-
1
-
-
23944492659
-
A survey on ip watermarking techniques
-
[Abdel-Hamid et al., 2004]
-
[Abdel-Hamid et al., 2004] Abdel-Hamid, A. T., Tahar, S., and Aboulhamid, E. M. (2004). A survey on ip watermarking techniques. Design Automation for Embedded Systems, 9(3):211-227.
-
(2004)
Design Automation for Embedded Systems
, vol.9
, Issue.3
, pp. 211-227
-
-
Abdel-Hamid, A.T.1
Tahar, S.2
Aboulhamid, E.M.3
-
2
-
-
1142303657
-
A system for watermarking relational databases
-
[Agrawal et al., 2003a], San Diego, California. ACM Press
-
[Agrawal et al., 2003a]Agrawal, R., Haas, P. J., and Kiernan, J. (2003a). A system for watermarking relational databases. In Proceedings of the 2003 ACM SIGMOD international conference on Management of data (SIGMOD'03), pages 674-674, San Diego, California. ACM Press.
-
(2003)
Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data (SIGMOD'03)
, pp. 674-674
-
-
Agrawal, R.1
Haas, P.J.2
Kiernan, J.3
-
3
-
-
0041513205
-
Watermarking relational data: Framework, algorithms and analysis
-
[Agrawal et al., 2003b]
-
[Agrawal et al., 2003b]Agrawal, R., Haas, P. J., and Kiernan, J. (2003b). Watermarking relational data: framework, algorithms and analysis. The VLDB Journal, 12:157-169.
-
(2003)
The VLDB Journal
, vol.12
, pp. 157-169
-
-
Agrawal, R.1
Haas, P.J.2
Kiernan, J.3
-
4
-
-
18844365338
-
Watermarking relational databases
-
[Agrawal and Kiernan, 2002], Hong Kong, China. VLDB Endowment
-
[Agrawal and Kiernan, 2002]Agrawal, R. and Kiernan, J. (2002). Watermarking relational databases. In Proceedings of the 28th international conference on Very Large Data Bases (VLDB'02), pages 155-166, Hong Kong, China. VLDB Endowment.
-
(2002)
Proceedings of the 28th International Conference on Very Large Data Bases (VLDB'02)
, pp. 155-166
-
-
Agrawal, R.1
Kiernan, J.2
-
5
-
-
0041783510
-
Privacy-preserving data mining
-
[Agrawal and Srikant, 2000]
-
[Agrawal and Srikant, 2000]Agrawal, R. and Srikant, R. (2000). Privacy-preserving data mining. ACM SIGMOD Record, 29(2):439-450.
-
(2000)
ACM SIGMOD Record
, vol.29
, Issue.2
, pp. 439-450
-
-
Agrawal, R.1
Srikant, R.2
-
6
-
-
62849120341
-
Robust and blind watermarking of relational database systems
-
[Al-Haj and Odeh, 2008]
-
Al-Haj and Odeh, 2008] Al-Haj, A. and Odeh, A. (2008). Robust and blind watermarking of relational database systems. Journal of Computer Science, 4:1024-1029.
-
(2008)
Journal of Computer Science
, vol.4
, pp. 1024-1029
-
-
Al-Haj, A.1
Odeh, A.2
-
7
-
-
28444478342
-
Privacy and ownership preserving of outsourced medical data
-
[Bertino et al., 2005], Tokyo, Japan. IEEE Computer Society
-
[Bertino et al., 2005]Bertino, E., Ooi, B. C., Yang, Y., and Deng, R. H. (2005). Privacy and ownership preserving of outsourced medical data. In Proceedings of the 21st International Conference on Data Engineering (ICDE'05), pages 521-532, Tokyo, Japan. IEEE Computer Society.
