Artículos de revistas sobre el tema "WATERMARKED DATABASE"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "WATERMARKED DATABASE".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Lin, Chia-Chen, Thai-Son Nguyen y Chin-Chen Chang. "LRW-CRDB: Lossless Robust Watermarking Scheme for Categorical Relational Databases". Symmetry 13, n.º 11 (17 de noviembre de 2021): 2191. http://dx.doi.org/10.3390/sym13112191.
Texto completoHsieh, Shang-Lin, Chun-Che Chen y Wen-Shan Shen. "Combining Digital Watermarking and Fingerprinting Techniques to Identify Copyrights for Color Images". Scientific World Journal 2014 (2014): 1–14. http://dx.doi.org/10.1155/2014/454867.
Texto completoChang, Chin-Chen, Thai-Son Nguyen y Chia-Chen Lin. "A Blind Reversible Robust Watermarking Scheme for Relational Databases". Scientific World Journal 2013 (2013): 1–12. http://dx.doi.org/10.1155/2013/717165.
Texto completoThanki, Rohit, Surekha Borra y Ashish Kothari. "Fragile Watermarking Framework for Tamper Detection of Color Biometric Images". International Journal of Digital Crime and Forensics 13, n.º 2 (marzo de 2021): 35–56. http://dx.doi.org/10.4018/ijdcf.2021030103.
Texto completoRM, Deepa. "Database Security with Fingerprint Masking". International Journal for Research in Applied Science and Engineering Technology 10, n.º 7 (31 de julio de 2022): 3191–96. http://dx.doi.org/10.22214/ijraset.2022.45769.
Texto completoSankpal, Priya R. y P. A. Vijaya. "Performance Evaluation of Nested Watermarked Scheme using Objective Image Quality Metrics". Journal of University of Shanghai for Science and Technology 23, n.º 06 (7 de junio de 2021): 306–14. http://dx.doi.org/10.51201/jusst/21/05273.
Texto completoLee, Yong-Joon y Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking". Journal of Computational and Theoretical Nanoscience 18, n.º 5 (1 de mayo de 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Texto completoLee, Yong-Joon y Won-Shik Na. "E-Passport Advanced Security Technique Using Biometric Information Watermarking". Journal of Computational and Theoretical Nanoscience 18, n.º 5 (1 de mayo de 2021): 1540–49. http://dx.doi.org/10.1166/jctn.2021.9614.
Texto completoZainal, Nasharuddin, Seri Mastura Mustaza y Wan Noormaheran Wan Hussin. "Image Watermarking Technique for Digital Al-Quran based on Fibonacci Transform via DWT". Jurnal Kejuruteraan 34, n.º 3 (30 de mayo de 2022): 485–93. http://dx.doi.org/10.17576/jkukm-2022-34(3)-15.
Texto completoLi, Yan, Junwei Wang y Xiangyang Luo. "A reversible database watermarking method non-redundancy shifting-based histogram gaps". International Journal of Distributed Sensor Networks 16, n.º 5 (mayo de 2020): 155014772092176. http://dx.doi.org/10.1177/1550147720921769.
Texto completoLi, Yuancheng, Longqiang Ma y Xiang Li. "IDR Privacy Protection Based on Database Digital Watermarking". Recent Advances in Electrical & Electronic Engineering (Formerly Recent Patents on Electrical & Electronic Engineering) 13, n.º 1 (20 de febrero de 2020): 110–18. http://dx.doi.org/10.2174/2352096511666181119125538.
Texto completoLi, Zhi Ping, Chuan Xian Jiang y Zhi Li. "A New Watermarking Algorithm for Relational Database Copyright Protection". Applied Mechanics and Materials 385-386 (agosto de 2013): 1713–17. http://dx.doi.org/10.4028/www.scientific.net/amm.385-386.1713.
Texto completoVarghese, Justin, Omer Bin Hussain, Saudia Subash y Abdul Razak T. "An effective digital image watermarking scheme incorporating DCT, DFT and SVD transformations". PeerJ Computer Science 9 (10 de julio de 2023): e1427. http://dx.doi.org/10.7717/peerj-cs.1427.
Texto completoCamara, Lancine, Junyi Li, Renfa Li y Wenyong Xie. "Distortion-Free Watermarking Approach for Relational Database Integrity Checking". Mathematical Problems in Engineering 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/697165.
Texto completoBoostani, R. y M. Sabeti. "MULTI-CHANNEL ECG-BASED STEGANOGRAPHY". Biomedical Engineering: Applications, Basis and Communications 30, n.º 06 (29 de noviembre de 2018): 1850046. http://dx.doi.org/10.4015/s1016237218500461.
