-
1
-
-
62849120341
-
Robust and blind watermarking of relational database systems
-
Al-Haj, A., & Odeh, A. (2008). Robust and blind watermarking of relational database systems. Journal of Computer Science, 4(12), 1024-1029.
-
(2008)
Journal of Computer Science
, vol.4
, Issue.12
, pp. 1024-1029
-
-
Al-Haj, A.1
Odeh, A.2
-
2
-
-
0345528997
-
Collusion-resilient fingerprinting using random prewarping
-
IEEE
-
Celik, M., Sharma, G., & Tekalp, A. (2003). Collusion-resilient fingerprinting using random prewarping. Proceedings of the International Conference on Image processing, ICIP 2003. vol. 1, pp. 1-509, IEEE.
-
(2003)
Proceedings of the International Conference on Image processing, ICIP 2003.
, vol.1
, pp. 1-509
-
-
Celik, M.1
Sharma, G.2
Tekalp, A.3
-
3
-
-
0000072558
-
Finding a needle in a haystack - Or identifying anonymous census record
-
Dalenius, T. (1986). Finding a needle in a haystack - or identifying anonymous census record. Journal of Official Statistics, 2(3), 329-336.
-
(1986)
Journal of Official Statistics
, vol.2
, Issue.3
, pp. 329-336
-
-
Dalenius, T.1
-
4
-
-
0000676728
-
Combining digital watermarks and collusion secure fingerprints for digital images
-
Dittmann, J., Schmitt, P., Saar, E., Ueberberg, J., & Schwenk, J. (2000). Combining digital watermarks and collusion secure fingerprints for digital images. Journal of Electronic Imaging, 9(4), 456-467.
-
(2000)
Journal of Electronic Imaging
, vol.9
, Issue.4
, pp. 456-467
-
-
Dittmann, J.1
Schmitt, P.2
Saar, E.3
Ueberberg, J.4
Schwenk, J.5
-
5
-
-
69549114557
-
A globally optimal k-anonymity method for the deidentification of health data
-
El Emam, K., Dankar, F., Issa, R., Jonker, E., Amyot, D., Cogo, E., et al. (2009). A globally optimal k-anonymity method for the deidentification of health data. Journal of the American Medical Informatics Association, 16(5), 670-682.
-
(2009)
Journal of the American Medical Informatics Association
, vol.16
, Issue.5
, pp. 670-682
-
-
El Emam, K.1
Dankar, F.2
Issa, R.3
Jonker, E.4
Amyot, D.5
Cogo, E.6
-
6
-
-
21544459548
-
Digital image watermarking: An overview
-
Fotopoulos, V., & Skodras, A. (2003). Digital image watermarking: an overview. EURASIP Newsletter, 14(4).
-
(2003)
EURASIP Newsletter
, vol.14
, pp. 4
-
-
Fotopoulos, V.1
Skodras, A.2
-
8
-
-
0032634857
-
Multimedia watermarking techniques
-
Hartung, F., & Kutter, M. (1999). Multimedia watermarking techniques. Proceedings of the IEEE, 87(7), 1079-1107.
-
(1999)
Proceedings of the IEEE
, vol.87
, Issue.7
, pp. 1079-1107
-
-
Hartung, F.1
Kutter, M.2
-
10
-
-
0034266804
-
Watermarking digital image and video data. A state-of-the-art overview
-
Langelaar, G., Setyawan, I., & Lagendijk, R. (2000). Watermarking digital image and video data. A state-of-the-art overview. IEEE Signal Processing Magazine, 17(5), 20-46.
-
(2000)
IEEE Signal Processing Magazine
, vol.17
, Issue.5
, pp. 20-46
-
-
Langelaar, G.1
Setyawan, I.2
Lagendijk, R.3
-
11
-
-
33646824201
-
Overview of digital audio watermarking
-
Li,W., Yuan, Y., Li, X., Xue, X.,& Lu, P. (2005). Overview of digital audio watermarking. Tongxin Xuebao (Journal on Communications), 26(2), 100-111.
-
(2005)
Tongxin Xuebao (Journal on Communications
, vol.26
, Issue.2
, pp. 100-111
-
-
Li, W.1
Yuan, Y.2
Li, X.3
Xue, X.4
Lu, P.5
-
12
-
-
24944541395
-
A block oriented fingerprinting scheme in relational database
-
Information Security and Cryptology - ICISC 2004: 7th International Conference, Revised Selected Papers
-
Liu, S., Wang, S., Deng, R., & Shao, W. (2005). A block oriented fingerprinting scheme in relational database. Information Security and Cryptologyy-ICISC 2004 (pp. 455-466). Berlin Heidelberg: Springer. (Pubitemid 41322374)
-
(2005)
Lecture Notes in Computer Science
, vol.3506
, pp. 455-466
-
-
Liu, S.1
Wang, S.2
Deng, R.H.3
Shao, W.4
-
13
-
-
34248181923
-
L-diversity: Privacy beyond k-anonymity
-
Machanavajjhala, A., Kifer, D., Gehrke, J., & Venkitasubramaniam, M. (2007). l-diversity: privacy beyond k-anonymity. ACMTransactions on Knowledge Discovery from Data, 1, 3.
