-
1
-
-
0004026002
-
-
Digital Watermarking, Morgan Kaufmann
-
I. Cox, J. Bloom, and M. Miller, "Digital Watermarking," Digital Watermarking, Morgan Kaufmann, 2001.
-
(2001)
Digital Watermarking
-
-
Cox, I.1
Bloom, J.2
Miller, M.3
-
2
-
-
0041513205
-
Watermarking Relational Data: Framework, Algorithms and Analysis
-
R. Agrawal, P.J. Haas, and J. Kiernan, "Watermarking Relational Data: Framework, Algorithms and Analysis," The VLDB J., vol. 12, no. 2, pp. 157-169, 2003.
-
(2003)
The VLDB J
, vol.12
, Issue.2
, pp. 157-169
-
-
Agrawal, R.1
Haas, P.J.2
Kiernan, J.3
-
3
-
-
1142299757
-
Query-Preserving Watermarking of Relational Databases and XML Documents
-
Principles of Database Systems (PODS)
-
D. Gross-Amblard, Query-Preserving Watermarking of Relational Databases and XML Documents", Proc. ACM Symp. Principles of Database Systems (PODS), pp. 191-201, 2003.
-
(2003)
Proc. ACM Symp
, pp. 191-201
-
-
Gross-Amblard, D.1
-
4
-
-
10944220833
-
Rights Protection for Relational Data
-
June
-
R. Sion, M. Atallah, and S. Prabhakar, Rights Protection for Relational Data," IEEE Trans. Knowledge and Data Eng., vol. 16, no. 6, pp. 1-17, June 2004.
-
(2004)
IEEE Trans. Knowledge and Data Eng
, vol.16
, Issue.6
, pp. 1-17
-
-
Sion, R.1
Atallah, M.2
Prabhakar, S.3
-
5
-
-
36649016018
-
Watermarking Relational Data using Optimization Based Techniques
-
January
-
M. Shehab, E. Bertino, A. Ghafoor, "Watermarking Relational Data using Optimization Based Techniques, IEEE Transactions on Knowledge and Data Engineering Vol. 20, No.1, pp. 116-129, January 2008.
-
(2008)
IEEE Transactions on Knowledge and Data Engineering
, vol.20
, Issue.1
, pp. 116-129
-
-
Shehab, M.1
Bertino, E.2
Ghafoor, A.3
-
6
-
-
18844455217
-
A Robust Watermarking scheme for relational data
-
December
-
Y. Li, V. Swarup, and S. Jajodia, "A Robust Watermarking scheme for relational data, In Proc. The 13th workshop on information technology and engineering, pp. 195-200, December 2003.
-
(2003)
In Proc. The 13th workshop on information technology and engineering
, pp. 195-200
-
-
Li, Y.1
Swarup, V.2
Jajodia, S.3
-
7
-
-
22944484464
-
Rights Protection for Categorical Data
-
July
-
R. Sion, M. Atallah, and S. Prabhakar, "Rights Protection for Categorical Data," IEEE Trans. Knowledge and Data Eng., vol. 17, no. 7, pp. 1-15, July 2005.
-
(2005)
IEEE Trans. Knowledge and Data Eng
, vol.17
, Issue.7
, pp. 1-15
-
-
Sion, R.1
Atallah, M.2
Prabhakar, S.3
-
8
-
-
19944413957
-
Fingerprinting Relational Databases: Schemes and Specialties
-
Dependable and Secure Computing, Jan.-Mar
-
Y. Li, V. Swarup, and S. Jajodia, "Fingerprinting Relational Databases: Schemes and Specialties," IEEE Trans. Dependable and Secure Computing, vol. 2, no. 1, 34-45, Jan.-Mar. 2005.
-
(2005)
IEEE Trans
, vol.2
, Issue.1
, pp. 34-45
-
-
Li, Y.1
Swarup, V.2
Jajodia, S.3
-
9
-
-
34248212430
-
A method of protecting relational databases copyright with cloud watermark
-
Y. Zhang, XM. Niu and D.N. Zhao, "A method of protecting relational databases copyright with cloud watermark, Int J. Inform. TechnoL, 1: 206-210, 2004.
-
(2004)
Int J. Inform. TechnoL
, vol.1
, pp. 206-210
-
-
Zhang, Y.1
Niu, X.M.2
Zhao, D.N.3
-
10
-
-
6444231864
-
Watermarking Relational Databases Using Image
-
Aug. 26-29, Shanghai, China
-
Y. Zhang, XM Niu, JM. Wang and D.Y Li, "Watermarking relational databases using image", Proceedings of IEEE Conference on Machine Learning and Cybernetics, Aug. 26-29, Shanghai, China, pp: 1739-1744, 2004.
-
(2004)
Proceedings of IEEE Conference on Machine Learning and Cybernetics
, pp. 1739-1744
-
-
Zhang, Y.1
Niu, J.M.2
Wang, J.M.3
Li, D.Y.4
-
11
-
-
33750225759
-
Rights protection for data cubes
-
J. Guo, Y. Li, R. H. Deng, & K. Chen. "Rights protection for data cubes", Proceedings of Information Security Conference (ISC) (pp. 359-372), 2006
-
(2006)
Proceedings of Information Security Conference (ISC)
, pp. 359-372
-
-
Guo, J.1
Li, Y.2
Deng, R.H.3
Chen, K.4
-
12
-
-
62849120341
-
Robust and Blind Watermarking of Relational Database Systems
-
A. Al-Haj and A. Odeh. "Robust and Blind Watermarking of Relational Database Systems", Journal of Computer Science 4 (12): 1024-1029, 2008
-
(2008)
Journal of Computer Science
, vol.4
, Issue.12
, pp. 1024-1029
-
-
Al-Haj, A.1
Odeh, A.2
-
13
-
-
33645671682
-
Rights protection for discrete numeric streams
-
R. Sion, M. Atallah, S. Prabhakar, "Rights protection for discrete numeric streams", IEEE Transactions on Knowledge and Data Engineering 18 (5) (2006) 699-714.
-
(2006)
IEEE Transactions on Knowledge and Data Engineering
, vol.18
, Issue.5
, pp. 699-714
-
-
Sion, R.1
Atallah, M.2
Prabhakar, S.3
-
14
-
-
50549096535
-
A Multiple-Bits Watermark for Relational Data
-
July-September
-
Y. Li, H. Guo, and S. Wang "A Multiple-Bits Watermark for Relational Data", Journal of Database Management, 19(3), 1-21, July-September 2008.
-
(2008)
Journal of Database Management
, vol.19
, Issue.3
, pp. 1-21
-
-
Li, Y.1
Guo, H.2
Wang, S.3
-
16
-
-
34247371496
-
Publicly Verifiable ownership protection for relational databases
-
Y. Li and R. H. Deng, "Publicly Verifiable ownership protection for relational databases", In ASIACCS, pages 78-89, 2006.
-
(2006)
In ASIACCS
, pp. 78-89
-
-
Li, Y.1
Deng, R.H.2
-
17
-
-
18844420548
-
Tamper Detection and Localization for Categorical Data Using Fragile Watermarks
-
Y. Li, H. Guo, and S. Jajodia, "Tamper Detection and Localization for Categorical Data Using Fragile Watermarks," Proc. Fourth ACM Workshop Digital Rights Management (DRM '04), pp. 73-82, 2004.
-
(2004)
Proc. Fourth ACM Workshop Digital Rights Management (DRM '04)
, pp. 73-82
-
-
Li, Y.1
Guo, H.2
Jajodia, S.3
-
18
-
-
33749679756
-
Chaining watermarks for detecting malicious modifications to streaming data
-
H. Guo, Y. Li, and S. Jajodia. Chaining watermarks for detecting malicious modifications to streaming data", Information Sciences, 177(1), 281-298, 2007
-
(2007)
Information Sciences
, vol.177
, Issue.1
, pp. 281-298
-
-
Guo, H.1
Li, Y.2
Jajodia, S.3
-
19
-
-
33644685216
-
A fragile watermarking scheme for detecting malicious modifications of relational databases
-
H. Guo, Y. Li, A. Liu, and S. Jajodia, "A fragile watermarking scheme for detecting malicious modifications of relational databases", Information Sciences, 176(10), 1350-1378, 2006
-
(2006)
Information Sciences
, vol.176
, Issue.10
, pp. 1350-1378
-
-
Guo, H.1
Li, Y.2
Liu, A.3
Jajodia, S.4
-
20
-
-
70349464986
-
A Scheme for protecting the integrity of databases
-
I. Kamel, "A Scheme for protecting the integrity of databases", Computers & Security; 28(6):698-709, 2009.
-
(2009)
Computers & Security
, vol.28
, Issue.6
, pp. 698-709
-
-
Kamel, I.1
-
21
-
-
41249101181
-
Zero-watermark Watermarking for Image Authentication
-
in Kauai, Hawaii, USA
-
T. Sun, W. Quan, and S.-X. Wang, "Zero-watermark watermarking for image authentication," in Proceedings of the Signal and Image Processing, pp. 503-508, Kauai, Hawaii, USA, 2002.
-
(2002)
Proceedings of the Signal and Image Processing
, pp. 503-508
-
-
Sun, T.1
Quan, W.2
Wang, S.-X.3
-
22
-
-
0038750640
-
Concept and application of zero-watermark
-
Q. Wen, T.-F. Sun, and S.-X. Wang, "Concept and application of zero-watermark," Tien Tzu Hsueh Pao/Acta Electronica Sinica, vol. 31, no. 2, pp. 214-216, 2003.
-
(2003)
Tien Tzu Hsueh Pao/Acta Electronica Sinica
, vol.31
, Issue.2
, pp. 214-216
-
-
Wen, Q.1
Sun, T.-F.2
Wang, S.-X.3
-
23
-
-
78651580594
-
An Image Authentication Scheme Based on Correlation
-
D. Zhang, S. Liang, Z. Pan, H. Li, X. Liu, "An Image Authentication Scheme Based on Correlation", JDCTA, Vol. 4, No. 2, pp. 89-94, 2010.
-
(2010)
JDCTA
, vol.4
, Issue.2
, pp. 89-94
-
-
Zhang, D.1
Liang, S.2
Pan, Z.3
Li, H.4
Liu, X.5
-
24
-
-
79958036521
-
Bit Replacement Audio Watermarking Using Stereo Signals
-
S. Meng, W. Cao, Y. Yan, S. Li, "Bit Replacement Audio Watermarking Using Stereo Signals", AISS, Vol. 2, No. 3, pp. 18-24, 2010.
-
(2010)
AISS
, vol.2
, Issue.3
, pp. 18-24
-
-
Meng, S.1
Cao, W.2
Yan, Y.3
Li, S.4
-
25
-
-
78651574985
-
Secure Multimedia Distribution Based on Watermarking and Encryption
-
H. Li, G. Liu, Yuewei Dai, and Z. Wang, "Secure Multimedia Distribution Based on Watermarking and Encryption", JCIT, Vol. 5, No. 9, pp. 279-286, 2010.
-
(2010)
JCIT
, vol.5
, Issue.9
, pp. 279-286
-
-
Li, H.1
Liu, G.2
Dai, Y.3
Wang, Z.4
|