메뉴 건너뛰기




Volumn 16, Issue 21, 2010, Pages 3164-3190

Watermarking techniques for relational databases: Survey, classification and comparison

Author keywords

Digital Watermarking; Fingerprinting; Relational Databases

Indexed keywords


EID: 79951800937     PISSN: 0958695X     EISSN: 09486968     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (91)

References (51)
  • 3
    • 0041513205 scopus 로고    scopus 로고
    • Watermarking relational data: Framework, algorithms and analysis
    • [Agrawal et al., 2003b]
    • [Agrawal et al., 2003b]Agrawal, R., Haas, P. J., and Kiernan, J. (2003b). Watermarking relational data: framework, algorithms and analysis. The VLDB Journal, 12:157-169.
    • (2003) The VLDB Journal , vol.12 , pp. 157-169
    • Agrawal, R.1    Haas, P.J.2    Kiernan, J.3
  • 5
    • 0041783510 scopus 로고    scopus 로고
    • Privacy-preserving data mining
    • [Agrawal and Srikant, 2000]
    • [Agrawal and Srikant, 2000]Agrawal, R. and Srikant, R. (2000). Privacy-preserving data mining. ACM SIGMOD Record, 29(2):439-450.
    • (2000) ACM SIGMOD Record , vol.29 , Issue.2 , pp. 439-450
    • Agrawal, R.1    Srikant, R.2
  • 6
    • 62849120341 scopus 로고    scopus 로고
    • Robust and blind watermarking of relational database systems
    • [Al-Haj and Odeh, 2008]
    • Al-Haj and Odeh, 2008] Al-Haj, A. and Odeh, A. (2008). Robust and blind watermarking of relational database systems. Journal of Computer Science, 4:1024-1029.
    • (2008) Journal of Computer Science , vol.4 , pp. 1024-1029
    • Al-Haj, A.1    Odeh, A.2
  • 9
    • 71549145624 scopus 로고    scopus 로고
    • A generic distortion free watermarking technique for relational databases
    • [Bhattacharya and Cortesi, 2009b], Kolkata, India. Springer LNCS
    • [Bhattacharya and Cortesi, 2009b]Bhattacharya, S. and Cortesi, A. (2009b). A generic distortion free watermarking technique for relational databases. In Proceedings of the 5th International Conference on Information Systems Security (ICISS '09), pages 252-264, Kolkata, India. Springer LNCS, Volume 5905.
    • (2009) Proceedings of the 5th International Conference on Information Systems Security (ICISS '09) , pp. 252-264
    • Bhattacharya, S.1    Cortesi, A.2
  • 11
    • 33748950974 scopus 로고    scopus 로고
    • A robust algorithm for watermark numeric relational databases
    • [Cui et al., 2006], Kunming, China. Springer Lecture Notes in Control and Information Sciences
    • [Cui et al., 2006]Cui, X., Qin, X., Sheng, G., and Zheng, J. (2006). A robust algorithm for watermark numeric relational databases. In Proceedings of the 2010 International conference on Intelligent computing (ICIC'06), pages 810-815, Kunming, China. Springer Lecture Notes in Control and Information Sciences.
    • (2006) Proceedings of the 2010 International Conference On Intelligent Computing (ICIC'06) , pp. 810-815
    • Cui, X.1    Qin, X.2    Sheng, G.3    Zheng, J.4
  • 14
    • 33644685216 scopus 로고    scopus 로고
    • A fragile watermarking scheme for detecting malicious modifications of database relations
    • [Guo et al., 2006b]
    • [Guo et al., 2006b]Guo, H., Li, Y., Liua, A., and Jajodia, S. (2006b). A fragile watermarking scheme for detecting malicious modifications of database relations. Information Sciences, 176:1350-1378.
    • (2006) Information Sciences , vol.176 , pp. 1350-1378
    • Guo, H.1    Li, Y.2    Liua, A.3    Jajodia, S.4
  • 15
    • 71549148060 scopus 로고    scopus 로고
    • Database relation watermarking resilient against secondary watermarking attacks
    • [Gupta and Pieprzyk, 2009], Kolkata, India. Springer LNCS
    • [Gupta and Pieprzyk, 2009]Gupta, G. and Pieprzyk, J. (2009). Database relation watermarking resilient against secondary watermarking attacks. In Proceedings of the 5th International Conference on Information Systems Security (ICISS'09), pages 222-236, Kolkata, India. Springer LNCS, Volume 5905.
    • (2009) Proceedings of the 5th International Conference On Information Systems Security (ICISS'09) , vol.5905 , pp. 222-236
    • Gupta, G.1    Pieprzyk, J.2
  • 17
    • 78650899973 scopus 로고    scopus 로고
    • A persistent public watermarking of relational databases
    • [Halder and Cortesi, 2010a], Gandhinagar, Gujarat, India. Springer LNCS
