Databases Reference
In-Depth Information
2. Michael Arnold, Stephen D. Wolthusen, and Martin Schmucker. Techniques and
Applications of Digital Watermarking and Content Protection . Artech House
Publishers, 2003.
3. Mauro Barni and Franco Bartolini. Watermarking Systems Engineering: En-
abling Digital Assets Security and Other Applications . Marcel Dekker, 2004.
4. Elisa Bertino, Beng Chin Ooi, Yanjiang Yang, and Robert H. Deng. Privacy
and ownership preserving of outsourced medical data. In Proceedings of the
International Conference on Data Engineering , pages 521-532, 2005.
5. D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. Lecture
Notes in Computer Science , 963:452-464, 1995.
6. D. Boneh and J. Shaw. Collusion-secure fingerprinting for digital data. IEEE
Transactions on Information Theory , 44(5):1897-1905, 1998.
7. E.F. Codd. A Relational Model of Data for Large Shared Data Banks. Com-
munications of the ACM , 13(6):377-387, 1970.
8. I. Cox, J. Bloom, and M. Miller. Digital watermarking. In Digital Watermarking .
Morgan Kaufmann, 2001.
9. Scott Craver, Nasir Memon, Boon-Lock Yeo, and Minerva M. Yeung. Resolv-
ing rightful ownerships with invisible watermarking techniques: Limitations, at-
tacks, and implications. IEEE Journal of Selected Areas in Communications ,
16(4):573-586, 1998.
10. The
IBM
DB2
Universal
Database.
Online
at
http://www.ibm.com/software/data/db2 .
11. Joachim Eggers and Bernd Girod. Informed Watermarking .KluwerAcademic
Publishers, 2002.
12. David Gross-Amblard. Query-preserving watermarking of relational databases
and xml documents. In Proceedings of the Nineteenth ACM SIGMOD-SIGACT-
SIGART Symposium on Principles of Database Systems , pages 191-201, New
York, NY, USA, 2003. ACM Press.
13. H. Guth and B. Pfitzman. Error and collusion secure fingerprinting for digital
data. In Proceedings of the Information Hiding Workshop , 1999.
14. Neil F. Johnson, Zoran Duric, and Sushil Jajodia. Information Hiding: Steganog-
raphy and Watermarking - Attacks and Countermeasures .KluwerAcademic
Publishers, 2001.
15. S. Katzenbeisser and F. Petitcolas (editors). Information Hiding Techniques for
Steganography and Digital Watermarking . Artech House, 2001.
16. J. Kiernan and R. Agrawal. Watermarking relational databases. In Proceedings
of the 28th International Conference on Very Large Databases VLDB , 2002.
17. Yingjiu Li, Huiping Guo, and Sushil Jajodia. Tamper detection and localization
for categorical data using fragile watermarks. In DRM '04: Proceedings of the
4th ACM workshop on Digital rights management , pages 73-82, New York, NY,
USA, 2004. ACM Press.
18. Yingjiu Li, Vipin Swarup, and Sushil Jajodia. Constructing a virtual primary
key for fingerprinting relational data. In DRM '03: Proceedings of the 2003
ACM workshop on Digital rights management , pages 133-141, New York, NY,
USA, 2003. ACM Press.
19. Yingjiu Li, Vipin Swarup, and Sushil Jajodia. A robust watermarking scheme
for relational data. In Proceedings of the Workshop on Information Technology
and Systems (WITS) , pages 195-200, 2003.
Search WWH ::




Custom Search