메뉴 건너뛰기




Volumn 25, Issue 12, 2013, Pages 2694-2707

A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints

Author keywords

Data quality; Data usability constraints; Database watermarking; Distortion free; Ownership protection; Right protection; Robust watermarking

Indexed keywords

DATA QUALITY; DATA USABILITY; DATABASE WATERMARKING; DISTORTION-FREE; OWNERSHIP PROTECTION; RIGHT PROTECTION; ROBUST WATERMARKING;

EID: 84887963611     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2012.227     Document Type: Article
Times cited : (51)

References (20)
  • 1
    • 0041513205 scopus 로고    scopus 로고
    • Watermarking relational data: Framework, algorithms and analysis
    • DOI 10.1007/s00778-003-0097-x
    • R. Agrawal, P. Haas, and J. Kiernan, "Watermarking Relational Data: Framework, Algorithms and Analysis," The VLDB J., vol. 12, no. 2, pp. 157-169, 2003. (Pubitemid 37017926)
    • (2003) VLDB Journal , vol.12 , Issue.2 , pp. 157-169
    • Agrawal, R.1    Haas, P.J.2    Kiernan, J.3
  • 2
    • 36649016018 scopus 로고    scopus 로고
    • Watermarking relational databases using optimization-based techniques
    • Jan
    • M. Shehab, E. Bertino, and A. Ghafoor, "Watermarking Relational Databases Using Optimization-Based Techniques," IEEE Trans. Knowledge and Data Eng., vol. 20, no. 1, pp. 116-129, Jan. 2008.
    • (2008) IEEE Trans. Knowledge and Data Eng. , vol.20 , Issue.1 , pp. 116-129
    • Shehab, M.1    Bertino, E.2    Ghafoor, A.3
  • 4
    • 33644685216 scopus 로고    scopus 로고
    • A fragile watermarking scheme for detecting malicious modifications of database relations
    • DOI 10.1016/j.ins.2005.06.003, PII S0020025505001854
    • H. Guo, Y. Li, A. Liu, and S. Jajodia, "A Fragile Watermarking Scheme for Detecting Malicious Modifications of Database Relations," Information Sciences, vol. 176, no. 10, pp. 1350-1378, 2006. (Pubitemid 43332895)
    • (2006) Information Sciences , vol.176 , Issue.10 , pp. 1350-1378
    • Guo, H.1    Li, Y.2    Liu, A.3    Jajodia, S.4
  • 5
    • 35248861089 scopus 로고    scopus 로고
    • An additive-attack-proof watermarking mechanism for databases' copyrights protection using image
    • DOI 10.1145/1244002.1244066, Proceedings of the 2007 ACM Symposium on Applied Computing
    • X. Zhou, M. Huang, and Z. Peng, "An Additive-Attack-Proof Watermarking Mechanism for Databases' Copyrights Protection Using Image," Proc. ACM Symp. Applied Computing, pp. 254-258, 2007. (Pubitemid 47568295)
    • (2007) Proceedings of the ACM Symposium on Applied Computing , pp. 254-258
    • Zhou, X.1    Huang, M.2    Peng, Z.3
  • 9
    • 71549148060 scopus 로고    scopus 로고
    • Database relation watermarking resilient against secondary watermarking attacks
    • G. Gupta and J. Pieprzyk, "Database Relation Watermarking Resilient against Secondary Watermarking Attacks," Proc. Int'l Conf. Information Systems Security, pp. 222-236, 2009.
    • (2009) Proc. Int'l Conf. Information Systems Security , pp. 222-236
    • Gupta, G.1    Pieprzyk, J.2
  • 13
    • 80255123293 scopus 로고    scopus 로고
    • A blind reversible method for watermarking relational databases based on a time-stamping protocol
    • S. Horng et al., "A Blind Reversible Method for Watermarking Relational Databases Based on a Time-Stamping Protocol," Expert Systems with Applications, vol. 39, no. 3, pp. 3185-3196, 2011.
    • (2011) Expert Systems with Applications , vol.39 , Issue.3 , pp. 3185-3196
    • Horng, S.1
  • 18
    • 79951800937 scopus 로고    scopus 로고
    • Watermarking techniques for relational databases: Survey, classification and comparison
    • R. Halder, S. Pal, and A. Cortesi, "Watermarking Techniques for Relational Databases: Survey, Classification and Comparison," J. Universal Computer Science, vol. 16, no. 21, pp. 3164-3190, 2010.
    • (2010) J. Universal Computer Science , vol.16 , Issue.21 , pp. 3164-3190
    • Halder, R.1    Pal, S.2    Cortesi, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.