-
(2005)
Proceedings of the 21st International Conference on Data Engineering (ICDE'05)
, pp. 521-532
-
-
Bertino, E.1
Ooi, B.C.2
Yang, Y.3
Deng, R.H.4
-
8
-
-
71549132338
-
A distortion free watermark framework for relational databases
-
[Bhattacharya and Cortesi, 2009a], Sofia, Bulgaria. INSTICC Press
-
[Bhattacharya and Cortesi, 2009a]Bhattacharya, S. and Cortesi, A. (2009a). A distortion free watermark framework for relational databases. In Proceedings of the 4th International Conference on Software and Data Technologies (ICSOFT'09), pages 229-234, Sofia, Bulgaria. INSTICC Press.
-
(2009)
Proceedings of the 4th International Conference on Software and Data Technologies (ICSOFT'09)
, pp. 229-234
-
-
Bhattacharya, S.1
Cortesi, A.2
-
9
-
-
71549145624
-
A generic distortion free watermarking technique for relational databases
-
[Bhattacharya and Cortesi, 2009b], Kolkata, India. Springer LNCS
-
[Bhattacharya and Cortesi, 2009b]Bhattacharya, S. and Cortesi, A. (2009b). A generic distortion free watermarking technique for relational databases. In Proceedings of the 5th International Conference on Information Systems Security (ICISS '09), pages 252-264, Kolkata, India. Springer LNCS, Volume 5905.
-
(2009)
Proceedings of the 5th International Conference on Information Systems Security (ICISS '09)
, pp. 252-264
-
-
Bhattacharya, S.1
Cortesi, A.2
-
10
-
-
78751515268
-
Database authentication by distortion-free watermarking
-
[Bhattacharya and Cortesi, 2010], Athens, Greece. INSTICC Press
-
[Bhattacharya and Cortesi, 2010]Bhattacharya, S. and Cortesi, A. (2010). Database authentication by distortion-free watermarking. In Proceedings of the 5th International Conference on Software and Data Technologies (ICSOFT'10), pages 219-226, Athens, Greece. INSTICC Press.
-
(2010)
Proceedings of the 5th International Conference on Software and Data Technologies (ICSOFT'10)
, pp. 219-226
-
-
Bhattacharya, S.1
Cortesi, A.2
-
11
-
-
33748950974
-
A robust algorithm for watermark numeric relational databases
-
[Cui et al., 2006], Kunming, China. Springer Lecture Notes in Control and Information Sciences
-
[Cui et al., 2006]Cui, X., Qin, X., Sheng, G., and Zheng, J. (2006). A robust algorithm for watermark numeric relational databases. In Proceedings of the 2010 International conference on Intelligent computing (ICIC'06), pages 810-815, Kunming, China. Springer Lecture Notes in Control and Information Sciences.
-
(2006)
Proceedings of the 2010 International Conference On Intelligent Computing (ICIC'06)
, pp. 810-815
-
-
Cui, X.1
Qin, X.2
Sheng, G.3
Zheng, J.4
-
12
-
-
33751061004
-
Fingerprinting relational databases
-
[Guo et al., 2006a], Dijon, France. ACM Press
-
[Guo et al., 2006a]Guo, F., Wang, J., and Li, D. (2006a). Fingerprinting relational databases. In Proceedings of the 2006 ACM symposium on Applied computing (SAC '06), pages 487-492, Dijon, France. ACM Press.
-
(2006)
Proceedings of the 2006 ACM Symposium On Applied Computing (SAC '06)
, pp. 487-492
-
-
Guo, F.1
Wang, J.2
Li, D.3
-
13
-
-
33744945812
-
An improved algorithm to watermark numeric relational data
-
[Guo et al., 2005], Jeju Island, Korea. Springer LNCS
-
[Guo et al., 2005]Guo, F., Wang, J., Zhang, Z., Ye, X., and Li, D. (2005). An improved algorithm to watermark numeric relational data. In Proceedings of the 6th International Workshop on Information Security applications (WISA'05), pages 138-149, Jeju Island, Korea. Springer LNCS, Volume 3786.
