[1] AGRAWAL R,KIERNAN J.Watermarking relational databases[A].Proceedings of the 28th International Conference on Very Large Data Bases (VLDB'02)[C].Hong Kong,China:VLDB Endowment,2002.155-166.
[2] AGRAWAL R,HAAS P,KIERNAN J.A system for watermarking relational databases[A].Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data (SIGMOD'03)[C].San Diego,California:ACM Press,2003.674-674.
[3] AGRAWAL R,HAAS P J,KIERNAN J.Watermarking relational data:framework,algorithms and analysis[J].The VLDB Journal,2003,12(2):157-169.
[4] SHEHAB M,BERTINO E,GHAFOOR A.Watermarking relational databases using optimization-based techniques[J].IEEE Transactions on Knowledge and Data Engineering,2008,20(1):116-129.
[5] SION R,ATALLAH Mikhail,PRABHAKAR Sunil.Rights protection for relational date[J].IEEE Transactions on Knowledge and Data Engineering,2004,16(6):1509-1525.
[6] MILANO D.Content control:Digital watermarking and fingerprinting[A].White Paper,Rhozet,a Business Unit of Harmonic Inc[P/OL].http://www.rhozet.com/whitepapers/FingerprintingWatermarking.pdf,LastAccessed,2012-05-30.
[7] GUO H,LI Y,LIU A,et al.A fragile watermarking scheme for detecting malicious modifications of database relations[J].Information Sciences,2006,176(10):1350-1378.
[8] KSHATRIYA M S,SANE S S.A study of watermarking relational databases[J].International Journal of Application or Innovation in Engineering & Management (IJAIEM),2014,3(10):154-158.
[9] MEHTA B B,ASWAR H D.Watermarking for security in database:A review[A].Conference on IT in Business,Industry and Government (CSIBIG)[C].US:IEEE,2014.1-6.
[10] HALDER R,PAL S,CORTESI A.Watermarking techniques for relational databases:Survey,classification and comparison[J].Journal of UCS,2010,16(21):3164-3190.
[11] DWIVEDI A K,SHARMA B K,VYAS A K.Watermarking techniques for ownership protection of relational databases[J].International Journal of Emerging Technology and Advanced Engineering,2014,4(1):368-375.
[12] JOSE N,UPPAR A S.A Secured Approach for Numerical Relational Databases Using Robust and Reversible Watermarking Technique[J].International Journal of Emerging Research in Management & Technology,2016,5(5):223-227.
[13] HAN A X,CHEN Y.Research on database watermarking algorithm based on genetic algorithm[A].Applied Mechanics and Materials[C].US:Trans Tech Publications,2014,687:1297-1299.
[14] BHESANIYA M H,THANKI K.Watermarking of relational databases[J].International Journal for Research in Technological Studies,2013,1(1):11-16.
[15] KAMRAN M,SUHAIL S,FAROOQ M.A robust,distortion minimizing technique for watermarking relational databases using once-for-all usability constraints[J].IEEE Transactions on Knowledge and Data Engineering,2013,25(12):2694-2707.
[16] XIE M R,WU C C,SHEN J J,et al.A survey of data distortion watermarking relational databases[J].International Journal of Network Security,2016,18(6):1022-1033.
[17] MOHANPURKAR A A,JOSHI M S.Applying watermarking for copyright protection,traitor identification and joint ownership:A review[A].World Congress on Information and Communication Technologies (WICT)[C].US:IEEE,2011.1014-1019.
[18] BHESANIYA M H,RATHOD J,THANKI K.Various approaches for watermarking of relational database[J].International Journal of Engineering Science and Innovative Technology,2014,3(1):215-220.
[19] QIN Z,YING Y,JIA-JIN L E,et al.Watermark based copyright protection of outsourced database[A].The 10th International Database Engineering and Applications Symposium (IDEAS'06)[C].US:IEEE,2006.301-308.
[20] MENGMENG F,JIANMIN L,ZHENRONG L.A new relational database watermarking algorithm[J].Computer Applications and Software,2015,6:62.
[21] ZHANG Z H,JIN X M,WANG J M,et al.Watermarking relational database using image[A].Proceedings of 2004 International Conference on Machine Learning and Cybernetics[C].US:IEEE,2004.1739-1744.
