Journal articles on the topic 'WATERMARKED DATABASE'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'WATERMARKED DATABASE.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lin, Chia-Chen, Thai-Son Nguyen, and Chin-Chen Chang. "LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases." Symmetry 13, no. 11 (November 17, 2021): 2191. http://dx.doi.org/10.3390/sym13112191.
Full textHsieh, Shang-Lin, Chun-Che Chen, and Wen-Shan Shen. "Combining Digital Watermarking and Fingerprinting Techniques to Identify Copyrights for Color Images." Scientific World Journal 2014 (2014): 1–14. http://dx.doi.org/10.1155/2014/454867.
Full textChang, Chin-Chen, Thai-Son Nguyen, and Chia-Chen Lin. "A Blind Reversible Robust Watermarking Scheme for Relational Databases." Scientific World Journal 2013 (2013): 1–12. http://dx.doi.org/10.1155/2013/717165.
Full textThanki, Rohit, Surekha Borra, and Ashish Kothari. "Fragile Watermarking Framework for Tamper Detection of Color Biometric Images." International Journal of Digital Crime and Forensics 13, no. 2 (March 2021): 35–56. http://dx.doi.org/10.4018/ijdcf.2021030103.
Full textRM, Deepa. "Database Security with Fingerprint Masking." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (July 31, 2022): 3191–96. http://dx.doi.org/10.22214/ijraset.2022.45769.
Full textSankpal, Priya R., and P. A. Vijaya. "Performance Evaluation of Nested Watermarked Scheme using Objective Image Quality Metrics." Journal of University of Shanghai for Science and Technology 23, no. 06 (June 7, 2021): 306–14. http://dx.doi.org/10.51201/jusst/21/05273.
Full textLee, Yong-Joon, and Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking." Journal of Computational and Theoretical Nanoscience 18, no. 5 (May 1, 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Full textLee, Yong-Joon, and Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking." Journal of Computational and Theoretical Nanoscience 18, no. 5 (May 1, 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Full textZainal, Nasharuddin, Seri Mastura Mustaza, and Wan Noormaheran Wan Hussin. "Image Watermarking Technique for Digital Al-Quran based on Fibonacci Transform via DWT." Jurnal Kejuruteraan 34, no. 3 (May 30, 2022): 485–93. http://dx.doi.org/10.17576/jkukm-2022-34(3)-15.
Full textLi, Yan, Junwei Wang, and Xiangyang Luo. "A reversible database watermarking method non-redundancy shifting-based histogram gaps." International Journal of Distributed Sensor Networks 16, no. 5 (May 2020): 155014772092176. http://dx.doi.org/10.1177/1550147720921769.
Full textLi, Yuancheng, Longqiang Ma, and Xiang Li. "IDR Privacy Protection Based on Database Digital Watermarking." Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering) 13, no. 1 (February 20, 2020): 110–18. http://dx.doi.org/10.2174/2352096511666181119125538.
Full textLi, Zhi Ping, Chuan Xian Jiang, and Zhi Li. "A New Watermarking Algorithm for Relational Database Copyright Protection." Applied Mechanics and Materials 385-386 (August 2013): 1713–17. http://dx.doi.org/10.4028/www.scientific.net/amm.385-386.1713.
Full textVarghese, Justin, Omer Bin Hussain, Saudia Subash, and Abdul Razak T. "An effective digital image watermarking scheme incorporating DCT, DFT and SVD transformations." PeerJ Computer Science 9 (July 10, 2023): e1427. http://dx.doi.org/10.7717/peerj-cs.1427.
Full textCamara, Lancine, Junyi Li, Renfa Li, and Wenyong Xie. "Distortion-Free Watermarking Approach for Relational Database Integrity Checking." Mathematical Problems in Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/697165.
Full textBoostani, R., and M. Sabeti. "MULTI-CHANNEL ECG-BASED STEGANOGRAPHY." Biomedical Engineering: Applications, Basis and Communications 30, no. 06 (November 29, 2018): 1850046. http://dx.doi.org/10.4015/s1016237218500461.
Full textKumar, Manoj, and O. P. Verma. "Content characteristics based robust watermarking for relational database: a new approach to database security." International Journal of Engineering & Technology 7, no. 1.9 (March 1, 2018): 234. http://dx.doi.org/10.14419/ijet.v7i1.9.10003.
Full textKumar, Manoj, and O. P. Verma. "Content Characteristics Based Robust Watermarking for Relational Database: A New Approach to Database Security." International Journal of Engineering & Technology 7, no. 1.9 (March 1, 2018): 302. http://dx.doi.org/10.14419/ijet.v7i1.9.12694.