-
(2005)
Proceedings of the 6th International Workshop On Information Security Applications (WISA'05)
, vol.3786
, pp. 138-149
-
-
Guo, F.1
Wang, J.2
Zhang, Z.3
Ye, X.4
Li, D.5
-
14
-
-
33644685216
-
A fragile watermarking scheme for detecting malicious modifications of database relations
-
[Guo et al., 2006b]
-
[Guo et al., 2006b]Guo, H., Li, Y., Liua, A., and Jajodia, S. (2006b). A fragile watermarking scheme for detecting malicious modifications of database relations. Information Sciences, 176:1350-1378.
-
(2006)
Information Sciences
, vol.176
, pp. 1350-1378
-
-
Guo, H.1
Li, Y.2
Liua, A.3
Jajodia, S.4
-
15
-
-
71549148060
-
Database relation watermarking resilient against secondary watermarking attacks
-
[Gupta and Pieprzyk, 2009], Kolkata, India. Springer LNCS
-
[Gupta and Pieprzyk, 2009]Gupta, G. and Pieprzyk, J. (2009). Database relation watermarking resilient against secondary watermarking attacks. In Proceedings of the 5th International Conference on Information Systems Security (ICISS'09), pages 222-236, Kolkata, India. Springer LNCS, Volume 5905.
-
(2009)
Proceedings of the 5th International Conference On Information Systems Security (ICISS'09)
, vol.5905
, pp. 222-236
-
-
Gupta, G.1
Pieprzyk, J.2
-
16
-
-
0036204131
-
Providing database as a service
-
[Hacigumus et al., 2002], San Jose, California, USA. IEEE Computer Society
-
[Hacigumus et al., 2002]Hacigumus, H., Iyer, B., and Mehrotra, S. (2002). Providing database as a service. In Proceedings of the 18th International Conference on Data Engineering (ICDE'02), pages 29-38, San Jose, California, USA. IEEE Computer Society.
-
(2002)
Proceedings of the 18th International Conference On Data Engineering (ICDE'02)
, pp. 29-38
-
-
Hacigumus, H.1
Iyer, B.2
Mehrotra, S.3
-
17
-
-
78650899973
-
A persistent public watermarking of relational databases
-
[Halder and Cortesi, 2010a], Gandhinagar, Gujarat, India. Springer LNCS
-
[Halder and Cortesi, 2010a]Halder, R. and Cortesi, A. (2010a). A persistent public watermarking of relational databases. In Proceedings of the 6th International Conference on Information Systems Security (ICISS'10), pages 216-230, Gandhinagar, Gujarat, India. Springer LNCS, Volume 6503.
-
(2010)
Proceedings of the 6th International Conference On Information Systems Security (ICISS'10)
, vol.6503
, pp. 216-230
-
-
Halder, R.1
Cortesi, A.2
-
18
-
-
79951777353
-
Persistent watermarking of relational databases
-
[Halder and Cortesi, 2010b], Calicut, Kerala, India. IEEE Computer Society
-
[Halder and Cortesi, 2010b]Halder, R. and Cortesi, A. (2010b). Persistent watermarking of relational databases. In Proceedings of the IEEE International Conference on Advances in Communication, Network, and Computing (CNC'10), pages 46-52, Calicut, Kerala, India. IEEE Computer Society.
-
(2010)
Proceedings of the IEEE International Conference On Advances In Communication, Network, and Computing (CNC'10)
, pp. 46-52
-
-
Halder, R.1
Cortesi, A.2
-
19
-
-
70949093639
-
An internet-based ip protection scheme for circuit designs using linear feedback shift register (lfsr)-based locking
-
[Halder et al., 2009], Natal, Brazil. ACM Press
-
[Halder et al., 2009]Halder, R., Dasgupta, P., Naskar, S., and Sarma, S. S. (2009). An internet-based ip protection scheme for circuit designs using linear feedback shift register (lfsr)-based locking. In Proceedings of the 22nd Annual Symposium on Integrated Circuits and System Design(SBCCI'09), Natal, Brazil. ACM Press.
