A comprehensive survey of watermarking relational databases research

M Kamran, M Farooq - arXiv preprint arXiv:1801.08271, 2018 - arxiv.org
Watermarking and fingerprinting of relational databases are quite proficient for ownership
protection, tamper proofing, and proving data integrity. In past few years several such …

A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations

A Khan, SA Husain - The Scientific World Journal, 2013 - Wiley Online Library
We put forward a fragile zero watermarking scheme to detect and characterize malicious
modifications made to a database relation. Most of the existing watermarking schemes for …

A reversible watermarking technique for social network data sets for enabling data trust in cyber, physical, and social computing

S Iftikhar, M Kamran, EU Munir… - IEEE Systems Journal, 2015 - ieeexplore.ieee.org
Social network data are being mined for extracting interesting patterns. Such data are
collected by different researchers and organizations and are usually also shared via …

Distortion-free fragile watermark for relational databases

I Kamel, M AlaaEddin, W Yaqub… - International Journal of …, 2016 - inderscienceonline.com
Unauthorised changes to databases may result in significant losses for organisations. Digital
watermarking can be used for protecting the integrity of relational databases. Prior …

Spatial and spectral digital watermarking with robustness evaluation

N Sruthi, AV Sheetal, V Elamaran - … International Conference on …, 2014 - ieeexplore.ieee.org
Any kind of data like image, video, audio and text are embedded with an another multimedia
content is known as digital watermarking. One which is embedded is known as watermark or …

Fingerprinting non-numeric datasets using row association and pattern generation

M Ahmad, A Shahid, MY Qadri… - 2017 International …, 2017 - ieeexplore.ieee.org
Being an era of fast internet-based application environment, large volumes of relational data
are being outsourced for business purposes. Therefore, ownership and digital rights …

[PDF][PDF] Block-based scheme for database integrity verification

L Camara, J Li, R Li, F Kagorora… - International Journal of …, 2014 - academia.edu
Databases play an important role today in every modern organization, verifying their integrity
is needed. Watermarking can be used to protect the integrity of database. In this paper, we …

On the role of optimization algorithms in ownership-preserving data mining

M Kamran, EU Munir - Frontiers of Information Technology & Electronic …, 2018 - Springer
Abstract Knowledge extraction from sensitive data often needs collaborative work. Statistical
databases are generated from such data and shared among various stakeholders. In this …

优化算法在所有权保留数据挖掘中的应用

M Kamran, EU Munir, AM Kamran, AEU Munir - Frontiers, 2018 - jzus.zju.edu.cn
从敏感数据中提取知识往往需要协同工作. 统计数据库根据这些敏感数据生成,
并由各利益相关方共享. 在此情况下, 共享数据的所有权保护变得尤为重要 …

[PDF][PDF] A zero-distortion fragile watermarking scheme to detect and localize malicious modifications in textual database relations

AS Alfagi, AA Manaf, B Hamida… - Journal of Theoretical …, 2016 - researchgate.net
In this paper, we present a new zero-distortion fragile watermarking scheme to detect and
localize malicious modifications in textual database relations. Most existing fragile …