Journal articles on the topic 'DATABASE WATERMARKING'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'DATABASE WATERMARKING.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Kumar, Manoj, and O. P. Verma. "Content characteristics based robust watermarking for relational database: a new approach to database security." International Journal of Engineering & Technology 7, no. 1.9 (March 1, 2018): 234. http://dx.doi.org/10.14419/ijet.v7i1.9.10003.
Full textKumar, Manoj, and O. P. Verma. "Content Characteristics Based Robust Watermarking for Relational Database: A New Approach to Database Security." International Journal of Engineering & Technology 7, no. 1.9 (March 1, 2018): 302. http://dx.doi.org/10.14419/ijet.v7i1.9.12694.
Full textMazhar, Mohammed, and Rajesh Dhakad. "Survey on Relational Database Watermarking Employing Evolutionary Methods." Journal of Information Technology and Sciences 9, no. 1 (January 16, 2023): 13–29. http://dx.doi.org/10.46610/joits.2023.v09i01.003.
Full textKhan, Aihab, and Syed Afaq Husain. "A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations." Scientific World Journal 2013 (2013): 1–16. http://dx.doi.org/10.1155/2013/796726.
Full textJi, Guang Cui, Zhen Rong Lin, and Jian Min Li. "A Watermarking Algorithm for Relational Database Based on Image." Advanced Materials Research 301-303 (July 2011): 661–65. http://dx.doi.org/10.4028/www.scientific.net/amr.301-303.661.
Full textWang, Mei Ting. "Relational Database Watermarking Algorithm Based on Comparison Table." Applied Mechanics and Materials 433-435 (October 2013): 1800–1804. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1800.
Full textZhang, Ye Hong, Zhi Xian Gao, and Dong Xian Yu. "Speech Algorithm for Watermarking Relational Databases Based on Weighted." Advanced Materials Research 121-122 (June 2010): 399–404. http://dx.doi.org/10.4028/www.scientific.net/amr.121-122.399.
Full textLi, Yan, Junwei Wang, and Xiangyang Luo. "A reversible database watermarking method non-redundancy shifting-based histogram gaps." International Journal of Distributed Sensor Networks 16, no. 5 (May 2020): 155014772092176. http://dx.doi.org/10.1177/1550147720921769.
Full textImamoglu, Mustafa Bilgehan, Mustafa Ulutas, and Guzin Ulutas. "A New Reversible Database Watermarking Approach with Firefly Optimization Algorithm." Mathematical Problems in Engineering 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/1387375.
Full textAlqassab, Asmaa, and Mafaz Alanezi. "Relational Database Watermarking Techniques: A Survey." Journal of Physics: Conference Series 1818, no. 1 (March 1, 2021): 012185. http://dx.doi.org/10.1088/1742-6596/1818/1/012185.
Full textSiledar, Seema, and Dr Sharvari Tamane. "REVERSIBLE DATABASE WATERMARKING WITH DISTORTION CONTROL." Indian Journal of Computer Science and Engineering 12, no. 5 (October 20, 2021): 1503–9. http://dx.doi.org/10.21817/indjcse/2021/v12i5/211205166.
Full text朱, 洪斌. "A New Practical Database Watermarking Method." Computer Science and Application 10, no. 07 (2020): 1400–1408. http://dx.doi.org/10.12677/csa.2020.107144.
Full textRao, Udai Pratap, Dhiren R. Patel, and Punitkumar M. Vikani. "Relational Database Watermarking for Ownership Protection." Procedia Technology 6 (2012): 988–95. http://dx.doi.org/10.1016/j.protcy.2012.10.120.
Full textCamara, Lancine, Junyi Li, Renfa Li, and Wenyong Xie. "Distortion-Free Watermarking Approach for Relational Database Integrity Checking." Mathematical Problems in Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/697165.
Full textHamadou, Ali, Lanciné Camara, Abdoul Aziz Issaka Hassane, and Harouna Naroua. "Reversible Fragile Watermarking Scheme for Relational Database Based on Prediction-Error Expansion." Mathematical Problems in Engineering 2020 (May 5, 2020): 1–9. http://dx.doi.org/10.1155/2020/1740205.
Full textHan, Ai Xia, and Yan Chen. "Research on Database Watermarking Algorithm Based on Genetic Algorithm." Applied Mechanics and Materials 687-691 (November 2014): 1297–99. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1297.
Full textLin, Chia-Chen, Thai-Son Nguyen, and Chin-Chen Chang. "LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases." Symmetry 13, no. 11 (November 17, 2021): 2191. http://dx.doi.org/10.3390/sym13112191.