[22] SARDROUDI H M,IBRAHIM S.A new approach for relational database watermarking using image[A].The 5th International Conference on Computer Sciences and Convergence Information Technology (ICCIT)[C].US:IEEE,2010.606-610.
[23] CHEN X,CHEN P,HE Y,et al.A self-resilience digital image watermark based on relational database[A].International Symposium on Knowledge Acquisition and Modeling (KAM'08)[C].US:IEEE,2008.698-702.
[24] WANG C,WANG J,ZHOU M,et al.Atbam:An arnold transform based method on watermarking relational data[A].International Conference on Multimedia and Ubiquitous Engineering (MUE'08)[C].US:IEEE,2008.263-270.
[25] WANG H,CUI X,CAO Z.A speech based algorithm for watermarking relational databases[A].International Symposiums on Information Processing (ISIP)[C].US:IEEE,2008.603-606.
[26] HU Z,CAO Z,SUN J.An image based algorithm for watermarking relational databases[A].International Conference on Measuring Technology and Mechatronics Automation (ICMTMA'09)[C].US:IEEE,2009.425-428.
[27] ZHOU X,HUANG M,PENG Z.An additive-attack-proof watermarking mechanism for databases' copyrights protection using image[A].Proceedings of the 2007 ACM Symposium on Applied Computing[C].US:ACM,2007.254-258.
[28] SION R.Proving ownership over categorical data[A].Proceedings of the 20th International Conference on Data Engineering[C].US:IEEE,2004.584-595.
[29] SION R,ATALLAH M,PRABHAKAR S.Rights protection for categorical data[J].IEEE Transactions on Knowledge and Data Engineering,2005,17(7):912-926.
[30] KUMAR M,VERMA O P,SAXENA A.Elliptic curve cryptography(ECC) based relational database watermarking[J].International Journal of Computer Applications,2016,154(6):20-28.
[31] ZHANG Y,YANG B,NIU X M.Reversible watermarking for relational database authentication[J].Journal of Computers,2006,17(2):59-66.
[32] FARFOURA M E,HORNG S J,LAI J L,et al.A blind reversible method for watermarking relational databases based on a time-stamping protocol[J].Expert Systems with Applications,2012,39(3):3185-3196.
[33] CHANG J N,WU H C.Reversible fragile database watermarking technology using difference expansion based on svr prediction[A].International Symposium on Computer,Consumer and Control (IS3C)[C].US:IEEE,2012.690-693.
[34] GUPTA G,PIEPRZYK J.Database relation watermarking resilient against secondary watermarking attacks[A].International Conference on Information Systems Security[C].Berlin Heidelberg:Springer,2009.222-236.
[35] JAWAD K,KHAN A.Genetic algorithm and difference expansion based reversible watermarking for relational databases[J].Journal of Systems and Software,2013,86(11):2742-2753.
[36] KAMRAN M,SUHAIL S,FAROOQ M.A robust,distortion minimizing technique for watermarking relational databases using once-for-all usability constraints[J].IEEE Transactions on Knowledge and Data Engineering,2013,25(12):2694-2707.
[37] KAMRAN M,FAROOQ M.An information-preserving watermarking scheme for right protection of EMR systems[J].IEEE Transactions on Knowledge and Data Engineering,2012,24(11):1950-1962.
[38] KAMRAN M,FAROOQ M.A formal usability constraints model for watermarking of outsourced datasets[J].IEEE Transactions on Information Forensics and Security,2013,8(6):1061-1072.
[39] IFTIKHAR S,KAMRAN M,ANWAR Z.RRW-a robust and reversible watermarking technique for relational data[J].IEEE Transactions on Knowledge and Data Engineering,2015,27(4):1132-1145.
[40] LI Y,GUO H,JAJODIA S.Tamper detection and localization for categorical data using fragile watermarks[A].Proceedings of the 4th ACM Workshop on Digital Rights Management[C].US:ACM,2004.73-82.
[41] BHATTACHARYA S,CORTESI A.A distortion free watermark framework for relational databases[A].Proceedings of the 4th International Conference on Software and Data Technologies (ICSOFT'09)[C].US:IEEE,2009.229-234.
[42] BHATTACHARYA S,CORTESI A.A generic distortion free watermarking technique for relational databases[A].International Conference on Information Systems Security[C].Berlin,Heidelberg:Springer,2009.252-264.