Texto completoKumar, Manoj y O. P. Verma. "Content characteristics based robust watermarking for relational database: a new approach to database security". International Journal of Engineering & Technology 7, n.º 1.9 (1 de marzo de 2018): 234. http://dx.doi.org/10.14419/ijet.v7i1.9.10003.
Texto completoKumar, Manoj y O. P. Verma. "Content Characteristics Based Robust Watermarking for Relational Database: A New Approach to Database Security". International Journal of Engineering & Technology 7, n.º 1.9 (1 de marzo de 2018): 302. http://dx.doi.org/10.14419/ijet.v7i1.9.12694.
Texto completoMazhar, Mohammed y Rajesh Dhakad. "Survey on Relational Database Watermarking Employing Evolutionary Methods". Journal of Information Technology and Sciences 9, n.º 1 (16 de enero de 2023): 13–29. http://dx.doi.org/10.46610/joits.2023.v09i01.003.
Texto completoJoyce, S. y S. Veni. "Iris Biometric Watermarking for Authentication Using Multiband Discrete Wavelet Transform and Singular-Value Decomposition". International journal of electrical and computer engineering systems 14, n.º 3 (28 de marzo de 2023): 259–66. http://dx.doi.org/10.32985/ijeces.14.3.3.
Texto completoYao, Xiao Ming, Hong Yu Chen, Hong Lei Li y Xiao Yi Zhou. "Tamper Detection in RFID Tags Using Zero-Watermarks". Applied Mechanics and Materials 511-512 (febrero de 2014): 169–72. http://dx.doi.org/10.4028/www.scientific.net/amm.511-512.169.
Texto completoLi, Yan, Junwei Wang y Hongyong Jia. "A Robust and Reversible Watermarking Algorithm for a Relational Database Based on Continuous Columns in Histogram". Mathematics 8, n.º 11 (8 de noviembre de 2020): 1994. http://dx.doi.org/10.3390/math8111994.
Texto completoJi, Guang Cui, Zhen Rong Lin y Jian Min Li. "A Watermarking Algorithm for Relational Database Based on Image". Advanced Materials Research 301-303 (julio de 2011): 661–65. http://dx.doi.org/10.4028/www.scientific.net/amr.301-303.661.
Texto completoImamoglu, Mustafa Bilgehan, Mustafa Ulutas y Guzin Ulutas. "A New Reversible Database Watermarking Approach with Firefly Optimization Algorithm". Mathematical Problems in Engineering 2017 (2017): 1–14. http://dx.doi.org/10.1155/2017/1387375.
Texto completoLiu, Yi y Juan Wang. "DWT Based Blind Watermark in Relational Database". Advanced Materials Research 760-762 (septiembre de 2013): 2123–28. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.2123.
Texto completoXian, Hequn, Jing Li y Xiuqing Lu. "Tracing Mobile Database with Complex Watermark". International Journal of Database Theory and Application 8, n.º 1 (28 de febrero de 2015): 23–28. http://dx.doi.org/10.14257/ijdta.2015.8.1.03.
Texto completoKhatatneh, Khalaf, Ashraf Odeh, Ashraf Mashaleh y Hind Hamadeen. "Secure Digital Databases using Watermarking based on English-Character Attributes". Recent Advances in Computer Science and Communications 13, n.º 3 (12 de agosto de 2020): 477–81. http://dx.doi.org/10.2174/2213275912666190103142858.
Texto completoHan, Yin Dan y Jiang Feng Xu. "A New Relational Database Watermarking Algorithm Based on Chaos". Advanced Materials Research 971-973 (junio de 2014): 1485–90. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1485.
Texto completoSagarV, Ramani. "Watermark based Copyright Protection for Relational Database". International Journal of Computer Applications 78, n.º 2 (18 de septiembre de 2013): 22–28. http://dx.doi.org/10.5120/13462-0713.
Texto completoKhanduja, Vidhi. "Dynamic Watermark Injection in NoSQL Databases". Journal of Computer Science Applications and Information Technology 2, n.º 1 (2 de enero de 2017): 1–5. http://dx.doi.org/10.15226/2474-9257/2/1/00108.
Texto completoKamel, Ibrahim, Maha AlaaEddin, Waheeb Yaqub y Kareem Kamel. "Distortion-free fragile watermark for relational databases". International Journal of Big Data Intelligence 3, n.º 3 (2016): 190. http://dx.doi.org/10.1504/ijbdi.2016.078410.
Texto completoZhang, Ye Hong, Zhi Xian Gao y Dong Xian Yu. "Speech Algorithm for Watermarking Relational Databases Based on Weighted". Advanced Materials Research 121-122 (junio de 2010): 399–404. http://dx.doi.org/10.4028/www.scientific.net/amr.121-122.399.
