Continuous queries over data streams
ACM SIGMOD Record
Query-preserving watermarking of relational databases and XML documents
Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Watermarking relational data: framework, algorithms and analysis
The VLDB Journal — The International Journal on Very Large Data Bases
Security in wireless sensor networks
Communications of the ACM - Wireless sensor networks
Tamper detection and localization for categorical data using fragile watermarks
Proceedings of the 4th ACM workshop on Digital rights management
Rights Protection for Relational Data
IEEE Transactions on Knowledge and Data Engineering
Fingerprinting Relational Databases: Schemes and Specialties
IEEE Transactions on Dependable and Secure Computing
Rights Protection for Categorical Data
IEEE Transactions on Knowledge and Data Engineering
Rights Protection for Discrete Numeric Streams
IEEE Transactions on Knowledge and Data Engineering
Resilient rights protection for sensor streams
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
Digital watermarking for relational databases using traceability parameter
International Journal of Computer Applications in Technology
A fragile watermarking scheme for detecting malicious modifications of database relations
Information Sciences: an International Journal
ID modulation: embedding sensor data in an RFID timeseries
IH'05 Proceedings of the 7th international conference on Information Hiding
Hi-index | 0.00 |
Watermarking is an efficient solution especially in the application of Intellectual Property (IP) in public security and military area. In this paper, we propose a novel algorithm, named Time Varying Watermarking Algorithm (TVWA), for streaming data copyright protection. By adjusting the sequence of data in every packet and keeping the value of the data unchanged, we embed the watermark into streaming data. We apply TVWA on a prototype system, which is developed with TinyOS motes. The results demonstrate that the proposed algorithm is simple but of great efficiency. We can accurately extract the embedded watermark in the real-time mode. We can also verify the IP of the data by only detecting the segment of data in the off-line mode.