    • [Halder and Cortesi, 2010a]Halder, R. and Cortesi, A. (2010a). A persistent public watermarking of relational databases. In Proceedings of the 6th International Conference on Information Systems Security (ICISS'10), pages 216-230, Gandhinagar, Gujarat, India. Springer LNCS, Volume 6503.
    • (2010) Proceedings of the 6th International Conference On Information Systems Security (ICISS'10) , vol.6503 , pp. 216-230
    • Halder, R.1    Cortesi, A.2
  • 25
    • 70349464986 scopus 로고    scopus 로고
    • A schema for protecting the integrity of databases
    • [Kamel, 2009]
    • [Kamel, 2009]Kamel, I. (2009). A schema for protecting the integrity of databases. Computers & Security, 28:698-709.
    • (2009) Computers & Security , vol.28 , pp. 698-709
    • Kamel, I.1
  • 26
    • 0003185688 scopus 로고
    • La cryptographie militaire
    • [Kerckhoffs, 1983]
    • [Kerckhoffs, 1983]Kerckhoffs, A. (1983). La cryptographie militaire. Journal des Sciences Militaires, 9:5-38.
    • (1983) Journal Des Sciences Militaires , vol.9 , pp. 5-38
    • Kerckhoffs, A.1
  • 27
    • 0033896030 scopus 로고    scopus 로고
    • Watermarking maps: Hiding information in structured data
    • [Khanna and Zane, 2000], San Francisco, California, United States. Society for Industrial and Applied Mathematics
    • [Khanna and Zane, 2000]Khanna, S. and Zane, F. (2000). Watermarking maps: hiding information in structured data. In Proceedings of the 11th annual ACM-SIAM symposium on Discrete algorithms (SODA'00), pages 596-605, San Francisco, California, United States. Society for Industrial and Applied Mathematics.
    • (2000) Proceedings of the 11th Annual ACM-SIAM Symposium on Discrete Algorithms (SODA'00) , pp. 596-605
    • Khanna, S.1    Zane, F.2
  • 32
    • 18844420548 scopus 로고    scopus 로고
    • Tamper detection and localization for categorical data using fragile watermarks
    • [Li et al., 2004], Washington, DC, USA. ACM Press
    • [Li et al., 2004]Li, Y., Guo, H., and Jajodia, S. (2004). Tamper detection and localization for categorical data using fragile watermarks. In Proceedings of the 4th ACM workshop on Digital rights management (DRM'04), pages 73-82, Washington, DC, USA. ACM Press.
    • (2004) Proceedings of the 4th ACM Workshop On Digital Rights Management (DRM'04) , pp. 73-82
    • Li, Y.1    Guo, H.2    Jajodia, S.3
  • 33
    • 18844407290 scopus 로고    scopus 로고
    • Constructing a virtual primary key for fingerprinting relational data
    • [Li et al., 2003], Washington, DC, USA. ACM Press
    • [Li et al., 2003]Li, Y., Swarup, V., and Jajodia, S. (2003). Constructing a virtual primary key for fingerprinting relational data. In Proceedings of the 3rd ACM workshop on Digital rights management (DRM'03), pages 133-141, Washington, DC, USA. ACM Press.
    • (2003) Proceedings of the 3rd ACM Workshop On Digital Rights Management (DRM'03) , pp. 133-141
    • Li, Y.1    Swarup, V.2    Jajodia, S.3
  • 39
    • 77952825310 scopus 로고    scopus 로고
    • A robust tamperproof watermarking for data integrity in relational databases
    • [Prasannakumari, 2009]
    • [Prasannakumari, 2009]Prasannakumari, V. (2009). A robust tamperproof watermarking for data integrity in relational databases. Research Journal of Information Technology, 1:115-121.
    • (2009) Research Journal of Information Technology , vol.1 , pp. 115-121
    • Prasannakumari, V.1
  • 46
  • 48
    • 33947604749 scopus 로고    scopus 로고
    • A weighted algorithm for watermarking relational databases
    • [Xinchun et al., 2007]
    • [Xinchun et al., 2007]Xinchun, C., Xiaolin, Q., and Gang, S. (2007). A weighted algorithm for watermarking relational databases. Wuhan University Journal of Natural Science, (1):79-82.
    • (2007) Wuhan University Journal of Natural Science , vol.1 , pp. 79-82
    • Xinchun, C.1    Xiaolin, Q.2    Gang, S.3
  • 51
    • 35248861089 scopus 로고    scopus 로고
    • An additive-attackproof watermarking mechanism for databases' copyrights protection using image
    • [Zhou et al., 2007], Seoul, Korea. ACM Press
    • [Zhou et al., 2007] Zhou, X., Huang, M., and Peng, Z. (2007). An additive-attackproof watermarking mechanism for databases' copyrights protection using image. In Proceedings of the 2007 ACM symposium on Applied computing (SAC'07), pages 254-258, Seoul, Korea. ACM Press.
    • (2007) Proceedings of the 2007 ACM Symposium On Applied Computing (SAC'07) , pp. 254-258
    • Zhou, X.1    Huang, M.2    Peng, Z.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.