2020 International Conference on Smart Innovations in Design, Environment, Management, Planning and Computing (ICSIDEMPC) 2020
DOI: 10.1109/icsidempc49020.2020.9299653
|View full text |Cite
|
Sign up to set email alerts
|

A distortion-free watermarking approach for verifying integrity of relational databases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 9 publications
0
4
0
Order By: Relevance
“…Authors in [72] have adapted the MapReduce paradigm for watermarking of relational databases to decrease the computational cost and have implemented distortion-free algorithms in both sequential and MapReduce form. The proposal in [73] generates an image as a watermark from the database content. In [74], each column (attribute) is organized into groups, each having g data elements.…”
Section: E: Othersmentioning
confidence: 99%
“…Authors in [72] have adapted the MapReduce paradigm for watermarking of relational databases to decrease the computational cost and have implemented distortion-free algorithms in both sequential and MapReduce form. The proposal in [73] generates an image as a watermark from the database content. In [74], each column (attribute) is organized into groups, each having g data elements.…”
Section: E: Othersmentioning
confidence: 99%
“…The behavior of recurrent selection is described by the weight-based capacity metric c w also introduced in [1] according to (5), where the number of times the meta-mark m k is selected, is given by the function κ(m k ). The weight-based capacity constitutes the accumulation of every time each metamark was selected.…”
Section: F(t I [Pk]) = H(sk • H(sk • T I [Pk]))mentioning
confidence: 99%
“…Usually, distortion-free techniques are defined as fragile, while distortion-based as robust approaches, to the extent that the embedded information survives at malicious or accidental attempts to remove it [1], [55]. Relational watermarking techniques can also be classified by their (i) cover-type, defining the type of data of the attribute in R selected to embed the marks; (ii) intent, i.e., ownership protection [1]- [3], [56], data tampering detection [4], [5], [57], traitor tracing [58]- [62], among others; (iii) watermark source, which can be meaningless such as a random binary stream [19], [31], or meaningful, i.e., a source for watermark generation presenting a meaning that does not depend on the watermarking technique [17], [64], [65]. Regarding the covertype, some techniques embed the watermark into attributes storing categorical values [66]- [69], information regarding date or time [70], textual [1], [47] or numerical content [17], [71], [72].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation