• No results found

Database Watermarking

Query Preserving Relational Database Watermarking

Query Preserving Relational Database Watermarking

... on database watermarking started in 2002 when Agrawal and Kiernan presented a robust watermarking scheme for databases ...on watermarking relational data with numeric ...based ...

6

Survey on relational database watermarking techniques

Survey on relational database watermarking techniques

... Digital watermarking has been in multimedia data use over the past ...relational database system not only to secure copyright ownership but also to ensure data contents ...the watermarking relational ...

12

Distortion Free Database Watermarking System Based on Intelligent Mechanism for Content Integrity and Ownership Control

Distortion Free Database Watermarking System Based on Intelligent Mechanism for Content Integrity and Ownership Control

... the database providers are worried about their ownership of the ...databases. Database watermarking is an efficient method for database security, without affecting the usability of the ...the ...

14

A Database Watermarking Service with a Trusted Authority Architecture for Cloud Environment

A Database Watermarking Service with a Trusted Authority Architecture for Cloud Environment

... Meanwhile, Ranchal et el. [36] provides an approach for Identity Management with the ability to use identity data on untrusted hosts. It is based on the use of predicates over encrypted data. In the meantime, Corradi ...

9

Watermarking of relational databases: Survey

Watermarking of relational databases: Survey

... reversing watermarking method that assure ownership protection in the area of relative database ...original database relative to the owner-specific watermark has detected and ...proposed ...

7

Design and Analysis of an Intelligent Integrity Checking Watermarking Scheme for Ubiquitous Database Access

Design and Analysis of an Intelligent Integrity Checking Watermarking Scheme for Ubiquitous Database Access

... ubiquitous database access, these techniques are more powerful against little types of attacks such as deleting or updating cell ...free database watermarking schemes are usually developed to protect ...

10

Survey of Security Issues in Various Database Using Digital Watermarking Techniques

Survey of Security Issues in Various Database Using Digital Watermarking Techniques

... – Database security is a challenging concept in database management ...various database technologies has increased incredibly over the last few years on the different database applications ...

12

A Survey on Applying Metric Preserving Transformation of Robust Watermarking for Relational Database

A Survey on Applying Metric Preserving Transformation of Robust Watermarking for Relational Database

... powerful database fragile watermarking scheme, the innovation of which stands on a semantic control of the information bending and on the expansion of quantization Index Modulation (QIM) to round histograms ...

5

RDBMS on Digital Watermarking Technology

RDBMS on Digital Watermarking Technology

... relational database digital watermarking systems include two aspects: watermark embedding and watermark ...original database, watermarking information, key and algorithm of watermarking ...

6

Survey on Reversible Watermarking Techniques on Relational Database

Survey on Reversible Watermarking Techniques on Relational Database

... basic database watermarking technique of relational databases is shown in Figure ...original database to form watermarked database. The watermarked database is then made publicly ...

5

A Robust and Semi-blind Reversible Watermarking for Relational Database

A Robust and Semi-blind Reversible Watermarking for Relational Database

... of database watermarking to hide watermark bits using least significant ...on watermarking. It was assumed that the relational database can allow small quantity of alteration in a ...

6

Implementation of Reversible Watermarking Techniques on Relational Database

Implementation of Reversible Watermarking Techniques on Relational Database

... basic database watermarking technique of relational databases is shown in Figure ...original database to form watermarked database. The watermarked database is then made publicly ...

6

Technicalities of Digital Watermarking: A Review

Technicalities of Digital Watermarking: A Review

... and watermarking extraction process. The various techniques of watermarking reviewed in this paper are Least Significant Bit (LSB), Robust, Discrete Cosine Transform (DCT), Spatial Domain, Frequency Domain, ...

5

Review on Digital Watermarking Images

Review on Digital Watermarking Images

... “Digital watermarking in the work presented was considered particularly on a satellite image by making use of the DCT algorithm after JPEG ...a watermarking method with good capacity, moderate robustness, ...

5

Digital Watermarking on Multimedia Application

Digital Watermarking on Multimedia Application

... The Discrete Cosine Transform is an exceptionally famous change work that changes a flag from spatial space to recurrence area and it has been utilized as a part of JPEG standard for picture pressure because of good ...

8

A Survey On Audio Watermarking  Methods

A Survey On Audio Watermarking  Methods

... Watermarking is the technique of hiding secret digital information in a carrier signal. A digital watermark is a piece of data to be embedded in digital media such as an audio, video or image data. It is used to ...

5

ICA for Watermarking Digital Images

ICA for Watermarking Digital Images

... In the second set of experiments we studied the robustness of our method against global non- malicious attacks, Gaussian noise and JPEG, as shown in Figure 15. The figures describe the frac- tion of decoding errors ...

26

Review of Digital Watermarking Techniques

Review of Digital Watermarking Techniques

... image watermarking has attracted a lot of awareness in the research community for two reasons: one is it convey enough redundant information and the other is its ...Digital watermarking has various ...

5

Steganography, Cryptography and Watermarking: A Review

Steganography, Cryptography and Watermarking: A Review

... Information/Data hiding is an act of protecting information/data from any inadvertent change. It can also be defined as the process of hiding the details of an object. A common use of information hiding is to hide the ...

5

Analysis of Multimedia Watermarking Techniques

Analysis of Multimedia Watermarking Techniques

... domain watermarking is very easy to implement and they can retrieve watermark without referencing the original ...based watermarking is least significant bit method, which simply uses the least significant ...

5

Show all 5037 documents...

Related subjects