Full textHosseinMoradian Sardroudi, Subariah Ibrahim, and OmidZanganeh. "Robust Database Watermarking Technique over Numerical Data." Journal of Communications and Information Sciences 1, no. 1 (April 30, 2011): 30–40. http://dx.doi.org/10.4156/jcis.vol1.issue1.4.
Full textZhu, Qing. "Digital watermarking technology based on relational database." Journal of Interdisciplinary Mathematics 21, no. 5 (July 4, 2018): 1211–15. http://dx.doi.org/10.1080/09720502.2018.1495226.
Full textXiang, Shijun, and Jiayong He. "Database authentication watermarking scheme in encrypted domain." IET Information Security 12, no. 1 (January 1, 2018): 42–51. http://dx.doi.org/10.1049/iet-ifs.2017.0092.
Full textArif Shah, Saeed, Imran Ali Khan, Syed Zaki Hassan Kazmi, and Fariza Hanum Binti Md Nasaruddin. "SEMI-FRAGILE WATERMARKING SCHEME FOR RELATIONAL DATABASE TAMPER DETECTION." Malaysian Journal of Computer Science 34, no. 1 (January 31, 2021): 1–12. http://dx.doi.org/10.22452/mjcs.vol34no1.1.
Full textRM, Deepa. "Database Security with Fingerprint Masking." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 3191–96. http://dx.doi.org/10.22214/ijraset.2022.45769.
Full textLi, Zhi Ping, Chuan Xian Jiang, and Zhi Li. "A New Watermarking Algorithm for Relational Database Copyright Protection." Applied Mechanics and Materials 385-386 (August 2013): 1713–17. http://dx.doi.org/10.4028/www.scientific.net/amm.385-386.1713.
Full textHsieh, Shang-Lin, Chun-Che Chen, and Wen-Shan Shen. "Combining Digital Watermarking and Fingerprinting Techniques to Identify Copyrights for Color Images." Scientific World Journal 2014 (2014): 1–14. http://dx.doi.org/10.1155/2014/454867.
Full textKumar, Manoj, O. P., and Archana Saxena. "Elliptic Curve Cryptography (ECC) based Relational Database Watermarking." International Journal of Computer Applications 154, no. 6 (November 17, 2016): 20–28. http://dx.doi.org/10.5120/ijca2016912159.
Full textLi, Yuancheng, Longqiang Ma, and Xiang Li. "IDR Privacy Protection Based on Database Digital Watermarking." Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering) 13, no. 1 (February 20, 2020): 110–18. http://dx.doi.org/10.2174/2352096511666181119125538.
Full textGupta, Gaurav, and Josef Pieprzyk. "Reversible and Blind Database Watermarking Using Difference Expansion." International Journal of Digital Crime and Forensics 1, no. 2 (April 2009): 42–54. http://dx.doi.org/10.4018/jdcf.2009040104.
Full textAl-Haj, Ali, and Ashraf Odeh. "Robust and Blind Watermarking of Relational Database Systems." Journal of Computer Science 4, no. 12 (December 1, 2008): 1024–29. http://dx.doi.org/10.3844/jcssp.2008.1024.1029.
Full textLi, Yan, Junwei Wang, Shuangkui Ge, Xiangyang Luo, and Bo Wang. "A reversible database watermarking method with low distortion." Mathematical Biosciences and Engineering 16, no. 5 (2019): 4053–5068. http://dx.doi.org/10.3934/mbe.2019200.
Full textKumar, Sanjay, Binod Kumar Singh, and Mohit Yadav. "A Recent Survey on Multimedia and Database Watermarking." Multimedia Tools and Applications 79, no. 27-28 (April 15, 2020): 20149–97. http://dx.doi.org/10.1007/s11042-020-08881-y.
Full textSy, Nguyen Chi, Ha Hoang Kha, and Nguyen Minh Hoang. "An Efficient Digital Watermarking Technique for Color Images Using Directional Transforms." Journal of Science and Technology: Issue on Information and Communications Technology 3, no. 2 (December 31, 2017): 1. http://dx.doi.org/10.31130/jst.2017.57.
Full textAli, Zulfiqar, Fazal-e-Amin, and Muhammad Hussain. "A Novel Fragile Zero-Watermarking Algorithm for Digital Medical Images." Electronics 11, no. 5 (February 25, 2022): 710. http://dx.doi.org/10.3390/electronics11050710.
Full textChang, Chin-Chen, Thai-Son Nguyen, and Chia-Chen Lin. "A Blind Reversible Robust Watermarking Scheme for Relational Databases." Scientific World Journal 2013 (2013): 1–12. http://dx.doi.org/10.1155/2013/717165.
Full textBedi, Rajneeshkaur, Anita Thengade, and Dr Vijay M.Wadhai. "A New Watermarking Approach for Non numeric Relational Database." International Journal of Computer Applications 13, no. 7 (January 12, 2011): 37–40. http://dx.doi.org/10.5120/1790-2473.