Full textMazhar, Mohammed, and Rajesh Dhakad. "Survey on Relational Database Watermarking Employing Evolutionary Methods." Journal of Information Technology and Sciences 9, no. 1 (January 16, 2023): 13–29. http://dx.doi.org/10.46610/joits.2023.v09i01.003.
Full textJoyce, S., and S. Veni. "Iris Biometric Watermarking for Authentication Using Multiband Discrete Wavelet Transform and Singular-Value Decomposition." International journal of electrical and computer engineering systems 14, no. 3 (March 28, 2023): 259–66. http://dx.doi.org/10.32985/ijeces.14.3.3.
Full textYao, Xiao Ming, Hong Yu Chen, Hong Lei Li, and Xiao Yi Zhou. "Tamper Detection in RFID Tags Using Zero-Watermarks." Applied Mechanics and Materials 511-512 (February 2014): 169–72. http://dx.doi.org/10.4028/www.scientific.net/amm.511-512.169.
Full textLi, Yan, Junwei Wang, and Hongyong Jia. "A Robust and Reversible Watermarking Algorithm for a Relational Database Based on Continuous Columns in Histogram." Mathematics 8, no. 11 (November 8, 2020): 1994. http://dx.doi.org/10.3390/math8111994.
Full textJi, Guang Cui, Zhen Rong Lin, and Jian Min Li. "A Watermarking Algorithm for Relational Database Based on Image." Advanced Materials Research 301-303 (July 2011): 661–65. http://dx.doi.org/10.4028/www.scientific.net/amr.301-303.661.
Full textImamoglu, Mustafa Bilgehan, Mustafa Ulutas, and Guzin Ulutas. "A New Reversible Database Watermarking Approach with Firefly Optimization Algorithm." Mathematical Problems in Engineering 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/1387375.
Full textLiu, Yi, and Juan Wang. "DWT Based Blind Watermark in Relational Database." Advanced Materials Research 760-762 (September 2013): 2123–28. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.2123.
Full textXian, Hequn, Jing Li, and Xiuqing Lu. "Tracing Mobile Database with Complex Watermark." International Journal of Database Theory and Application 8, no. 1 (February 28, 2015): 23–28. http://dx.doi.org/10.14257/ijdta.2015.8.1.03.
Full textKhatatneh, Khalaf, Ashraf Odeh, Ashraf Mashaleh, and Hind Hamadeen. "Secure Digital Databases using Watermarking based on English-Character Attributes." Recent Advances in Computer Science and Communications 13, no. 3 (August 12, 2020): 477–81. http://dx.doi.org/10.2174/2213275912666190103142858.
Full textHan, Yin Dan, and Jiang Feng Xu. "A New Relational Database Watermarking Algorithm Based on Chaos." Advanced Materials Research 971-973 (June 2014): 1485–90. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1485.
Full textSagarV, Ramani. "Watermark based Copyright Protection for Relational Database." International Journal of Computer Applications 78, no. 2 (September 18, 2013): 22–28. http://dx.doi.org/10.5120/13462-0713.
Full textKhanduja, Vidhi. "Dynamic Watermark Injection in NoSQL Databases." Journal of Computer Science Applications and Information Technology 2, no. 1 (January 2, 2017): 1–5. http://dx.doi.org/10.15226/2474-9257/2/1/00108.
Full textKamel, Ibrahim, Maha AlaaEddin, Waheeb Yaqub, and Kareem Kamel. "Distortion-free fragile watermark for relational databases." International Journal of Big Data Intelligence 3, no. 3 (2016): 190. http://dx.doi.org/10.1504/ijbdi.2016.078410.
Full textZhang, Ye Hong, Zhi Xian Gao, and Dong Xian Yu. "Speech Algorithm for Watermarking Relational Databases Based on Weighted." Advanced Materials Research 121-122 (June 2010): 399–404. http://dx.doi.org/10.4028/www.scientific.net/amr.121-122.399.
Full textZHU, Qin. "Digital watermark-based authentication of queries in outsourced database." Journal of Computer Applications 28, no. 3 (March 20, 2008): 605–8. http://dx.doi.org/10.3724/sp.j.1087.2008.00605.
Full textLiu, Yi, and Si Yu Lai. "Use of Watermark in Educational Administration System." Advanced Materials Research 760-762 (September 2013): 2129–34. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.2129.
Full textAhmed, Ismail Taha, Baraa Tareq Hammad, and Norziana Jamil. "Common Gabor Features for Image Watermarking Identification." Applied Sciences 11, no. 18 (September 8, 2021): 8308. http://dx.doi.org/10.3390/app11188308.
Full textKhan, Aihab, and Syed Afaq Husain. "A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations." Scientific World Journal 2013 (2013): 1–16. http://dx.doi.org/10.1155/2013/796726.