-
(2009)
Proceedings of the 22nd Annual Symposium On Integrated Circuits and System Design(SBCCI'09)
-
-
Halder, R.1
Dasgupta, P.2
Naskar, S.3
Sarma, S.S.4
-
20
-
-
0036392006
-
Component based system framework for dynamic b2b interaction
-
[Hu and Grefen, 2002], Oxford, England. IEEE Computer Society
-
[Hu and Grefen, 2002]Hu, J. and Grefen, P. (2002). Component based system framework for dynamic b2b interaction. In Proceedings of the 26th International Computer Software and Applications Conference on Prolonging Software Life: Development and Redevelopment (COMPSAC'02), pages 557-562, Oxford, England. IEEE Computer Society.
-
(2002)
Proceedings of the 26th International Computer Software and Applications Conference On Prolonging Software Life: Development and Redevelopment (COMPSAC'02)
, pp. 557-562
-
-
Hu, J.1
Grefen, P.2
-
21
-
-
33646519863
-
Garwm: Towards a generalized and adaptive watermark scheme for relational data
-
[Hu et al., 2005], Hangzhou, China. Springer LNCS
-
[Hu et al., 2005]Hu, T., Chen, G., Chen, K., and Dong, J. (2005). Garwm: Towards a generalized and adaptive watermark scheme for relational data. In Proceedings of the 6th International Conference in Advances in Web-Age Information Management (WAIM'05), pages 380-391, Hangzhou, China. Springer LNCS, Volume 3739.
-
(2005)
Proceedings of the 6th International Conference in Advances in Web-Age Information Management (WAIM'05)
, vol.3739
, pp. 380-391
-
-
Hu, T.1
Chen, G.2
Chen, K.3
Dong, J.4
-
22
-
-
70449436303
-
An image based algorithm for watermarking relational databases
-
[Hu et al., 2009], Zhangjiajie, Hunan, China. IEEE Computer Society
-
[Hu et al., 2009]Hu, Z., Cao, Z., and Sun, J. (2009). An image based algorithm for watermarking relational databases. In Proceedings of the 2009 International Conference on Measuring Technology and Mechatronics Automation (ICMTMA'09), pages 425-428, Zhangjiajie, Hunan, China. IEEE Computer Society.
-
(2009)
Proceedings of the 2009 International Conference on Measuring Technology and Mechatronics Automation (ICMTMA'09)
, pp. 425-428
-
-
Hu, Z.1
Cao, Z.2
Sun, J.3
-
23
-
-
70449337408
-
A cluster-based watermarking technique for relational database
-
[Huang et al., 2009], Wuhan, China. IEEE Press
-
[Huang et al., 2009]Huang, K., Yue, M., Chen, P., He, Y., and Chen, X. (2009). A cluster-based watermarking technique for relational database. In Proceedings of the 1st International Workshop on Database Technology and Applications (DBTA'09), pages 107-110, Wuhan, China. IEEE Press.
-
(2009)
Proceedings of the 1st International Workshop on Database Technology and Applications (DBTA'09)
, pp. 107-110
-
-
Huang, K.1
Yue, M.2
Chen, P.3
He, Y.4
Chen, X.5
-
24
-
-
9744242101
-
A new watermark mechanism for relational data
-
[Huang et al., 2004], Wuhan, China. IEEE Computer Society
-
[Huang et al., 2004]Huang, M., Cao, J., Peng, Z., and Fang, Y. (2004). A new watermark mechanism for relational data. In Proceedings of the 4th International Conference on Computer and Information Technology (CIT'04), pages 946-950, Wuhan, China. IEEE Computer Society.
-
(2004)
Proceedings of the 4th International Conference on Computer and Information Technology (CIT'04)
, pp. 946-950
-
-
Huang, M.1
Cao, J.2
Peng, Z.3
Fang, Y.4
-
25
-
-
70349464986
-
A schema for protecting the integrity of databases
-
[Kamel, 2009]
-
[Kamel, 2009]Kamel, I. (2009). A schema for protecting the integrity of databases. Computers & Security, 28:698-709.
