Database Reference
In-Depth Information
8. Coltuc, D., Chassery, J.M.: Very fast watermarking by reversible contrast mapping. Signal
Processing Letters 14(4), 255-258 (2007)
9. Cox, I., Miller, M., Bloom, J.: Digital Watermarking: Principles and Practice. Morgan Kauf-
mann, San Francisco (2001)
10. Cui, Y., Widom, J.: Practical lineage tracing in data warehouses. In: Proc. Int. Conf. on Data
Engineering, pp. 367-378. IEEE, Los Alamitos (2000)
11. Cui, Y., Widom, J., Wiener, J.: Tracing the lineage of view data in a data warehousing envi-
ronment. ACM Trans. on Database Systems 25(2), 179-227 (2000)
12. Dittmann, J., Wohlmacher, P., Nahrstedt, K.: Using cryptografic and watermarking algo-
rithms. IEEE Multimedia 8(4), 54-65 (2001)
13. Dubey, S., Anna, T., Shakher, C., Mehta, D.: Fingerprint detection using full-field swept-
source optical coherence tomography. Applied Physics Letters 91(18), 1-3 (2007)
14. Feng, J., Lin, I., Tsai, C., Chu, Y.: Reversible watermarking: Current status and key issues.
International Journal of Network Security 2(3), 161-171 (2006)
15. Galton, F.: Fingerprints. MacMillan and Co., NYC (1892)
16. Glavic, B., Dittrich, K.: Data provenance: A categorization of existing approaches. In:
GI-Fachtagung für Datenbanksysteme (BTW), pp. 227-241 (2007)
17. Guo, H., Li, Y., Jajodia, S.: Chaining watermarks for detecting malicious modifications to
streaming data. Inf. Sci. 177(1), 281-298 (2007)
18. Gupta, A.: Data provenance. In: Encyclopedia of Database Systems, p. 608. Springer,
Heidelberg (2009)
19. Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proc. of IEEE 87(7), 1079-
1107 (2002)
20. Kuivalainen, K., Peiponen, K.E., Myller, K.: Application of a diffractive element-based sen-
sor for detection of latent fingerprints from a curved smooth surface. Measurement Sci. and
Tech. 20(7), 207-211 (2009)
21. Lin, S., Engheta, N., Pugh Jr., E., Yemelyanov, K.: Polarization- and specular-reflection-
based, non-contact latent fingerprint imaging and lifting. Journal of Opt. Soc. of Amer-
ica 23(9), 2137-2153 (2006)
22. Merkel, R., Kraetzer, C., Dittmann, J., Vielhauer, C.: Reversible watermarking with digital
signature chaining for privacy protection of optical contactless captured biometric finger-
prints - a capacity study for forensic approaches. To Appear in Int'l. Conf. on Digital Signal
Processing (2011)
23. Simmhan, Y., Plale, B., Gannon, D.: A survey of data provenance techniques. Tech. Rep.
IUB-CS-TR618, Department of Computer Science, Indiana University, Bloomington (2005)
24. Sion, R.: Proving ownership over categorical data. In: Proc. Int. Conf. on Data Engineering,
pp. 584-595 (2004)
25. Sion, R.: Database watermarking for copyright protection. In: Gertz, M., Jajodia, S. (eds.)
Handbook of Database Security, pp. 297-328. Springer, US (2008)
26. Tan, W.C.: Research problems in data provenance. IEEE Data Eng. Bull. 27(4), 42-52 (2004)
27. Tan, W.C.: Provenance in databases: Past, current, and future. IEEE Data Eng. Bull. 32(4),
3-12 (2007)
28. Tian, J.: Reversible data embedding using a difference expansion. Circuits and Systems for
Video Technology 13(8), 890-896 (2003)
29. Tsai, W., Wei, X., Chen, Y., Paul, R., Chung, J.Y., Zhang, D.: Data provenance in soa: Se-
curity, reliability, and integrity. Service Oriented Computing and Applications 1, 223-247
(2007)
 
Search WWH ::




Custom Search