[43] LI Y.Database Watermarking:A Systematic View[M].Berlin,Heidelberg:Springer Verlag,2007.
[44] TSAI M H,HSU F Y,CHANG J D,et al.Fragile database watermarking for malicious tamper detection using support vector regression[A].Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing (ⅡHMSP'07)[C].US:IEEE,2007.493-496.
[45] LI Y,DENG R H.Publicly verifiable ownership protection for relational databases[A].Proceedings of the 2006 ACM Symposium on Information,Computer and Communications Security[C].US:ACM,2006.78-89.
[46] HALDER R,CORTESI A.A persistent public watermarking of relational databases[A].Proceedings of the 6th International Conferenceon Information Systems Security (ICISS'10)[C].Gandhinagar,Gujarat,India:Springer LNCS,Volume 6503,2010.216-230.
[47] HALDER R,CORTESI A.Persistent watermarking of relational databases[A].Proceedings of the IEEE International Conferenceon Advances in Communication,Network,and Computing (CNC'10)[C].Calicut,Kerala,India:IEEE Computer Society,2010.46-52.
[48] BHATTACHARYA S,CORTESI A.A generic distortion free watermarking technique for relational databases[A].Proceedings of the 5th International Conference on Information Systems Security (ICISS'09)[C].Kolkata,India:Springer LNCS,Volume 5905,2009.252-264.
[49] BHATTACHARYA S,CORTESI A.Database authentication by distortion-free watermarking[A].Proceedings of the 5th International Conference on Software and Data Technologies (ICSOFT'10)[C].Athens,Greece:INSTICC Press,2010.219-226.
[50] KAMEL I.A schema for protecting the integrity of databases[J].Computers & Security,2009,(28):698-709.
[51] KHAN A,HUSAIN S A.A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations[J].The Scientific World Journal,2013,doi:10.1155/2013/796726:1-16.
[52] LE H D,XU X,WANG Q,et al.Zero-watermarking for face image protection in database[J].Journal of Internet Technology,2016,17(1):129-135.
[53] POURNAGHSHBAND V.A new watermarking approach for relational data[A].Proceedings of the 46th Conference on Annual Southeast Regional[C].US:ACM,2008.127-131.
[54] PRASANNAKUMARI V.A robust tamperproof watermarking for data integrity in relational databases[J].Research Journal of Information Technology,2009,1(3):115-121.
[55] LI Y,SWARUP V,JAJODIA S.Constructing a virtual primary key for fingerprinting relational data[A].Proceedings of the 3rd ACM Workshop on Digital Rights Management[C].US:ACM,2003.133-141.
[56] LI Y,SWARUP V,JAJODIA S.Fingerprinting relational databases:Schemes and specialties[J].IEEE Transactions on Dependable and Secure Computing,2005,2(1):34-45.
[57] HALDER R,CORTESI A.Persistent watermarking of relational databases[A].Proceedings of the IEEE International Conference on Advances in Communication,Network,and Computing (CNC'10)[C].US:IEEE,2010.4-5.
[58] ALFAGI A S,MANAF A A,HAMIDA B A,et al.A systematic literature review on necessity,challenges,applications and attacks of watermarking relational database[J].Journal of Telecommunication,Electronic and Computer Engineering (JTEC),2017,9(1-3):101-108.
[59] 崔新春,贺洁,秦小麟.基于盲源分离的多重音频数据库水印算法[J].电子学报,2012,40(1):78-83. CUI Xin-chun,HE Jie,QIN Xiao-lin.A multiple audio watermarking for database based on blind source separation[J].Acta Electronica Sinica,2012,40(1):78-83.(in Chinese)
[60] 付剑晶,王珂,徐建军.一种面向多波段数字遥感影像的版权保护方案[J].电子学报,2016,44(3):732-739. FU Jian-jing,WANG Ke,XU Jian-jun.A copyright protection scheme for multiband digital remote sensing imagery[J].Acta Electronica Sinica,2016,44(3):732-739.(in Chinese)
[61] 王国栋,刘粉林,刘媛,等.一种能区分水印或内容篡改的脆弱水印算法[J].电子学报,2008,36(7):1349-1354. WANG Guo-dong,LIU Fen-lin,LIU Yuan,et al.An image authentication scheme with discrimination of tampers on watermark or image[J].Acta Electronica Sinica,2008,36(7):1349-1354.(in Chinese) |