-
(2009)
Computers & Security
, vol.28
, pp. 698-709
-
-
Kamel, I.1
-
26
-
-
0003185688
-
La cryptographie militaire
-
[Kerckhoffs, 1983]
-
[Kerckhoffs, 1983]Kerckhoffs, A. (1983). La cryptographie militaire. Journal des Sciences Militaires, 9:5-38.
-
(1983)
Journal Des Sciences Militaires
, vol.9
, pp. 5-38
-
-
Kerckhoffs, A.1
-
27
-
-
0033896030
-
Watermarking maps: Hiding information in structured data
-
[Khanna and Zane, 2000], San Francisco, California, United States. Society for Industrial and Applied Mathematics
-
[Khanna and Zane, 2000]Khanna, S. and Zane, F. (2000). Watermarking maps: hiding information in structured data. In Proceedings of the 11th annual ACM-SIAM symposium on Discrete algorithms (SODA'00), pages 596-605, San Francisco, California, United States. Society for Industrial and Applied Mathematics.
-
(2000)
Proceedings of the 11th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA'00)
, pp. 596-605
-
-
Khanna, S.1
Zane, F.2
-
28
-
-
46749146542
-
An analysis of database watermarking security
-
[Lafaye, 2007], Manchester, United Kingdom. IEEE Computer Society
-
[Lafaye, 2007]Lafaye, J. (2007). An analysis of database watermarking security. In Proceedings of the 3rd International Symposium on Information Assurance and Security (IAS'07), pages 462-467, Manchester, United Kingdom. IEEE Computer Society.
-
(2007)
Proceedings of the 3rd International Symposium On Information Assurance and Security (IAS'07)
, pp. 462-467
-
-
Lafaye, J.1
-
29
-
-
0034838492
-
A survey of watermarking techniques applied to multimedia
-
[Lee and Jung, 2001], Pusan, South Korea. IEEE Press
-
[Lee and Jung, 2001]Lee, S. and Jung, S. (2001). A survey of watermarking techniques applied to multimedia. In Proceedings of the IEEE International Symposium on Industrial Electronics (ISIE'01), pages 272-277, Pusan, South Korea. IEEE Press.
-
(2001)
Proceedings of the IEEE International Symposium On Industrial Electronics (ISIE'01)
, pp. 272-277
-
-
Lee, S.1
Jung, S.2
-
31
-
-
34247371496
-
Publicly verifiable ownership protection for relational databases
-
[Li and Deng, 2006], Taipei, Taiwan. ACM Press
-
[Li and Deng, 2006]Li, Y. and Deng, R. H. (2006). Publicly verifiable ownership protection for relational databases. In Proceedings of the 2006 ACM Symposium on Information, computer and communications security (ASIACCS'06), pages 78-89, Taipei, Taiwan. ACM Press.
-
(2006)
Proceedings of the 2006 ACM Symposium On Information, Computer and Communications Security (ASIACCS'06)
, pp. 78-89
-
-
Li, Y.1
Deng, R.H.2
-
32
-
-
18844420548
-
Tamper detection and localization for categorical data using fragile watermarks
-
[Li et al., 2004], Washington, DC, USA. ACM Press
-
[Li et al., 2004]Li, Y., Guo, H., and Jajodia, S. (2004). Tamper detection and localization for categorical data using fragile watermarks. In Proceedings of the 4th ACM workshop on Digital rights management (DRM'04), pages 73-82, Washington, DC, USA. ACM Press.
-
(2004)
Proceedings of the 4th ACM Workshop On Digital Rights Management (DRM'04)
, pp. 73-82
-
-
Li, Y.1
Guo, H.2
Jajodia, S.3
-
33
-
-
18844407290
-
Constructing a virtual primary key for fingerprinting relational data
-
[Li et al., 2003], Washington, DC, USA. ACM Press
-
[Li et al., 2003]Li, Y., Swarup, V., and Jajodia, S. (2003). Constructing a virtual primary key for fingerprinting relational data. In Proceedings of the 3rd ACM workshop on Digital rights management (DRM'03), pages 133-141, Washington, DC, USA. ACM Press.