Full textRábai, Krisztina. "Jagellonian Ledgers as Sources for Watermark Research and Paper History Studies: The First Papermills of East-Central Europe." Średniowiecze Polskie i Powszechne 12 (December 16, 2020): 324–40. http://dx.doi.org/10.31261/spip.2020.16.14.
Full textHan, Ai Xia, and Yan Chen. "Research on Database Watermarking Algorithm Based on Genetic Algorithm." Applied Mechanics and Materials 687-691 (November 2014): 1297–99. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1297.
Full textGu, Wei, Ching-Chun Chang, Yu Bai, Yunyuan Fan, Liang Tao, and Li Li. "Anti-Screenshot Watermarking Algorithm for Archival Image Based on Deep Learning Model." Entropy 25, no. 2 (February 3, 2023): 288. http://dx.doi.org/10.3390/e25020288.
Full textHamadou, Ali, Lanciné Camara, Abdoul Aziz Issaka Hassane, and Harouna Naroua. "Reversible Fragile Watermarking Scheme for Relational Database Based on Prediction-Error Expansion." Mathematical Problems in Engineering 2020 (May 5, 2020): 1–9. http://dx.doi.org/10.1155/2020/1740205.
Full textJean E. Brown, A., and Richard Mulholland. "USING MICROFOCUS X-RADIOGRAPHY AND OTHER TECHNIQUES TO CREATE A DIGITAL WATERMARK DATABASE." Studies in Conservation 47, sup3 (September 2002): 21–26. http://dx.doi.org/10.1179/sic.2002.47.s3.005.
Full textPechyonkina, Angelika, and Igor Karmanov. "APPLICATION OF DIGITAL WATERMARKS FOR INTELLECTUAL PROPERTY PROTECTION." Interexpo GEO-Siberia 6, no. 2 (2019): 159–68. http://dx.doi.org/10.33764/2618-981x-2019-6-2-159-168.
Full textArif Shah, Saeed, Imran Ali Khan, Syed Zaki Hassan Kazmi, and Fariza Hanum Binti Md Nasaruddin. "SEMI-FRAGILE WATERMARKING SCHEME FOR RELATIONAL DATABASE TAMPER DETECTION." Malaysian Journal of Computer Science 34, no. 1 (January 31, 2021): 1–12. http://dx.doi.org/10.22452/mjcs.vol34no1.1.
Full textMin, Huang, Cao Jia-heng, Peng Zhi-yong, and Zeng Cheng. "A new mechanism based on similar clouds watermark for database's information security." Wuhan University Journal of Natural Sciences 9, no. 4 (July 2004): 415–19. http://dx.doi.org/10.1007/bf02830434.
Full textWang, Yue, Wei Li, and Yaojun Zhang. "Mathematical Model Design of the Traditional Dress Recognition Algorithm Based on Digital Watermarking Technology." Mathematical Problems in Engineering 2022 (September 30, 2022): 1–9. http://dx.doi.org/10.1155/2022/5230996.
Full textUmasankari, N., and Dr B.Muthukumar. "Biometrics Images Using Watermarking in an ICA." International Journal of Engineering & Technology 7, no. 4.10 (October 2, 2018): 780. http://dx.doi.org/10.14419/ijet.v7i4.10.26115.
Full textMaas, Tycho. "Tracing Personal Accounts in Colonial Knowledge Networks: Towards a Watermark Database for the Cape Colony, 1652–1795." Papers of the Bibliographical Society of America 117, no. 2 (June 1, 2023): 215–35. http://dx.doi.org/10.1086/725534.
Full textRazafindradina, Henri Bruno, and Paul Auguste Randriamitantsoa. "Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptibility." International Journal on Cryptography and Information Security 12, no. 4 (December 30, 2022): 01–11. http://dx.doi.org/10.5121/ijcis.2022.12401.
Full textKonda, Chaitanya, U. Sathish Kumar, and Arun Kodirekka. "Medical Image Watermarking for Tamper Detection in ROI Using LWT and Hashing." E3S Web of Conferences 391 (2023): 01139. http://dx.doi.org/10.1051/e3sconf/202339101139.
Full textLafta, Ali, and Ayad Abdulsada. "Secure Content-Based Image Retrieval with Copyright Protection within Cloud Computing Environment." Iraqi Journal for Electrical and Electronic Engineering 18, no. 2 (August 3, 2022): 82–91. http://dx.doi.org/10.37917/ijeee.18.2.11.
Full textSy, Nguyen Chi, Ha Hoang Kha, and Nguyen Minh Hoang. "An Efficient Digital Watermarking Technique for Color Images Using Directional Transforms." Journal of Science and Technology: Issue on Information and Communications Technology 3, no. 2 (December 31, 2017): 1. http://dx.doi.org/10.31130/jst.2017.57.
Full text