Author:
Yuan Shuguang,Yu Jing,Shen Peisong,Chen Chi
Publisher
Springer International Publishing
Reference23 articles.
1. Agrawal, R., Kiernan, J.: Watermarking relational databases. In: Very Large Data Bases, pp. 155–166 (2002)
2. Fei, G., Wang, J., Li, D.: Fingerprinting relational databases. In: ACM Symposium on Applied Computing (2006)
3. Franco-Contreras, J., Coatrieux, G.: Robust watermarking of relational databases with ontology-guided distortion control. IEEE Trans. Inf. Forensics Secur. 10(9), 1939–1952 (2015)
4. Guo, H., Li, Y., Liu, A., Jajodia, S.: A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci. Int. J. 176(10), 1350–1378 (2006)
5. Gupta, G., Pieprzyk, J.: Reversible and blind database watermarking using difference expansion. Int. J. Digit. Crime Forensics 1(2), 42–54 (2009)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Research on blind reversible database watermarking algorithm based on dual embedding strategy;The Computer Journal;2024-08-31
2. An Improved Reversible Database Watermarking Method based on Histogram Shifting;Proceedings of the 2023 ACM Workshop on Information Hiding and Multimedia Security;2023-06-28
3. An Attribute-attack-proof Watermarking Technique for Relational Database;2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom);2022-12
4. Empirical analysis of the impact of queries on watermarked relational databases;Expert Systems with Applications;2022-10
5. Document Database Watermark Algorithm Based on Connected Graph;2022 International Conference on Computing, Communication, Perception and Quantum Technology (CCPQT);2022-08