-
(2003)
Proceedings of the 3rd ACM Workshop On Digital Rights Management (DRM'03)
, pp. 133-141
-
-
Li, Y.1
Swarup, V.2
Jajodia, S.3
-
34
-
-
19944413957
-
Fingerprinting relational databases: Schemes and specialties
-
[Li et al., 2005]
-
[Li et al., 2005]Li, Y., Swarup, V., and Jajodia, S. (2005). Fingerprinting relational databases: schemes and specialties. IEEE Transactions on Dependable and Secure Computing, 2:34-45.
-
(2005)
IEEE Transactions On Dependable and Secure Computing
, vol.2
, pp. 34-45
-
-
Li, Y.1
Swarup, V.2
Jajodia, S.3
-
35
-
-
24944541395
-
A block oriented fingerprinting scheme in relational database
-
[Liu et al., 2004], Springer LNCS, Seoul, Korea
-
[Liu et al., 2004]Liu, S., Wang, S., Deng, R. H., and Shao, W. (2004). A block oriented fingerprinting scheme in relational database. In Proceedings of the 7th International Conference in Information Security and Cryptology (ICISC'04), pages 455-466, Springer LNCS, Volume 3506. Seoul, Korea.
-
(2004)
Proceedings of the 7th International Conference In Information Security and Cryptology (ICISC'04
, vol.3506
, pp. 455-466
-
-
Liu, S.1
Wang, S.2
Deng, R.H.3
Shao, W.4
-
36
-
-
57849166253
-
The approach for optimization in watermark signal of relational databases by using genetic algorithms
-
[Meng et al., 2008], Singapore. IEEE Computer Society
-
[Meng et al., 2008]Meng, M., Cui, X., and Cui, H. (2008). The approach for optimization in watermark signal of relational databases by using genetic algorithms. In Proceedings of the 2008 International Conference on Computer Science and Information Technology (ICCSIT'08), pages 448-452, Singapore. IEEE Computer Society.
-
(2008)
Proceedings of the 2008 International Conference On Computer Science and Information Technology (ICCSIT'08)
, pp. 448-452
-
-
Meng, M.1
Cui, X.2
Cui, H.3
-
37
-
-
33845285852
-
A survey of digital image watermarking techniques
-
[Potdar et al., 2005], Peth, Australia. IEEE Press
-
[Potdar et al., 2005]Potdar, V. M., Han, S., and Chang, E. (2005). A survey of digital image watermarking techniques. In Proceedings of the 3rd IEEE International Conference on Industrial Informatics (INDIN'05), pages 709-716, Peth, Australia. IEEE Press.
-
(2005)
Proceedings of the 3rd IEEE International Conference On Industrial Informatics (INDIN'05)
, pp. 709-716
-
-
Potdar, V.M.1
Han, S.2
Chang, E.3
-
38
-
-
70449937945
-
A new watermarking approach for relational data
-
[Pournaghshband, 2008], Auburn, Alabama. ACM Press
-
[Pournaghshband, 2008]Pournaghshband, V. (2008). A new watermarking approach for relational data. In Proceedings of the 46th Annual Southeast Regional Conference on XX (ACM-SE'08), pages 127-131, Auburn, Alabama. ACM Press.
-
(2008)
Proceedings of the 46th Annual Southeast Regional Conference On XX (ACM-SE'08)
, pp. 127-131
-
-
Pournaghshband, V.1
-
39
-
-
77952825310
-
A robust tamperproof watermarking for data integrity in relational databases
-
[Prasannakumari, 2009]
-
[Prasannakumari, 2009]Prasannakumari, V. (2009). A robust tamperproof watermarking for data integrity in relational databases. Research Journal of Information Technology, 1:115-121.
