A traitor identification technique for numeric relational databases with distortion minimization and collusion avoidance

AA Mohanpurkar, MS Joshi - International Journal of Ambient …, 2016 - igi-global.com
An enormous growth in internet usage has resulted into great amounts of digital data to
handle. Data sharing has become significant and unavoidable. Data owners want the data …

New fragile database watermarking scheme with restoration using reed-solomon codes

L Gao, D Wang, A Hamadou - Journal of Computational and …, 2013 - ingentaconnect.com
The protection of databases integrity is currently a very active research field in digital
watermarking. However, existing fragile watermarking schemes mostly focus in tamper …

Approach of tamper detection for sensitive data based on negotiable hash algorithm

J Lin, C Mi, Y Shi - International Journal of Performability …, 2017 - ijpe-online.com
Sensitive data is a very important to information safety. The real-world sensitive data is often
illegally altered because database administrators (DBAs) have special identity and …

[引用][C] An improved ICA-based digital watermarking

Y Zhang, H Bi, B Zhu, B Dong - Advances in …, 2012 - The International Association for …

[引用][C] The Development of Data Warehouse System Based on Msql Server

Z Zhou - … of Digital Content Technology and its …, 2012 - Advanced Institute of Convergence …

[引用][C] Big Data Privacy Preservation and Security Protection

[引用][C] The Development and Application of Rendering Platform by using DCT Parallel Accelerating Algorithm

LY Zhuang, PJ Wang, ZH Jia - Journal of …, 2013 - Advanced Institute of Convergence …