Watermarking of uncompressed and compressed video
Signal Processing
Simulation Modeling and Analysis
Simulation Modeling and Analysis
Information Hiding Techniques for Steganography and Digital Watermarking
Information Hiding Techniques for Steganography and Digital Watermarking
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
Digital Watermarks for Audio Signals
ICMCS '96 Proceedings of the 1996 International Conference on Multimedia Computing and Systems
IEEE Journal on Selected Areas in Communications
A system for watermarking relational databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Fingerprinting Relational Databases: Schemes and Specialties
IEEE Transactions on Dependable and Secure Computing
Watermill: an optimized fingerprinting system for highly constrained data
MM&Sec '05 Proceedings of the 7th workshop on Multimedia and security
Rights Protection for Discrete Numeric Streams
IEEE Transactions on Knowledge and Data Engineering
Fingerprinting relational databases
Proceedings of the 2006 ACM symposium on Applied computing
Recognition in software watermarking
Proceedings of the 4th ACM international workshop on Contents protection and security
Data collection with self-enforcing privacy
Proceedings of the 13th ACM conference on Computer and communications security
Enabling the 21st century health care information technology revolution
Communications of the ACM - Spam and the ongoing battle for the inbox
Auditing disclosure by relevance ranking
Proceedings of the 2007 ACM SIGMOD international conference on Management of data
Query-based watermarking for XML data
ASIACCS '07 Proceedings of the 2nd ACM symposium on Information, computer and communications security
Reversible and blind database watermarking using difference expansion
Proceedings of the 1st international conference on Forensic applications and techniques in telecommunications, information, and multimedia and workshop
Data Collection with Self-Enforcing Privacy
ACM Transactions on Information and System Security (TISSEC)
Security deciding in publishing views based on entropy
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness
Translation-based steganography
Journal of Computer Security - Best papers of the Sec Track at the 2006 ACM Symposium
Digital watermarking for relational databases using traceability parameter
International Journal of Computer Applications in Technology
A new watermarking approach for relational data
Proceedings of the 46th Annual Southeast Regional Conference on XX
Database Relation Watermarking Resilient against Secondary Watermarking Attacks
ICISS '09 Proceedings of the 5th International Conference on Information Systems Security
An algorithm resistive to invertibility attack in watermarking relational databases
CCDC'09 Proceedings of the 21st annual international conference on Chinese Control and Decision Conference
A method of deciding the security in publishing views
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A fractal watermark solution for product data
CSCWD'06 Proceedings of the 10th international conference on Computer supported cooperative work in design III
A novel relational database watermarking algorithm
PAISI'07 Proceedings of the 2007 Pacific Asia conference on Intelligence and security informatics
Simplified watermarking scheme for sensor networks
International Journal of Internet Protocol Technology
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
Watermarking-based intellectual property protection for sensor streaming data
International Journal of Computer Applications in Technology
Query-preserving watermarking of relational databases and Xml documents
ACM Transactions on Database Systems (TODS)
A persistent public watermarking of relational databases
ICISS'10 Proceedings of the 6th international conference on Information systems security
ISWC'11 Proceedings of the 10th international conference on The semantic web - Volume Part I
Bucket attack on numeric set watermarking model and safeguards
Information Security Tech. Report
Semi-fragile watermark for sensor data
International Journal of Internet Protocol Technology
Rights protection for data cubes
ISC'06 Proceedings of the 9th international conference on Information Security
DBSEC'06 Proceedings of the 20th IFIP WG 11.3 working conference on Data and Applications Security
Solvability of a system of bivariate polynomial equations over a finite field
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
GARWM: towards a generalized and adaptive watermark scheme for relational data
WAIM'05 Proceedings of the 6th international conference on Advances in Web-Age Information Management
Noise-Robust watermarking for numerical datasets
MDAI'05 Proceedings of the Second international conference on Modeling Decisions for Artificial Intelligence
Watermarking essential data structures for copyright protection
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
An improved algorithm to watermark numeric relational data
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Watermarking non-numerical databases
MDAI'06 Proceedings of the Third international conference on Modeling Decisions for Artificial Intelligence
A new scheme to fingerprint XML data
KDXD'06 Proceedings of the First international conference on Knowledge Discovery from XML Documents
Adding fake facts to ontologies
Proceedings of the 21st international conference companion on World Wide Web
Hi-index | 0.00 |
Abstract.We enunciate the need for watermarking database relations to deter data piracy, identify the characteristics of relational data that pose unique challenges for watermarking, and delineate desirable properties of a watermarking system for relational data. We then present an effective watermarking technique geared for relational data. This technique ensures that some bit positions of some of the attributes of some of the tuples contain specific values. The specific bit locations and values are algorithmically determined under the control of a secret key known only to the owner of the data. This bit pattern constitutes the watermark. Only if one has access to the secret key can the watermark be detected with high probability. Detecting the watermark requires access neither to the original data nor the watermark, and the watermark can be easily and efficiently maintained in the presence of insertions, updates, and deletions. Our analysis shows that the proposed technique is robust against various forms of malicious attacks as well as benign updates to the data. Using an implementation running on DB2, we also show that the algorithms perform well enough to be used in real-world applications.