The cricket compass for context-aware mobile applications
Proceedings of the 7th annual international conference on Mobile computing and networking
Protecting Software Code by Guards
DRM '01 Revised Papers from the ACM CCS-8 Workshop on Security and Privacy in Digital Rights Management
A Shape-Preserving Data Embedding Algorithm for NURBS Curves and Surfaces
CGI '99 Proceedings of the International Conference on Computer Graphics
A Survey of Context-Aware Mobile Computing Research
A Survey of Context-Aware Mobile Computing Research
Rights protection for relational data
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Discovering Similar Multidimensional Trajectories
ICDE '02 Proceedings of the 18th International Conference on Data Engineering
Dynamic path-based software watermarking
Proceedings of the ACM SIGPLAN 2004 conference on Programming language design and implementation
Order preserving encryption for numeric data
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
STRIPES: an efficient index for predicted trajectories
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
IEEE Journal on Selected Areas in Communications
Some general methods for tampering with watermarks
IEEE Journal on Selected Areas in Communications
Rights protection of trajectory datasets with nearest-neighbor preservation
The VLDB Journal — The International Journal on Very Large Data Bases
Hi-index | 0.00 |
Protection of digital assets from piracy has received increasing interests where sensitive, valuable data need to be released. This paper addresses the problem of watermarking spatial trajectory database. The formal definition of the problem is given and the potential attacks are analyzed. Then a novel watermarking method is proposed, which embed the watermark information by introducing a small error to the trajectory shape rather than certain data values. Experimental results justify the usefulness of the proposed method, and give some empirical conclusions on the parameter settings.