Full textTufail, Hina, Kashif Zafar, and Abdul Rauf Baig. "Relational database security using digital watermarking and evolutionary techniques." Computational Intelligence 35, no. 4 (April 29, 2019): 693–716. http://dx.doi.org/10.1111/coin.12209.
Full textHan, Yin Dan, and Jiang Feng Xu. "A New Relational Database Watermarking Algorithm Based on Chaos." Advanced Materials Research 971-973 (June 2014): 1485–90. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1485.
Full textLiu, Yi, and Juan Wang. "DWT Based Blind Watermark in Relational Database." Advanced Materials Research 760-762 (September 2013): 2123–28. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.2123.
Full textKhatatneh, Khalaf, Ashraf Odeh, Ashraf Mashaleh, and Hind Hamadeen. "Secure Digital Databases using Watermarking based on English-Character Attributes." Recent Advances in Computer Science and Communications 13, no. 3 (August 12, 2020): 477–81. http://dx.doi.org/10.2174/2213275912666190103142858.
Full textSankpal, Priya R., and P. A. Vijaya. "Performance Evaluation of Nested Watermarked Scheme using Objective Image Quality Metrics." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 7, 2021): 306–14. http://dx.doi.org/10.51201/jusst/21/05273.
Full textGarcia-Hernandez, Jose Juan, Claudia Feregrino-Uribe, Alejandra Menendez-Ortiz, and Dan Williams Robledo-Cruz. "Evaluation of a Framework for Robust Image Reversible Watermarking." Applied Sciences 12, no. 14 (July 18, 2022): 7242. http://dx.doi.org/10.3390/app12147242.
Full textThanki, Rohit, Surekha Borra, and Ashish Kothari. "Fragile Watermarking Framework for Tamper Detection of Color Biometric Images." International Journal of Digital Crime and Forensics 13, no. 2 (March 2021): 35–56. http://dx.doi.org/10.4018/ijdcf.2021030103.
Full textAhmed, Ismail Taha, Baraa Tareq Hammad, and Norziana Jamil. "Common Gabor Features for Image Watermarking Identification." Applied Sciences 11, no. 18 (September 8, 2021): 8308. http://dx.doi.org/10.3390/app11188308.
Full textK. Bedi, Rajneeshkaur, and Dr V. M. Wadhai. "Watermarking Relational Database Using Hindi Phonemes and Hill Cipher Technique." IOSR Journal of Computer Engineering 16, no. 3 (2014): 102–7. http://dx.doi.org/10.9790/0661-1633102107.
Full textRani, Sapana, and Raju Halder. "Comparative Analysis of Relational Database Watermarking Techniques: An Empirical Study." IEEE Access 10 (2022): 27970–89. http://dx.doi.org/10.1109/access.2022.3157866.
Full textAgila, G., and N. R. Ananthanarayanan. "Watermarking Technique using UID for Relational Data Saving in Database." International Journal of Computer Applications 132, no. 2 (December 17, 2015): 37–45. http://dx.doi.org/10.5120/ijca2015907305.
Full textMA, Rui-min, and Ji-hong CHEN. "Database watermarking algorithm based on parity modulation in two-dimension space." Journal of Computer Applications 32, no. 8 (May 7, 2013): 2268–70. http://dx.doi.org/10.3724/sp.j.1087.2012.02268.
Full textS. Alghamdi, Ahmed, Surayya Naz, Ammar Saeed, Eesa Al Solami, Muhammad Kamran, and Mohammed Saeed Alkatheiri. "A Novel Database Watermarking Technique Using Blockchain as Trusted Third Party." Computers, Materials & Continua 70, no. 1 (2022): 1585–601. http://dx.doi.org/10.32604/cmc.2022.019936.
Full textA. El Drandaly, Khalid, Walid Khedr, Islam S. Mohamed, and Ayman Mohamed Mostafa. "Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model." Computers, Materials & Continua 71, no. 3 (2022): 5253–70. http://dx.doi.org/10.32604/cmc.2022.023684.
Full textGao, Lingyun, Dong Wang, and Ali Hamadou. "New Fragile Database Watermarking Scheme with Restoration Using Reed-Solomon Codes." Journal of Computational and Theoretical Nanoscience 10, no. 1 (January 1, 2013): 147–53. http://dx.doi.org/10.1166/jctn.2013.2671.
Full textLian, Junyao. "A New Reversible Database Watermarking Approach with Ant Colony Optimization Algorithm." Journal of Physics: Conference Series 1616 (August 2020): 012040. http://dx.doi.org/10.1088/1742-6596/1616/1/012040.
Full text