A comprehensive survey of watermarking relational databases research

M Kamran, M Farooq - arXiv preprint arXiv:1801.08271, 2018 - arxiv.org
Watermarking and fingerprinting of relational databases are quite proficient for ownership
protection, tamper proofing, and proving data integrity. In past few years several such …

Comparative analysis of relational database watermarking techniques: An empirical study

S Rani, R Halder - IEEE Access, 2022 - ieeexplore.ieee.org
Digital watermarking is considered one of the most promising techniques to verify the
authenticity and integrity of digital data. It is used for a wide range of applications, eg …

Database watermarking, a technological protective measure: Perspective, security analysis and future directions

V Khanduja - Journal of information security and applications, 2017 - Elsevier
Digital Databases dynamically generates a major proportion of the internet content. The
databases are created, stored and accessed digitally and transmitted through computer …

HQR-scheme: A high quality and resilient virtual primary key generation approach for watermarking relational data

MLP Gort, C Feregrino-Uribe, A Cortesi… - Expert Systems with …, 2019 - Elsevier
Most of the watermarking techniques designed to protect relational data often use the
Primary Key (PK) of relations to perform the watermark synchronization. Despite offering …

Enabling information recovery with ownership using robust multiple watermarks

V Khanduja, S Chakraverty, OP Verma - Journal of Information Security and …, 2016 - Elsevier
With the increasing use of databases, there is an abundant opportunity to investigate new
watermarking techniques that cater to the requirements for emerging applications. A major …

[HTML][HTML] Comparison of DCT, SVD and BFOA based multimodal biometric watermarking systems

SAH Nair, P Aruna - Alexandria Engineering Journal, 2015 - Elsevier
Digital image watermarking is a major domain for hiding the biometric information, in which
the watermark data are made to be concealed inside a host image imposing imperceptible …

Semi-fragile watermarking scheme for relational database tamper detection

SA Shah, IA Khan, SZH Kazmi… - Malaysian Journal of …, 2021 - ojie.um.edu.my
Most of data over the Internet today is hosted on outsourced third-party servers which are not
trusted. Sometimes data is to be distributed to other organizations or individuals for pre …

Relational database security using digital watermarking and evolutionary techniques

H Tufail, K Zafar, AR Baig - Computational Intelligence, 2019 - Wiley Online Library
Advancement in the field of communication facilitates the world for electronic sharing of
huge amount of data. Relational databases most widely used and shared through Internet …

Partitioning-insensitive watermarking approach for distributed relational databases

S Rani, DK Koshley, R Halder - Transactions on Large-Scale Data-and …, 2017 - Springer
This paper introduces an efficient watermarking approach for distributed relational
databases, which is generic enough to support database outsourcing and hybrid …

[PDF][PDF] Reversible database watermarking with distortion control

S Siledar, DS Tamane - Indian J. Comput. Sci. Eng, 2021 - academia.edu
Database watermarking has emerged as an effective solution to protect ownership of
relational databases. Unlike images and videos, watermark insertion in databases can …