-
(2009)
Research Journal of Information Technology
, vol.1
, pp. 115-121
-
-
Prasannakumari, V.1
-
40
-
-
39749123233
-
Watermark based copyright protection of outsourced database
-
[Qin et al., 2006], Delhi, India. IEEE Computer Society
-
[Qin et al., 2006]Qin, Z., Ying, Y., Jia-jin, L., and Yi-shu, L. (2006). Watermark based copyright protection of outsourced database. In Proceedings of the 10th International Database Engineering and Applications Symposium (IDEAS'06), pages 301-308, Delhi, India. IEEE Computer Society.
-
(2006)
Proceedings of the 10th International Database Engineering and Applications Symposium (IDEAS'06)
, pp. 301-308
-
-
Qin, Z.1
Ying, Y.2
Jia-Jin, L.3
Yi-Shu, L.4
-
41
-
-
2442531718
-
Proving ownership over categorical data
-
[Sion, 2004], Boston, MA, USA. IEEE Computer Society
-
[Sion, 2004]Sion, R. (2004). Proving ownership over categorical data. In Proceedings of the 20th International Conference on Data Engineering (ICDE 04), pages 584-595, Boston, MA, USA. IEEE Computer Society.
-
(2004)
Proceedings of the 20th International Conference On Data Engineering (ICDE 04)
, pp. 584-595
-
-
Sion, R.1
-
42
-
-
22944484464
-
Rights protection for categorical data
-
[Sion et al., 2005]
-
[Sion et al., 2005]Sion, R., Atallah, M., and Prabhakar, S. (2005). Rights protection for categorical data. IEEE Transactions on Knowledge and Data Engineering, 17:912-926.
-
(2005)
IEEE Transactions On Knowledge and Data Engineering
, vol.17
, pp. 912-926
-
-
Sion, R.1
Atallah, M.2
Prabhakar, S.3
-
43
-
-
47349116935
-
Fragile database watermarking for malicious tamper detection using support vector regression
-
[Tsai et al., 2007], Splendor Kaohsiung, Taiwan. IEEE Computer Society
-
[Tsai et al., 2007]Tsai, M., Hsu, F., Chang, J., and Wu, H. (2007). Fragile database watermarking for malicious tamper detection using support vector regression. In Proceedings of the 3rd International Conference on International Information Hiding and Multimedia Signal Processing (IIH-MSP'07), pages 493-496, Splendor Kaohsiung, Taiwan. IEEE Computer Society.
-
(2007)
Proceedings of the 3rd International Conference On International Information Hiding and Multimedia Signal Processing (IIH-MSP'07)
, pp. 493-496
-
-
Tsai, M.1
Hsu, F.2
Chang, J.3
Wu, H.4
-
44
-
-
33847751032
-
A database watermarking technique for temper detection
-
[Tsai et al., 2006], Kaohsiung, Taiwan. Atlantis Press
-
[Tsai et al., 2006] Tsai, M., Tseng, H., and Lai, C. (2006). A database watermarking technique for temper detection. In Proceedings of the 2006 Joint Conference on Information Sciences (JCIS'06), Kaohsiung, Taiwan. Atlantis Press.
-
(2006)
Proceedings of the 2006 Joint Conference On Information Sciences (JCIS'06)
-
-
Tsai, M.1
Tseng, H.2
Lai, C.3
-
45
-
-
51249120155
-
Atbam: An arnold transform based method on watermarking relational data
-
[Wang et al., 2008a], Beijing, China. IEEE Computer Society
-
[Wang et al., 2008a]Wang, C., Wang, J., Zhou, M., Chen, G., and Li, D. (2008a). Atbam: An arnold transform based method on watermarking relational data. In Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE'08), pages 263-270, Beijing, China. IEEE Computer Society.
