Publisher
Springer International Publishing
Reference10 articles.
1. Tsai, P., Hu, Y., Yeh, H.: Reversible image hiding scheme using predictive coding and histogram shifting. Sig. Process. 89(6), 1129–1143 (2009)
2. Voyatzis, G., Piatas, I.: The use of watermarks in the protection of digital multimedia products. Proc. IEEE 87(7), 1197–1207 (1999)
3. Zhang, M.: Current status and prospects of database security research. Proc. Chin. Acad. Sci. 26(3), 303–309 (2011)
4. Feng, D.G., Zhang, M., Li, W.: Big data security and privacy protection. Chin. J. Comput. 37(1), 246–258 (2014)
5. Mehta, B.B., Aswar, H.D.: Watermarking for security in database: a review. In: IT in Business, Industry and Government, Indore, India, pp. 1–6. IEEE (2014)