-
1
-
-
0041513205
-
Watermarking relational data: Framework, algorithms and analysis
-
DOI 10.1007/s00778-003-0097-x
-
R. Agrawal, P. Haas, and J. Kiernan, "Watermarking Relational Data: Framework, Algorithms and Analysis," The VLDB J., vol. 12, no. 2, pp. 157-169, 2003. (Pubitemid 37017926)
-
(2003)
VLDB Journal
, vol.12
, Issue.2
, pp. 157-169
-
-
Agrawal, R.1
Haas, P.J.2
Kiernan, J.3
-
2
-
-
36649016018
-
Watermarking relational databases using optimization-based techniques
-
Jan
-
M. Shehab, E. Bertino, and A. Ghafoor, "Watermarking Relational Databases Using Optimization-Based Techniques," IEEE Trans. Knowledge and Data Eng., vol. 20, no. 1, pp. 116-129, Jan. 2008.
-
(2008)
IEEE Trans. Knowledge and Data Eng.
, vol.20
, Issue.1
, pp. 116-129
-
-
Shehab, M.1
Bertino, E.2
Ghafoor, A.3
-
4
-
-
33644685216
-
A fragile watermarking scheme for detecting malicious modifications of database relations
-
DOI 10.1016/j.ins.2005.06.003, PII S0020025505001854
-
H. Guo, Y. Li, A. Liu, and S. Jajodia, "A Fragile Watermarking Scheme for Detecting Malicious Modifications of Database Relations," Information Sciences, vol. 176, no. 10, pp. 1350-1378, 2006. (Pubitemid 43332895)
-
(2006)
Information Sciences
, vol.176
, Issue.10
, pp. 1350-1378
-
-
Guo, H.1
Li, Y.2
Liu, A.3
Jajodia, S.4
-
5
-
-
35248861089
-
An additive-attack-proof watermarking mechanism for databases' copyrights protection using image
-
DOI 10.1145/1244002.1244066, Proceedings of the 2007 ACM Symposium on Applied Computing
-
X. Zhou, M. Huang, and Z. Peng, "An Additive-Attack-Proof Watermarking Mechanism for Databases' Copyrights Protection Using Image," Proc. ACM Symp. Applied Computing, pp. 254-258, 2007. (Pubitemid 47568295)
-
(2007)
Proceedings of the ACM Symposium on Applied Computing
, pp. 254-258
-
-
Zhou, X.1
Huang, M.2
Peng, Z.3
-
6
-
-
54249151349
-
Watermarking relational data based on adaptive mechanism
-
Y. Wang, Z. Zhu, F. Liang, and G. Jiang, "Watermarking Relational Data Based on Adaptive Mechanism," Proc. Int'l Conf. Information and Automation (ICIA '08), pp. 131-134, 2008.
-
(2008)
Proc. Int'l Conf. Information and Automation (ICIA '08)
, pp. 131-134
-
-
Wang, Y.1
Zhu, Z.2
Liang, F.3
Jiang, G.4
-
7
-
-
84863234873
-
Reversible and blind database watermarking using difference expansion
-
G. Gupta and J. Pieprzyk, "Reversible and Blind Database Watermarking Using Difference Expansion," Proc. First Int'l Conf. Forensic Applications and Techniques in Telecomm., Information, and Multimedia and Workshop, pp. 24-29, 2008.
-
(2008)
Proc. First Int'l Conf. Forensic Applications and Techniques in Telecomm., Information, and Multimedia and Workshop
, pp. 24-29
-
-
Gupta, G.1
Pieprzyk, J.2
-
8
-
-
54049123750
-
A public key cryptography based algorithm for watermarking relational databases
-
H. Cui, X. Cui, and M. Meng, "A Public Key Cryptography Based Algorithm for Watermarking Relational Databases," Proc. Int'l Conf. Intelligent Information Hiding and Multimedia Signal Processing, pp. 1344-1347, 2008.
-
(2008)
Proc. Int'l Conf. Intelligent Information Hiding and Multimedia Signal Processing
, pp. 1344-1347
-
-
Cui, H.1
Cui, X.2
Meng, M.3
-
9
-
-
71549148060
-
Database relation watermarking resilient against secondary watermarking attacks
-
G. Gupta and J. Pieprzyk, "Database Relation Watermarking Resilient against Secondary Watermarking Attacks," Proc. Int'l Conf. Information Systems Security, pp. 222-236, 2009.
-
(2009)
Proc. Int'l Conf. Information Systems Security
, pp. 222-236
-
-
Gupta, G.1
Pieprzyk, J.2
-
10
-
-
10944220833
-
Rights protection for relational data
-
DOI 10.1109/TKDE.2004.94
-
R. Sion, M. Atallah, and S. Prabhakar, "Rights Protection for Relational Data," IEEE Trans. Knowledge and Data Eng., vol. 16, no. 6, pp. 1509-1525, Dec. 2004. (Pubitemid 40010925)
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.12
, pp. 1509-1525
-
-
Sion, R.1
Atallah, M.2
Prabhakar, S.3
-
13
-
-
80255123293
-
A blind reversible method for watermarking relational databases based on a time-stamping protocol
-
S. Horng et al., "A Blind Reversible Method for Watermarking Relational Databases Based on a Time-Stamping Protocol," Expert Systems with Applications, vol. 39, no. 3, pp. 3185-3196, 2011.
-
(2011)
Expert Systems with Applications
, vol.39
, Issue.3
, pp. 3185-3196
-
-
Horng, S.1
-
14
-
-
34247371496
-
Publicly verifiable ownership protection for relational databases
-
DOI 10.1145/1128817.1128832, Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
-
Y. Li and R. Deng, "Publicly Verifiable Ownership Protection for Relational Databases," Proc. ACM Symp. Information, Computer and Comm. Security, pp. 78-89, 2006. (Pubitemid 46644728)
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06
, vol.2006
, pp. 78-89
-
-
Li, Y.1
Deng, R.H.2
-
16
-
-
80053417330
-
Query preserving relational database watermarking
-
S. Shah, S. Xingming, H. Ali, and M. Abdul, "Query Preserving Relational Database Watermarking," Informatica, An Int'l J. Computing and Informatics, vol. 35, no. 3, pp. 391-396, 2011.
-
(2011)
Informatica, An Int'l J. Computing and Informatics
, vol.35
, Issue.3
, pp. 391-396
-
-
Shah, S.1
Xingming, S.2
Ali, H.3
Abdul, M.4
-
18
-
-
79951800937
-
Watermarking techniques for relational databases: Survey, classification and comparison
-
R. Halder, S. Pal, and A. Cortesi, "Watermarking Techniques for Relational Databases: Survey, Classification and Comparison," J. Universal Computer Science, vol. 16, no. 21, pp. 3164-3190, 2010.
-
(2010)
J. Universal Computer Science
, vol.16
, Issue.21
, pp. 3164-3190
-
-
Halder, R.1
Pal, S.2
Cortesi, A.3
|