-
(2008)
Proceedings of the 2008 International Conference On Multimedia and Ubiquitous Engineering (MUE'08)
, pp. 263-270
-
-
Wang, C.1
Wang, J.2
Zhou, M.3
Chen, G.4
Li, D.5
-
46
-
-
51749095484
-
A speech based algorithm for watermarking relational databases
-
[Wang et al., 2008b], Moscow, Russia. IEEE Computer Society
-
[Wang et al., 2008b]Wang, H., Cui, X., and Cao, Z. (2008b). A speech based algorithm for watermarking relational databases. In Proceedings of the 2008 International Symposiums on Information Processing (ISIP'08), pages 603-606, Moscow, Russia. IEEE Computer Society.
-
(2008)
Proceedings of the 2008 International Symposiums On Information Processing (ISIP'08)
, pp. 603-606
-
-
Wang, H.1
Cui, X.2
Cao, Z.3
-
47
-
-
46749132342
-
Second-lsb-dependent robust watermarking for relational database
-
[Xiao et al., 2007], Manchester, United Kingdom. IEEE Computer Society
-
[Xiao et al., 2007]Xiao, X., Sun, X., and Chen, M. (2007). Second-lsb-dependent robust watermarking for relational database. In Proceedings of the 3rd International Symposium on Information Assurance and Security (IAS'07), pages 292-300, Manchester, United Kingdom. IEEE Computer Society.
-
(2007)
Proceedings of the 3rd International Symposium On Information Assurance and Security (IAS'07)
, pp. 292-300
-
-
Xiao, X.1
Sun, X.2
Chen, M.3
-
48
-
-
33947604749
-
A weighted algorithm for watermarking relational databases
-
[Xinchun et al., 2007]
-
[Xinchun et al., 2007]Xinchun, C., Xiaolin, Q., and Gang, S. (2007). A weighted algorithm for watermarking relational databases. Wuhan University Journal of Natural Science, (1):79-82.
-
(2007)
Wuhan University Journal of Natural Science
, vol.1
, pp. 79-82
-
-
Xinchun, C.1
Xiaolin, Q.2
Gang, S.3
-
49
-
-
34248212430
-
A method of protecting relational databases copyright with cloud watermark
-
[Zhang et al., 2005]
-
[Zhang et al., 2005]Zhang, Y., Niu, X., and Zhao, D. (2005). A method of protecting relational databases copyright with cloud watermark. International Journal of Information and Communication Engineering, 1:337-341.
-
(2005)
International Journal of Information and Communication Engineering
, vol.1
, pp. 337-341
-
-
Zhang, Y.1
Niu, X.2
Zhao, D.3
-
50
-
-
47349091284
-
Relational databases watermark technique based on content characteristic
-
[Zhang et al., 2006], Beijing, China. IEEE Computer Society
-
[Zhang et al., 2006]Zhang, Y., Niu, X., Zhao, D., Li, J., and Liu, S. (2006). Relational databases watermark technique based on content characteristic. In Proceedings of the 1st International Conference on Innovative Computing, Information and Control (ICICIC'06), pages 677-680, Beijing, China. IEEE Computer Society.
-
(2006)
Proceedings of the 1st International Conference On Innovative Computing, Information and Control (ICICIC'06)
, pp. 677-680
-
-
Zhang, Y.1
Niu, X.2
Zhao, D.3
Li, J.4
Liu, S.5
-
51
-
-
35248861089
-
An additive-attackproof watermarking mechanism for databases' copyrights protection using image
-
[Zhou et al., 2007], Seoul, Korea. ACM Press
-
[Zhou et al., 2007] Zhou, X., Huang, M., and Peng, Z. (2007). An additive-attackproof watermarking mechanism for databases' copyrights protection using image. In Proceedings of the 2007 ACM symposium on Applied computing (SAC'07), pages 254-258, Seoul, Korea. ACM Press.
-
(2007)
Proceedings of the 2007 ACM Symposium On Applied Computing (SAC'07)
, pp. 254-258
-
-
Zhou, X.1
Huang, M.2
Peng, Z.3
|