Tracing the lineage of view data in a warehousing environment
ACM Transactions on Database Systems (TODS)
Digital watermarking
On propagation of deletions and annotations through views
Proceedings of the twenty-first ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Using Cryptographic and Watermarking Algorithms
IEEE MultiMedia
Why and Where: A Characterization of Data Provenance
ICDT '01 Proceedings of the 8th International Conference on Database Theory
Practical Lineage Tracing in Data Warehouses
ICDE '00 Proceedings of the 16th International Conference on Data Engineering
Proving Ownership over Categorical Data
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
Provenance management in curated databases
Proceedings of the 2006 ACM SIGMOD international conference on Management of data
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Provenance in Databases: Why, How, and Where
Foundations and Trends in Databases
Lossless generalized-LSB data embedding
IEEE Transactions on Image Processing
Reversible data embedding using a difference expansion
IEEE Transactions on Circuits and Systems for Video Technology
Toward provenance capturing as cross-cutting concern
TaPP'12 Proceedings of the 4th USENIX conference on Theory and Practice of Provenance
QuEval: beyond high-dimensional indexing à la carte
Proceedings of the VLDB Endowment
Hi-index | 0.00 |
Today, more and more data is available in digital form, ranging from normal text to multimedia data such as image or video data. Since some data is of high sensitivity or undergoes legal restrictions, it is important to obtain more reliable information about the data origin and its transformations, known as data provenance. Unfortunately, current approaches for data provenance neither support multimedia data nor provide mechanisms to ensure reliability of the provenance information. In this paper, we present an approach based on existing watermarking schemes evaluated by a database system. Hence, this approach ensures the reliability of multi media data (e.g., fingerprint data) and its corresponding provenance information. Furthermore, we show how this approach can be applied within a specific database, used for fingerprint verification.