• No results found

[PDF] Top 20 A Robust and Reversible Watermarking Technique for Numerical and Non-Numerical Relational Data

Has 10000 "A Robust and Reversible Watermarking Technique for Numerical and Non-Numerical Relational Data" found on our website. Below are the top 20 most common "A Robust and Reversible Watermarking Technique for Numerical and Non-Numerical Relational Data".

A Robust and Reversible Watermarking Technique for Numerical and Non-Numerical Relational Data

A Robust and Reversible Watermarking Technique for Numerical and Non-Numerical Relational Data

... both numerical and non- numerical data. A non-numeric attribute in a relational database can be any string within the range of consonants, vowels or special characters, ie, for ... See full document

5

A Robust and Reversible Watermarking Technique for Relational Data 
Tharun Kumar Vulkundakar, Srikanth Lakumarapu & Deepthi Janagama

A Robust and Reversible Watermarking Technique for Relational Data Tharun Kumar Vulkundakar, Srikanth Lakumarapu & Deepthi Janagama

... and data tampering. Watermarking is advocated to enforce ownership rights over shared relational data and for providing a means for tackling data ...using watermarking, the ... See full document

6

Semi Blind Reversible Watermarking Technique for Relational Data
V Harivardhan Reddy, K Srinivas & Y Raju

Semi Blind Reversible Watermarking Technique for Relational Data V Harivardhan Reddy, K Srinivas & Y Raju

... not robust against malicious attacks and do not provide any mechanism to selectively watermark a particular attribute by taking into account its role in knowledge ...Therefore, reversible ... See full document

6

A Robust Multi-attribute Watermarking Technique for Relational Data

A Robust Multi-attribute Watermarking Technique for Relational Data

... image watermarking scheme based on prediction error expansion is proposed by Xiaolong Li et ...image watermarking the authors have focused on adaptive embedding and pixel ...preserving watermarking ... See full document

8

Robust database watermaking technique over numerical data

Robust database watermaking technique over numerical data

... in relational frameworks is a very young technology that has just begun its maturity cycle towards full deployment in industry-level ...for relational database watermarking is to protect ... See full document

26

A Robust and Resilient Watermarking Approach for Numeric and Non Numeric Relational Data

A Robust and Resilient Watermarking Approach for Numeric and Non Numeric Relational Data

... a technique which is used to deter data piracy and tamperproof the data during its transmission from one machine to ...of watermarking namely image watermarking, video ... See full document

6

A Secure Watermarking Technique for Numeric and Non-Numeric Relational Data

A Secure Watermarking Technique for Numeric and Non-Numeric Relational Data

... digital data is becoming very important. Digital Watermarking is used to impose ownership rights on the shared relational data and to provide a means for tackling the data ...existing ... See full document

6

Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non Numeric Relational Data

Genetic Algorithm based Reversible Watermarking Approach for Numeric and Non Numeric Relational Data

... irreversible watermarking technique lacked the capability to retrieve the original relational data along with the preservation of it’s data ...expansion technique describes the ... See full document

6

A Robust and Semi-blind Reversible Watermarking for Relational Database

A Robust and Semi-blind Reversible Watermarking for Relational Database

... Expansion Watermarking techniques (DEW) utilize methods of arithmetic operations on numeric features and make ...of relational databases to reduce distortion. while, in robust reversible ... See full document

6

Implementation of Reversible Watermarking Techniques on Relational Database

Implementation of Reversible Watermarking Techniques on Relational Database

... Irreversible watermarking techniques make changes in the data to such an extent that data quality gets ...compromised. Reversible watermarking techniques are used to cater to such ... See full document

6

Survey on Reversible Watermarking Techniques on Relational Database

Survey on Reversible Watermarking Techniques on Relational Database

... fragile watermarking, integrity verification is done while in robust watermarking, the embedded watermark should be robust against various types of ... See full document

5

A Survey for applied Attacks on Digital Watermarking Methods, DCT & RW
                 

A Survey for applied Attacks on Digital Watermarking Methods, DCT & RW  

... digital watermarking technique has been planned as a possible resolution to the need of copyright protection and authentication of transmission info in a very networked setting, it makes possible to ... See full document

5

Reversible watermarking technique using time stamping for relational 
		data

Reversible watermarking technique using time stamping for relational data

... original data) is a challenging ...of watermarking the databases and proposed some strong watermarking plans for the database ...A watermarking technique can be delegated either ... See full document

8

Room Reservation and Encryption Based Reversible Watermarking in Relational Databases

Room Reservation and Encryption Based Reversible Watermarking in Relational Databases

... first reversible watermarking scheme was proposed in ...of relational databases is achieved by reversible ...authenticate data quality. But this technique is not robust ... See full document

6

Continuous state-space representation of a bucket-type rainfall-runoff model: a case study with the GR4 model  using state-space GR4 (version 1.0)

Continuous state-space representation of a bucket-type rainfall-runoff model: a case study with the GR4 model using state-space GR4 (version 1.0)

... the numerical treatment of rainfall– runoff models is to properly separate the mathematical model from the computational model (Kavetski and Clark, 2010; Gupta et ...OS technique to be used as a comparison ... See full document

15

Enhanced Data Security using RSA Digital Signature with Robust Reversible Watermarking Algorithm in Cloud Environment

Enhanced Data Security using RSA Digital Signature with Robust Reversible Watermarking Algorithm in Cloud Environment

... Due to development of information technology in recent years, electronic distributing such as sharing of digitized images and Information, is becoming widespread. Through the internet with mobile phone the multimedia ... See full document

5

Boundary Value Analysis for Non-Numerical Variables: Strings

Boundary Value Analysis for Non-Numerical Variables: Strings

... Testing is an expensive part of software develop process often consisting of approximately 50% of overall budget. It also fails to find many of the problems in software .Testing is thus a difficult and expensive process ... See full document

8

Watermarking of Relational Databases Using Optimization Technique

Watermarking of Relational Databases Using Optimization Technique

... Bit Attacks: The simplest malicious attack attempts to destroy the watermark by altering the bits . The effectiveness of such attacks is sensitive to the number of bits altered. Example:- Suppose a hacker wants to hack a ... See full document

5

A Simulation Process of Watermarking Algorithm to Noisy Images for Copyright Protection with DWT, SVD and DCT

A Simulation Process of Watermarking Algorithm to Noisy Images for Copyright Protection with DWT, SVD and DCT

... adaptable watermarking count, using the feathery C-infers bundling to process the component centers removed by SURF, and isolated component direct sets are used toward hole the image into triangular patches for ... See full document

10

A Novel Technique For Secure Data Transmission Using Cryptography And Steganography

A Novel Technique For Secure Data Transmission Using Cryptography And Steganography

... AES is the new encryption standard suggested by NIST to renew DES in 2001. AES algorithm can back any combination of data (128 bits) and key length of 128, 192, and 256 bits. The algorithm is referred to as ... See full document

5

Show all 10000 documents...