2009 International Conference on Measuring Technology and Mechatronics Automation 2009
DOI: 10.1109/icmtma.2009.278
|View full text |Cite
|
Sign up to set email alerts
|

An Image Based Algorithm for Watermarking Relational Databases

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2010
2010
2020
2020

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 9 publications
0
16
0
Order By: Relevance
“…Zhongyan Hu et al [7] proposed an image based algorithm for watermarking relational databases. They propose a novel watermarking method, which embeds an image watermark into relational results verify the effectiveness of the database.…”
Section: Related Workmentioning
confidence: 99%
“…Zhongyan Hu et al [7] proposed an image based algorithm for watermarking relational databases. They propose a novel watermarking method, which embeds an image watermark into relational results verify the effectiveness of the database.…”
Section: Related Workmentioning
confidence: 99%
“…Using images for user authentication has been in speculation for a period of time [1,[3][4][5]8] and the idea of using video has also appeared [9,12]. We briefly review some basic technologies that are currently used for preventing/detecting information leakage in this section.…”
Section: Technology and Motivationmentioning
confidence: 99%
“…Watermark methodology [1,3] of protecting data is based on embedding a unique code to every copy of the data. The method provides good security, but it involves the modification of the original data, which is not a desired thing in a common sense.…”
Section: Technology and Motivationmentioning
confidence: 99%
See 1 more Smart Citation
“…Rakesh Agrawal and Kiernan [2] introduced the idea for watermarking Relational Database for the first time, many people have given their own algorithm for preserving relational database integrity. Hu,Cao and Sun [6] have suggested a scheme using an image as watermarks, while Pournaghshband [8] have tried to introduce 'fake' tuples among the original tuples. However, our technique successfully tested for reducing the chances of Subset Selection attack.…”
Section: Related Workmentioning
confidence: 99%