메뉴 건너뛰기




Volumn 5, Issue 5, 2011, Pages 189-200

A fragile zero-watermarking technique for authentication of relational databases

Author keywords

Content integrity; Relational databases; Tamper detection; Zero watermarking

Indexed keywords

CATEGORICAL ATTRIBUTES; CONTENT INTEGRITY; DATA MODIFICATION; DATABASE RELATIONS; DATABASE WATERMARKING; HIGH PROBABILITY; NOVEL METHODS; RELATIONAL DATABASE; RESEARCH FIELDS; SECURITY ANALYSIS; TAMPER DETECTION; WATERMARK INSERTION; WATERMARKING TECHNIQUES; ZERO-WATERMARKING;

EID: 79958076689     PISSN: 19759339     EISSN: None     Source Type: Journal    
DOI: 10.4156/jdcta.vol5.issue5.21     Document Type: Article
Times cited : (25)

References (25)
  • 2
    • 0041513205 scopus 로고    scopus 로고
    • Watermarking Relational Data: Framework, Algorithms and Analysis
    • R. Agrawal, P.J. Haas, and J. Kiernan, "Watermarking Relational Data: Framework, Algorithms and Analysis," The VLDB J., vol. 12, no. 2, pp. 157-169, 2003.
    • (2003) The VLDB J , vol.12 , Issue.2 , pp. 157-169
    • Agrawal, R.1    Haas, P.J.2    Kiernan, J.3
  • 3
    • 1142299757 scopus 로고    scopus 로고
    • Query-Preserving Watermarking of Relational Databases and XML Documents
    • Principles of Database Systems (PODS)
    • D. Gross-Amblard, Query-Preserving Watermarking of Relational Databases and XML Documents", Proc. ACM Symp. Principles of Database Systems (PODS), pp. 191-201, 2003.
    • (2003) Proc. ACM Symp , pp. 191-201
    • Gross-Amblard, D.1
  • 8
    • 19944413957 scopus 로고    scopus 로고
    • Fingerprinting Relational Databases: Schemes and Specialties
    • Dependable and Secure Computing, Jan.-Mar
    • Y. Li, V. Swarup, and S. Jajodia, "Fingerprinting Relational Databases: Schemes and Specialties," IEEE Trans. Dependable and Secure Computing, vol. 2, no. 1, 34-45, Jan.-Mar. 2005.
    • (2005) IEEE Trans , vol.2 , Issue.1 , pp. 34-45
    • Li, Y.1    Swarup, V.2    Jajodia, S.3
  • 9
    • 34248212430 scopus 로고    scopus 로고
    • A method of protecting relational databases copyright with cloud watermark
    • Y. Zhang, XM. Niu and D.N. Zhao, "A method of protecting relational databases copyright with cloud watermark, Int J. Inform. TechnoL, 1: 206-210, 2004.
    • (2004) Int J. Inform. TechnoL , vol.1 , pp. 206-210
    • Zhang, Y.1    Niu, X.M.2    Zhao, D.N.3
  • 12
    • 62849120341 scopus 로고    scopus 로고
    • Robust and Blind Watermarking of Relational Database Systems
    • A. Al-Haj and A. Odeh. "Robust and Blind Watermarking of Relational Database Systems", Journal of Computer Science 4 (12): 1024-1029, 2008
    • (2008) Journal of Computer Science , vol.4 , Issue.12 , pp. 1024-1029
    • Al-Haj, A.1    Odeh, A.2
  • 14
    • 50549096535 scopus 로고    scopus 로고
    • A Multiple-Bits Watermark for Relational Data
    • July-September
    • Y. Li, H. Guo, and S. Wang "A Multiple-Bits Watermark for Relational Data", Journal of Database Management, 19(3), 1-21, July-September 2008.
    • (2008) Journal of Database Management , vol.19 , Issue.3 , pp. 1-21
    • Li, Y.1    Guo, H.2    Wang, S.3
  • 16
    • 34247371496 scopus 로고    scopus 로고
    • Publicly Verifiable ownership protection for relational databases
    • Y. Li and R. H. Deng, "Publicly Verifiable ownership protection for relational databases", In ASIACCS, pages 78-89, 2006.
    • (2006) In ASIACCS , pp. 78-89
    • Li, Y.1    Deng, R.H.2
  • 18
    • 33749679756 scopus 로고    scopus 로고
    • Chaining watermarks for detecting malicious modifications to streaming data
    • H. Guo, Y. Li, and S. Jajodia. Chaining watermarks for detecting malicious modifications to streaming data", Information Sciences, 177(1), 281-298, 2007
    • (2007) Information Sciences , vol.177 , Issue.1 , pp. 281-298
    • Guo, H.1    Li, Y.2    Jajodia, S.3
  • 19
    • 33644685216 scopus 로고    scopus 로고
    • A fragile watermarking scheme for detecting malicious modifications of relational databases
    • H. Guo, Y. Li, A. Liu, and S. Jajodia, "A fragile watermarking scheme for detecting malicious modifications of relational databases", Information Sciences, 176(10), 1350-1378, 2006
    • (2006) Information Sciences , vol.176 , Issue.10 , pp. 1350-1378
    • Guo, H.1    Li, Y.2    Liu, A.3    Jajodia, S.4
  • 20
    • 70349464986 scopus 로고    scopus 로고
    • A Scheme for protecting the integrity of databases
    • I. Kamel, "A Scheme for protecting the integrity of databases", Computers & Security; 28(6):698-709, 2009.
    • (2009) Computers & Security , vol.28 , Issue.6 , pp. 698-709
    • Kamel, I.1
  • 21
  • 23
    • 78651580594 scopus 로고    scopus 로고
    • An Image Authentication Scheme Based on Correlation
    • D. Zhang, S. Liang, Z. Pan, H. Li, X. Liu, "An Image Authentication Scheme Based on Correlation", JDCTA, Vol. 4, No. 2, pp. 89-94, 2010.
    • (2010) JDCTA , vol.4 , Issue.2 , pp. 89-94
    • Zhang, D.1    Liang, S.2    Pan, Z.3    Li, H.4    Liu, X.5
  • 24
    • 79958036521 scopus 로고    scopus 로고
    • Bit Replacement Audio Watermarking Using Stereo Signals
    • S. Meng, W. Cao, Y. Yan, S. Li, "Bit Replacement Audio Watermarking Using Stereo Signals", AISS, Vol. 2, No. 3, pp. 18-24, 2010.
    • (2010) AISS , vol.2 , Issue.3 , pp. 18-24
    • Meng, S.1    Cao, W.2    Yan, Y.3    Li, S.4
  • 25
    • 78651574985 scopus 로고    scopus 로고
    • Secure Multimedia Distribution Based on Watermarking and Encryption
    • H. Li, G. Liu, Yuewei Dai, and Z. Wang, "Secure Multimedia Distribution Based on Watermarking and Encryption", JCIT, Vol. 5, No. 9, pp. 279-286, 2010.
    • (2010) JCIT , vol.5 , Issue.9 , pp. 279-286
    • Li, H.1    Liu, G.2    Dai, Y.3    Wang, Z.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.