , Issue.3 , pp. 283-301
    • Hartung, F.1    Girod, B.2
  • 13
    • 0003185688 scopus 로고
    • La cryptographie militaire
    • Kerckhoffs A (1883) La cryptographie militaire. J Sci Militaires 9:5-38
    • (1883) J Sci Militaires , vol.9 , pp. 5-38
    • Kerckhoffs, A.1
  • 14
    • 0003245845 scopus 로고
    • Seminumerical algorithms
    • Addison-Wesley, Reading, MA
    • Knuth D (1981) Seminumerical algorithms. In: The art of computer programming, vol 2. Addison-Wesley, Reading, MA
    • (1981) The Art of Computer Programming , vol.2
    • Knuth, D.1
  • 16
    • 84947930048 scopus 로고    scopus 로고
    • Twin peaks: The histogram attack on fixed depth image watermarks
    • Proceedings of the 2nd international workshop on information hiding. Springer, Berlin Heidelberg New York
    • Maes M (1998) Twin peaks: the histogram attack on fixed depth image watermarks. In: Proceedings of the 2nd international workshop on information hiding, Lecture notes in computer science, vol 1525. Springer, Berlin Heidelberg New York, pp 290-305
    • (1998) Lecture Notes in Computer Science , vol.1525 , pp. 290-305
    • Maes, M.1
  • 17
    • 0028496330 scopus 로고
    • Electronic document distribution
    • AT&T Labs
    • Maxemchuk N (1994) Electronic document distribution. Technical journal, AT&T Labs
    • (1994) Technical Journal
    • Maxemchuk, N.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.