• No results found

[PDF] Top 20 Experimental Study of Improved Watermarking Scheme on Relational Databases

Has 10000 "Experimental Study of Improved Watermarking Scheme on Relational Databases" found on our website. Below are the top 20 most common "Experimental Study of Improved Watermarking Scheme on Relational Databases".

Experimental Study of Improved Watermarking Scheme on Relational Databases

Experimental Study of Improved Watermarking Scheme on Relational Databases

... The watermarking software introduces small errors into the object being ...Thus, watermarking does not prevent copying, but it prevents illegal copying by providing a means for establishing the original ... See full document

7

Room Reservation and Encryption Based Reversible Watermarking in Relational Databases

Room Reservation and Encryption Based Reversible Watermarking in Relational Databases

... computing. Relational data is shared extensively with research communities and in virtual data storage locations in ...Reversible Watermarking is applied to relational database for ownership ... See full document

6

An Improved Digital Image Watermarking Scheme using Particle Swarm Optimization Technique

An Improved Digital Image Watermarking Scheme using Particle Swarm Optimization Technique

... Digital watermarking has been proposed as most effective ways to protect a copyright of digitally formatted multimedia documents in networked environments by inserting secret data into host image without ... See full document

15

Experimental Study on Benefits of Micropiles ...

Experimental Study on Benefits of Micropiles ...

... to study the effect of micropile on settlement without deterioration on pipeline, the numerical result for this case are studied for settlement in pipeline 5%D, where D equal to diameter of ... See full document

8

TEXT BOOK Database System Concepts 6e Korth

TEXT BOOK Database System Concepts 6e Korth

... of databases grew in all ...with databases indirectly—through printed reports such as credit card statements, or through agents such as bank tellers and airline reservation ...with databases—a caller ... See full document

1376

Title :  Homomorphic Encrypted Domain with DWT MethodsAuthor (s) : N.Habeep, R.Dayal Raj

Title : Homomorphic Encrypted Domain with DWT MethodsAuthor (s) : N.Habeep, R.Dayal Raj

... Image processing in the encrypted domain, also referred to as secure signal processing (SSP), has attracted considerable attention in recent years. This new technology may promise two kinds of applications in future. The ... See full document

7

Survey on relational database watermarking techniques

Survey on relational database watermarking techniques

... on watermarking numerical attributes and the watermark embedding introduce a distortion into the underlying data using bit level by changing the values of least significant bits (LSB) of some arbitrary ...for ... See full document

12

An Efficient and Scalable RDF Indexing Strategy based on B Hashed Bitmap Algorithm using CUDA

An Efficient and Scalable RDF Indexing Strategy based on B Hashed Bitmap Algorithm using CUDA

... STORING AND INDEXING UNDER RELATIONAL PERSPECTIVE The RDF data in relational databases are stored as triples of a RDF graph on a single table over a relational schema Subject, Predicate,[r] ... See full document

8

Outcome Analysis of Relational and Graph Databases

Outcome Analysis of Relational and Graph Databases

... fields, Relational databases have been the power-stallion of programming applications since many years and proceed with so this ...day. Relational databases, references to different rows and ... See full document

6

Open Dialogue Management for Relational Databases

Open Dialogue Management for Relational Databases

... ODDMER finds foci and vocabulary for any rela- tional database. We evaluate it on three very dif- ferent domains. These databases were chosen for their variety, and are not equally suitable for dia- logue. Our ... See full document

10

A Robust DCT Based Digital Image Watermarking Using Fusion of Computational Intelligence Techniques

A Robust DCT Based Digital Image Watermarking Using Fusion of Computational Intelligence Techniques

... I n p r o p o s e d f u z z y - n e u r o b a s e d watermarking contains two modules: watermark embedding and extracting. In watermark embedding process, we input cover image having size 512*512 and thumbprint of ... See full document

8

Fuzzy Object Oriented Database versus FRDB for Uncertainty Management

Fuzzy Object Oriented Database versus FRDB for Uncertainty Management

... FOOD uses objects. Object stand for real world or abstract entities and consist of encapsulated data structures, possibly of great complexity, having behavioral capacities. Based on their properties of structure and ... See full document

6

Chinese Keyword Search by Indexing in Relational Databases

Chinese Keyword Search by Indexing in Relational Databases

... dataset. Experimental results show that the average elapsed time including Index-time and Result-time is less than 500 milliseconds for queries with 1 to 10 query ... See full document

6

GQL : a graphical query interface for relational databases

GQL : a graphical query interface for relational databases

... The two employee tuple variables in figure 3 have been exploded, revealing that the name and salary attributes of both are in the target list and that simple selection conditions have be[r] ... See full document

21

Relational Lattices: From Databases to Universal Algebra

Relational Lattices: From Databases to Universal Algebra

... the study of queries, views and RDF triples, but it would be interesting to connect it with the Grothendieck perspective on relational lattices sketched ...to relational databases proposed ... See full document

41

A New Robust Color Image Watermarking Scheme Based on 3D DCT

A New Robust Color Image Watermarking Scheme Based on 3D DCT

... proposed scheme, the original watermarking signal is a binary image sized 64 × 64 and is showed in Figure ...proposed scheme defined in Section III is ... See full document

7

In Memory Data processing using Redis Database

In Memory Data processing using Redis Database

... Numerously recent applications that rely on storing and processing large amount of information, wants high availability and scalability which added more difficulties to relational database. Therefore an increasing ... See full document

6

EFFICIENT KEYWORD SEARCH IN RELATIONAL DATABASES

EFFICIENT KEYWORD SEARCH IN RELATIONAL DATABASES

... of study related with searching for keyword, for information related keyword, and metadata about keyword, as well as that of searching relational databases, World Wide Web, and the structured ... See full document

7

Volume 2, Issue 3, March 2013 Page 578

Volume 2, Issue 3, March 2013 Page 578

... Unlike Relational Databases, Object Relational Databases allow the use of inheritance. Within inheritance, you can develop classes for your data types. These objects can inherit certain ... See full document

6

Recoverable Watermarking for Distributed Databases

Recoverable Watermarking for Distributed Databases

... This module adds watermark to data. After creating and fragmenting database server adds watermark to data. First it selects one numeric data attribute which is to be watermarked. Numeric data column is taken from user ... See full document

9

Show all 10000 documents...