메뉴 건너뛰기




Volumn 39, Issue 3, 2012, Pages 3185-3196

A blind reversible method for watermarking relational databases based on a time-stamping protocol

Author keywords

Blindness; Copyrights; Cryptography; Database attacks; Digital watermarking; Relational database; Reversible; Robustness

Indexed keywords

AUTHENTICATION PROTOCOLS; BLINDNESS; DATABASE APPLICATIONS; DATABASE ATTACKS; DATABASE RELATIONS; DIGITAL ASSETS; EFFECTIVE SOLUTION; INVERTIBLE WATERMARKS; MEDICAL DATA; PERMANENT DISTORTION; RELATIONAL DATABASE; REVERSIBLE; REVERSIBLE WATERMARK; REVERSIBLE WATERMARKING; TIME-STAMP; TIME-STAMPING PROTOCOL; WATERMARKING RELATIONAL DATABASE;

EID: 80255123293     PISSN: 09574174     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.eswa.2011.09.005     Document Type: Article
Times cited : (66)

References (30)
  • 2
    • 3843102623 scopus 로고    scopus 로고
    • Reversible watermark using the difference expansion of a generalized integer transform
    • A.M. Alattar Reversible watermark using the difference expansion of a generalized integer transform IEEE Transactions on Image Processing 13 8 2004 1147 1156
    • (2004) IEEE Transactions on Image Processing , vol.13 , Issue.8 , pp. 1147-1156
    • Alattar, A.M.1
  • 3
    • 0034509394 scopus 로고    scopus 로고
    • Audio watermarking: Features, applications and algorithms
    • Arnold, M. (2000). Audio watermarking: Features, applications and algorithms. In Proceedings of the 5th IEEE international conference on computer and multimedia and expo (pp. 1013-1016). (Pubitemid 33059112)
    • (2000) IEEE International Conference on Multi-Media and Expo , pp. 1013-1016
    • Arnold, M.1
  • 5
    • 0032637701 scopus 로고    scopus 로고
    • Copyright protection for the electronic distribution of text
    • J.T. Brassil, S. Low, and N.F. Maxemchuk Copyright protection for the electronic distribution of text Proceedings of the IEEE 87 7 1999 1181 1196
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7 , pp. 1181-1196
    • Brassil, J.T.1    Low, S.2    Maxemchuk, N.F.3
  • 7
    • 80255141354 scopus 로고    scopus 로고
    • Cryptanalysis of Hwang-Chang's a time-stamp protocol for digital watermarking
    • (001-050), Issue, 2007-01-01
    • Chou, J.; Chen, Y.; & Chan, C. (2007). Cryptanalysis of Hwang-Chang's a time-stamp protocol for digital watermarking. < http://eprint.iacr.org/ 2007/004 > Cryptology ePrint Archive Vol. 2007(001-050), Issue, 2007-01-01.
    • (2007) Cryptology EPrint Archive 2007
    • Chou, J.1    Chen, Y.2    Chan, C.3
  • 8
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proofing, and obfuscation: Tools for software protection
    • C.S. Collberg, and C. Thomborson Watermarking, tamper-proofing, and obfuscation: Tools for software protection IEEE Transactions on Software Engineering 28 8 2002 735 746
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.8 , pp. 735-746
    • Collberg, C.S.1    Thomborson, C.2
  • 11
    • 0032074580 scopus 로고    scopus 로고
    • Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications
    • PII S0733871698011056
    • S. Craver, N. Memon, B.L. Yeo, and M.M. Yeung Resolving rightful ownerships with invisible watermarking techniques: Limitations, attacks, and implications IEEE Journal of Selected Areas in Communications 16 4 1998 573 586 (Pubitemid 128564975)
    • (1998) IEEE Journal on Selected Areas in Communications , vol.16 , Issue.4 , pp. 573-586
    • Craver, S.1    Memon, N.2    Yeo, B.-L.3    Yeung, M.M.4
  • 12
    • 84863234873 scopus 로고    scopus 로고
    • Reversible and blind database watermarking using difference expansion
    • January 2008
    • Gupta, G.; & Pieprzyk, J. (2008). Reversible and blind database watermarking using difference expansion. In Proceedings of the eForensics, January 2008 (pp. 1-6).
    • (2008) Proceedings of the EForensics , pp. 1-6
    • Gupta, G.1    Pieprzyk, J.2
  • 13
    • 0032072064 scopus 로고    scopus 로고
    • Watermarking of uncompressed and compressed video
    • PII S0165168497000115
    • F. Hartung, and B. Girod Watermarking of uncompressed and compressed video Signal Processing 66 3 1998 283 301 (Pubitemid 128430590)
    • (1998) Signal Processing , vol.66 , Issue.3 , pp. 283-301
    • Hartung, F.1    Girod, B.2
  • 14
    • 0003308762 scopus 로고    scopus 로고
    • Internet x.509 public key infrastructure certificate and crl profile
    • January 1999
    • Housley, R.; Ford, W.; Polk, W.; & Solo, D. (1999). Internet x.509 public key infrastructure certificate and crl profile. RFC 2459. January 1999.
    • (1999) RFC , vol.2459
    • Housley, R.1    Ford, W.2    Polk, W.3    Solo, D.4
  • 18
    • 18844420548 scopus 로고    scopus 로고
    • Tamper detection and localization for categorical data using fragile watermarks
    • DRM 2004: Proceedings of the Fourth ACM Workshop on Digital Rights Management
    • Li, Y.; Guo, H.; & Jajodia, S. (2004). Tamper detection and localization for categorical data using fragile watermarks. In Proceedings of the 4th ACM workshop on digital rights management DRM'04 (pp. 73-82). (Pubitemid 40681761)
    • (2004) DRM 2004: Proceedings of the Fourth ACM Workshop on Digital Rights Management , pp. 73-82
    • Li, Y.1    Guo, H.2    Jajodia, S.3
  • 19
    • 50549096535 scopus 로고    scopus 로고
    • A multiple-bits watermark for relational data
    • Y. Li, H. Guo, and S. Wang A multiple-bits watermark for relational data Journal of Database Management 19 3 2008 1 21
    • (2008) Journal of Database Management , vol.19 , Issue.3 , pp. 1-21
    • Li, Y.1    Guo, H.2    Wang, S.3
  • 20
    • 0032680807 scopus 로고    scopus 로고
    • Information hiding - A survey
    • special issue on protection of multimedia content
    • F.A.P. Petitcolas, R.J. Anderson, and M.G. Kuhn Information hiding - A survey Proceedings of the IEEE 87 7 1999 1062 1078 special issue on protection of multimedia content
    • (1999) Proceedings of the IEEE , vol.87 , Issue.7 , pp. 1062-1078
    • Petitcolas, F.A.P.1    Anderson, R.J.2    Kuhn, M.G.3
  • 30
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • DOI 10.1109/83.951543, PII S1057714901082094
    • P.W. Wong, and N. Memon Secret and public key image watermarking schemes for image authentication and ownership verification IEEE Transactions on Image Processing 10 2001 1593 1601 (Pubitemid 32981831)
    • (2001) IEEE Transactions on Image Processing , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.