-
(2007)
ACMTransactions on Knowledge Discovery from Data
, vol.1
, pp. 3
-
-
Machanavajjhala, A.1
Kifer, D.2
Gehrke, J.3
Venkitasubramaniam, M.4
-
14
-
-
0035517699
-
Protecting respondents' identities in microdata release
-
DOI 10.1109/69.971193
-
Samarati, P. (2001). Protecting respondents' identities in microdata release. IEEE Transactions on Knowledge and Data Engineering, 13, 1010-1027. (Pubitemid 34035590)
-
(2001)
IEEE Transactions on Knowledge and Data Engineering
, vol.13
, Issue.6
, pp. 1010-1027
-
-
Samarati, P.1
-
15
-
-
84904508236
-
Using generalization patterns for fingerprinting sets of partially anonymized microdata in the course of disasters
-
Schrittwieser S., Kieseberg P., Echizen I.,Wohlgemuth S.,& Sonehara N. (2011a). Using generalization patterns for fingerprinting sets of partially anonymized microdata in the course of disasters, RISI 2011.
-
(2011)
RISI
, vol.2011
-
-
Schrittwieser, S.1
Kieseberg, P.2
Echizen, I.3
Wohlgemuth, S.4
Sonehara, N.5
-
16
-
-
84867066968
-
An algorithm for k-anonymity-based fingerprinting
-
Schrittwieser S., Kieseberg P., Echizen I., Wohlgemuth S., Sonehara N., & Weippl E. (2011b). An Algorithm for k-anonymity-based Fingerprinting, IWDW 2011.
-
(2011)
IWDW
, vol.2011
-
-
Schrittwieser, S.1
Kieseberg, P.2
Echizen, I.3
Wohlgemuth, S.4
Sonehara, N.5
Weippl, E.6
-
17
-
-
33646798431
-
Audio fingerprinting based on normalized spectral subband centroids
-
Seo, J., Jin, M., Lee, S., Jang, D., Lee, S., & Yoo, C. (2005). Audio fingerprinting based on normalized spectral subband centroids. International Conference on Acoustics, Speech, and Signal Processing, 3, 213-216.
-
(2005)
International Conference on Acoustics, Speech, and Signal Processing
, vol.3
, pp. 213-216
-
-
Seo, J.1
Jin, M.2
Lee, S.3
Jang, D.4
Lee, S.5
Yoo, C.6
-
19
-
-
0036031232
-
A novel approach to collusion-resistant video watermarking
-
Su, K., Kundur, D., & Hatzinakos, D. (2002). A novel approach to collusion-resistant video watermarking. Proceedings of SPIE (4675).
-
(2002)
Proceedings of SPIE
, Issue.4675
-
-
Su, K.1
Kundur, D.2
Hatzinakos, D.3
-
20
-
-
13144275283
-
Statistical invisibility for collusion-resistant digital video watermarking
-
DOI 10.1109/TMM.2004.840617
-
Su, K., Kundur, D., & Hatzinakos, D. (2005). Statistical invisibility for collusion-resistant digital video watermarking. IEEE Transactions on Multimedia, 7(1), 43-51. (Pubitemid 40178368)
-
(2005)
IEEE Transactions on Multimedia
, vol.7
, Issue.1
, pp. 43-51
-
-
Su, K.1
Kundur, D.2
Hatzinakos, D.3
-
21
-
-
0036811143
-
Achieving k-anonymity privacy protection using generalization and suppression
-
DOI 10.1142/S021848850200165X
-
Sweeney, L. (2002a). Achieving k-anonymity privacy protection using generalization and suppression. International Journal ofUncertainty Fuzziness and Knowledge-Based Systems, 10(5), 571-588. (Pubitemid 35384858)
-
(2002)
International Journal of Uncertainty, Fuzziness and Knowlege-Based Systems
, vol.10
, Issue.5
, pp. 571-588
-
-
Sweeney, L.1
-
24
-
-
0038527384
-
Anti-collusion fingerprinting for multimedia
-
Trappe, W., Wu, M., Wang, Z., & Liu, K. (2003). Anti-collusion fingerprinting for multimedia. IEEE Transactions on Signal Processing, 51(4), 1069-1087.
-
(2003)
IEEE Transactions on Signal Processing
, vol.51
, Issue.4
, pp. 1069-1087
-
-
Trappe, W.1
Wu, M.2
Wang, Z.3
Liu, K.4
-
27
-
-
85032751604
-
Collusion-resistant fingerprinting for multimedia
-
Wu, M., Trappe, W., Wang, Z., & Liu, K. (2004). Collusion-resistant fingerprinting for multimedia. IEEE Signal Processing Magazine, 21(2), 28-39.
-
(2004)
IEEE Signal Processing Magazine
, vol.21
, Issue.2
, pp. 28-39
-
-
Wu, M.1
Trappe, W.2
Wang, Z.3
Liu, K.4
-
28
-
-
6444231864
-
Watermarking relational database using image
-
Zhang, Z., Jin, X., Wang, J., & Li, D. (2004). Watermarking relational database using image. International Conference on Machine Learning and Cybernetics, 3, 1739-1744.
-
(2004)
International Conference on Machine Learning and Cybernetics
, vol.3
, pp. 1739-1744
-
-
Zhang, Z.1
Jin, X.2
Wang, J.3
Li, D.4
|