Comparative analysis of relational database watermarking techniques: An empirical study

S Rani, R Halder - IEEE Access, 2022 - ieeexplore.ieee.org
Digital watermarking is considered one of the most promising techniques to verify the
authenticity and integrity of digital data. It is used for a wide range of applications, eg …

LRW-CRDB: Lossless robust watermarking scheme for categorical relational databases

CC Lin, TS Nguyen, CC Chang - Symmetry, 2021 - mdpi.com
In 2002, Agrawal and Kiernan defined six basic requirements, including preventing illegal
watermark embedding and authentication, reversibility, robustness, and others, which must …

Reducing multiple occurrences of meta-mark selection in relational data watermarking

MLP Gort, M Olliaro, A Cortesi - IEEE Access, 2022 - ieeexplore.ieee.org
Contrary to multimedia data watermarking approaches, it is not recommended that relational
data watermarking techniques consider sequential selection for marks in the watermark and …

Empirical analysis of the impact of queries on watermarked relational databases

M Olliaro, MLP Gort, A Cortesi - Expert Systems with Applications, 2022 - Elsevier
Robust relational database watermarking techniques aim to preserve the watermark in the
protected assets despite daily updates and malicious attacks. Nevertheless, most …

VILS: A verifiable image licensing system

H Chen, X Huang, J Ning, F Zhang… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Image licensing regulates the scope, type, and limitations of using an image through an
agreement. However, it is challenging to verify whether an agreement has been fulfilled …

A Bibliometric Analysis of Artificial Intelligence and Human Resource Management

M Sahoo, S Mishra - International Conference on ICT for Sustainable …, 2023 - Springer
In the current business scenario, artificial intelligence (AI) is the trend and is becoming the
new normal. There is an increasing application of AI in business and organizations in all …

[PDF][PDF] Digital Text Document Watermarking Based Tampering Attack Detection via Internet.

MA Alohali, M Elsadig, FN Al-Wesabi… - … Systems Science & …, 2024 - cdn.techscience.cn
Owing to the rapid increase in the interchange of text information through internet networks,
the reliability and security of digital content are becoming a major research problem …

Reversible Semi-Fragile Watermarking Technique for Integrity Control of Relational Database

A Hamadou, AAI Hassane, H Naroua - Engineering, 2024 - scirp.org
Reversible watermarking schemes for relational database are usually classified into two
groups: robust schemes and fragile schemes. The main limitation of existing reversible …

A novel secure data outsourcing scheme based on data hiding and secret sharing for relational databases

P Rahmani, M Taheri, SM Fakhrahmad - IET Communications, 2023 - Wiley Online Library
Data encryption‐based and secret sharing‐based data outsourcing schemes protect the
confidentiality of sensitive attributes but not their secrecy. Ciphertexts/shares generated by a …

A Review on Verifiable Image Licensing Approaches

P Thakkar, N Doshi - International Conference on ICT for Sustainable …, 2023 - Springer
Image licensing involves granting permission to use an image while retaining ownership,
rather than selling the full rights to it. This permission allows the user to edit, sell, and …