Learnability and the Vapnik-Chervonenkis dimension
Journal of the ACM (JACM)
Logical definability of NP optimization problems
Information and Computation
Query languages for bags: expressive power and complexity
ACM SIGACT News
Query languages for bags and aggregate functions
Journal of Computer and System Sciences - Special issue on principles of database systems
Weighted NP Optimization Problems: Logical Definability and Approximation Properties
SIAM Journal on Computing
Optimization-intensive watermarking techniques for decision problems
Proceedings of the 36th annual ACM/IEEE Design Automation Conference
Typechecking for XML transformers
PODS '00 Proceedings of the nineteenth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems
Watermarking maps: hiding information in structured data
SODA '00 Proceedings of the eleventh annual ACM-SIAM symposium on Discrete algorithms
Locality of order-invariant first-order formulas
ACM Transactions on Computational Logic (TOCL)
Watermarking graph partitioning solutions
Proceedings of the 38th annual Design Automation Conference
Digital watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
Query automata over finite trees
Theoretical Computer Science
Learnability and Definability in Trees and Similar Structures
STACS '02 Proceedings of the 19th Annual Symposium on Theoretical Aspects of Computer Science
Hiding Signatures in Graph Coloring Solutions
IH '99 Proceedings of the Third International Workshop on Information Hiding
On the Power of Aggregation in Relational Query Languages
DBLP-6 Proceedings of the 6th International Workshop on Database Programming Languages
STOC '84 Proceedings of the sixteenth annual ACM symposium on Theory of computing
Watermarking relational databases
VLDB '02 Proceedings of the 28th international conference on Very Large Data Bases
Constructing a virtual primary key for fingerprinting relational data
Proceedings of the 3rd ACM workshop on Digital rights management
Proving Ownership over Categorical Data
ICDE '04 Proceedings of the 20th International Conference on Data Engineering
Rights Protection for Relational Data
IEEE Transactions on Knowledge and Data Engineering
Privacy and Ownership Preserving of Outsourced Medical Data
ICDE '05 Proceedings of the 21st International Conference on Data Engineering
Fingerprinting Relational Databases: Schemes and Specialties
IEEE Transactions on Dependable and Secure Computing
Watermill: an optimized fingerprinting system for highly constrained data
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Publicly verifiable ownership protection for relational databases
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Fingerprinting relational databases
Proceedings of the 2006 ACM symposium on Applied computing
Query-based watermarking for XML data
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
A blind, fast and robust method for geographical data watermarking
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Watermarking Relational Databases Using Optimization-Based Techniques
IEEE Transactions on Knowledge and Data Engineering
Reversible and blind database watermarking using difference expansion
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
A Novel Framework for Watermarking: The Data-Abstracted Approach
IWSEC '08 Proceedings of the 3rd International Workshop on Security: Advances in Information and Computer Security
Digital watermarking for relational databases using traceability parameter
International Journal of Computer Applications in Technology
A new watermark approach for protection of databases
AIC'09 Proceedings of the 9th WSEAS international conference on Applied informatics and communications
Database Relation Watermarking Resilient against Secondary Watermarking Attacks
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
A Generic Distortion Free Watermarking Technique for Relational Databases
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
A fragile watermarking scheme for detecting malicious modifications of database relations
Information Sciences: an International Journal
Watermarking-based intellectual property protection for sensor streaming data
International Journal of Computer Applications in Technology
A novel watermark technique for relational databases
AICI'10 Proceedings of the 2010 international conference on Artificial intelligence and computational intelligence: Part II
Query-preserving watermarking of relational databases and Xml documents
ACM Transactions on Database Systems (TODS)
Bucket attack on numeric set watermarking model and safeguards
Information Security Tech. Report
Rights protection for data cubes
ISC'06 Proceedings of the 9th international conference on Information Security
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Solvability of a system of bivariate polynomial equations over a finite field
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
GARWM: towards a generalized and adaptive watermark scheme for relational data
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
Indexing information for data forensics
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Effective approaches for watermarking XML data
DASFAA'05 Proceedings of the 10th international conference on Database Systems for Advanced Applications
A block oriented fingerprinting scheme in relational database
ICISC'04 Proceedings of the 7th international conference on Information Security and Cryptology
Watermarking essential data structures for copyright protection
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
An improved algorithm to watermark numeric relational data
WISA'05 Proceedings of the 6th international conference on Information Security Applications
A new scheme to fingerprint XML data
KDXD'06 Proceedings of the First international conference on Knowledge Discovery from XML Documents
Subset selection approach for watermarking relational databases
ICDEM'10 Proceedings of the Second international conference on Data Engineering and Management
Hi-index | 0.00 |
Watermarking allows robust and unobtrusive insertion of information in a digital document. Very recently, techniques have been proposed for watermarking relational databases or XML documents, where information insertion must preserve a specific measure on data (e.g. mean and variance of numerical attributes.)In this paper we investigate the problem of watermarking databases or XML while preserving a set of parametric queries in a specified language, up to an acceptable distortion.We first observe that unrestricted databases can not be watermarked while preserving trivial parametric queries. We then exhibit query languages and classes of structures that allow guaranteed watermarking capacity, namely 1) local query languages on structures with bounded degree Gaifman graph, and 2) monadic second-order queries on trees or tree-like structures. We relate these results to an important topic in computational learning theory, the VC-dimension. We finally consider incremental aspects of query-preserving watermarking.