메뉴 건너뛰기




Volumn 177, Issue 1, 2007, Pages 281-298

Chaining watermarks for detecting malicious modifications to streaming data

Author keywords

Fragile watermarking; Integrity; Streaming data

Indexed keywords

FRAGILE WATERMARKING; INTEGRITY; STREAMING DATA;

EID: 33749679756     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2006.03.014     Document Type: Article
Times cited : (93)

References (21)
  • 1
    • 0041513205 scopus 로고    scopus 로고
    • Watermarking relational data: framework, algorithms and analysis
    • Agrawal R., and Kiernan J. Watermarking relational data: framework, algorithms and analysis. The VLDB Journal 12 2 (2003) 157-169
    • (2003) The VLDB Journal , vol.12 , Issue.2 , pp. 157-169
    • Agrawal, R.1    Kiernan, J.2
  • 2
    • 33749658402 scopus 로고    scopus 로고
    • D. Carney, U. Cetintemel, M. Cherniack, S. Lee, G. Seidman, N. Stonebraker, M. Tatbul, S. Zdonik, Monitoring streams-a new class of data management application, in: Proceedings of the International Conference on Very Large Data Bases (VLDB), 2002, pp. 215-226.
  • 3
    • 16244422981 scopus 로고    scopus 로고
    • A fragile watermark error detection scheme for wireless video Communications
    • Chen M., He Y., and Lagendijk R. A fragile watermark error detection scheme for wireless video Communications. IEEE Transactions on Multimedia 7 2 (2003) 315-329
    • (2003) IEEE Transactions on Multimedia , vol.7 , Issue.2 , pp. 315-329
    • Chen, M.1    He, Y.2    Lagendijk, R.3
  • 4
    • 0033309988 scopus 로고    scopus 로고
    • J. Fridrich, M. Du. Images with self-correcting capabilities, in: Proceedings of the IEEE International Conference on Image Processing, 1999, pp. 792-796.
  • 5
    • 0034765589 scopus 로고    scopus 로고
    • J. Fridrich, M. Goljan, M. Du, Invertible authentication, in: Proceedings of SPIE, Security and Watermarking of Multimedia Contents III, 2001, pp. 197-208.
  • 6
    • 84889351757 scopus 로고    scopus 로고
    • R. Gennaro, P. Rohatgi, How to sign digital streams, in: Proceedings of the 17th Annual International Cryptology Conference (Crypto'97), 1997, pp. 180-197.
  • 7
    • 33749657028 scopus 로고    scopus 로고
    • P. Golle, N. Modadugu, Authenticating streamed data in the presence of random packet loss, in: Proceedings of Network and Distributed System Security Symposium, 2001, pp. 13-22.
  • 8
    • 33644685216 scopus 로고    scopus 로고
    • A fragile watermarking scheme for detecting malicious modifications of database relations
    • Guo H., Li Y., Liu A., and Jajodia S. A fragile watermarking scheme for detecting malicious modifications of database relations. Information Sciences 176 10 (2006) 1350-1378
    • (2006) Information Sciences , vol.176 , Issue.10 , pp. 1350-1378
    • Guo, H.1    Li, Y.2    Liu, A.3    Jajodia, S.4
  • 9
    • 85061025613 scopus 로고    scopus 로고
    • L. Kerschberg, H. Gomaa, D. Menascé, J.P. Yoon, Data and information architectures for large-scale distributed data intensive information systems, in: Proceedings of 8th International Conference on Statistical and Scientific Database Management, 1996, pp. 226-233.
  • 10
    • 33749670310 scopus 로고    scopus 로고
    • D. Kifer, S. David, J. Gehrke, Detecting change in data streams, in: Proceedings of the VLDB Conference, 2004, pp. 180-191.
  • 12
    • 33749672282 scopus 로고    scopus 로고
    • Y. Li, V. Swarup, S. Jajodia, A robust watermarking scheme for relational data, in: Proceedings of the 13th Workshop on Information Technology and Engineering, 2003, pp. 195-200.
  • 13
    • 33750910367 scopus 로고    scopus 로고
    • C. Lu, H. Liao, L. Chen, Multipurpose audio watermarking, in: Proceedings of the 15th International Conference on Pattern Recognition, 2000, pp. 286-289.
  • 14
    • 0034823295 scopus 로고    scopus 로고
    • S. Miner, J. Staddon, Graph-based authentication of digital streams, in: Proceedings of the IEEE Symposium on Security and Privacy, 2001, pp. 232-246.
  • 15
    • 84883877309 scopus 로고    scopus 로고
    • A. Pannetrat, R. Molva, Authenticating real time packet streams and multicasts, in: Proceedings of the 7th International Symposium on Computers and Communications, 2002, pp. 490-495.
  • 16
    • 33749656264 scopus 로고    scopus 로고
    • A. Pannetrat, R. Molva, Efficient multicast packet authentication, in: Proceedings of Network and Distributed System Security Symposium, 2003, pp. 1-12.
  • 17
    • 84862867186 scopus 로고    scopus 로고
    • J. Park, E. Chong, H. Siegel, Efficient multicast packet authentication using signature amortization, in: Proceedings of IEEE Symposium on Security and Privacy, 2002, pp. 227-240.
  • 18
    • 0033690336 scopus 로고    scopus 로고
    • A. Perrig, J.D. Tygar, D. Song, R. Canetti, Efficient authentication and signing of multicast streams over lossy channels, in: Proceedings of IEEE Symposium on Security and Privacy, 2000, pp. 56-73.
  • 20
    • 33645671682 scopus 로고    scopus 로고
    • R. Sion, M. Atallah, S. Prabhakar, Rights protection for discrete numeric streams, in: IEEE Transactions on Knowledge and Data Engineering 18 (5) (2006) 699-714.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.