Texto completoZHU, Qin. "Digital watermark-based authentication of queries in outsourced database". Journal of Computer Applications 28, n.º 3 (20 de marzo de 2008): 605–8. http://dx.doi.org/10.3724/sp.j.1087.2008.00605.
Texto completoLiu, Yi y Si Yu Lai. "Use of Watermark in Educational Administration System". Advanced Materials Research 760-762 (septiembre de 2013): 2129–34. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.2129.
Texto completoAhmed, Ismail Taha, Baraa Tareq Hammad y Norziana Jamil. "Common Gabor Features for Image Watermarking Identification". Applied Sciences 11, n.º 18 (8 de septiembre de 2021): 8308. http://dx.doi.org/10.3390/app11188308.
Texto completoKhan, Aihab y Syed Afaq Husain. "A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations". Scientific World Journal 2013 (2013): 1–16. http://dx.doi.org/10.1155/2013/796726.
Texto completoRábai, Krisztina. "Jagellonian Ledgers as Sources for Watermark Research and Paper History Studies: The First Papermills of East-Central Europe". Średniowiecze Polskie i Powszechne 12 (16 de diciembre de 2020): 324–40. http://dx.doi.org/10.31261/spip.2020.16.14.
Texto completoHan, Ai Xia y Yan Chen. "Research on Database Watermarking Algorithm Based on Genetic Algorithm". Applied Mechanics and Materials 687-691 (noviembre de 2014): 1297–99. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.1297.
Texto completoGu, Wei, Ching-Chun Chang, Yu Bai, Yunyuan Fan, Liang Tao y Li Li. "Anti-Screenshot Watermarking Algorithm for Archival Image Based on Deep Learning Model". Entropy 25, n.º 2 (3 de febrero de 2023): 288. http://dx.doi.org/10.3390/e25020288.
Texto completoHamadou, Ali, Lanciné Camara, Abdoul Aziz Issaka Hassane y Harouna Naroua. "Reversible Fragile Watermarking Scheme for Relational Database Based on Prediction-Error Expansion". Mathematical Problems in Engineering 2020 (5 de mayo de 2020): 1–9. http://dx.doi.org/10.1155/2020/1740205.
Texto completoJean E. Brown, A. y Richard Mulholland. "USING MICROFOCUS X-RADIOGRAPHY AND OTHER TECHNIQUES TO CREATE A DIGITAL WATERMARK DATABASE". Studies in Conservation 47, sup3 (septiembre de 2002): 21–26. http://dx.doi.org/10.1179/sic.2002.47.s3.005.
Texto completoPechyonkina, Angelika y Igor Karmanov. "APPLICATION OF DIGITAL WATERMARKS FOR INTELLECTUAL PROPERTY PROTECTION". Interexpo GEO-Siberia 6, n.º 2 (2019): 159–68. http://dx.doi.org/10.33764/2618-981x-2019-6-2-159-168.
Texto completoArif Shah, Saeed, Imran Ali Khan, Syed Zaki Hassan Kazmi y Fariza Hanum Binti Md Nasaruddin. "SEMI-FRAGILE WATERMARKING SCHEME FOR RELATIONAL DATABASE TAMPER DETECTION". Malaysian Journal of Computer Science 34, n.º 1 (31 de enero de 2021): 1–12. http://dx.doi.org/10.22452/mjcs.vol34no1.1.
Texto completoMin, Huang, Cao Jia-heng, Peng Zhi-yong y Zeng Cheng. "A new mechanism based on similar clouds watermark for database's information security". Wuhan University Journal of Natural Sciences 9, n.º 4 (julio de 2004): 415–19. http://dx.doi.org/10.1007/bf02830434.
Texto completoWang, Yue, Wei Li y Yaojun Zhang. "Mathematical Model Design of the Traditional Dress Recognition Algorithm Based on Digital Watermarking Technology". Mathematical Problems in Engineering 2022 (30 de septiembre de 2022): 1–9. http://dx.doi.org/10.1155/2022/5230996.
Texto completoUmasankari, N. y Dr B.Muthukumar. "Biometrics Images Using Watermarking in an ICA". International Journal of Engineering & Technology 7, n.º 4.10 (2 de octubre de 2018): 780. http://dx.doi.org/10.14419/ijet.v7i4.10.26115.
Texto completoMaas, Tycho. "Tracing Personal Accounts in Colonial Knowledge Networks: Towards a Watermark Database for the Cape Colony, 1652–1795". Papers of the Bibliographical Society of America 117, n.º 2 (1 de junio de 2023): 215–35. http://dx.doi.org/10.1086/725534.
Texto completoRazafindradina, Henri Bruno y Paul Auguste Randriamitantsoa. "Multiple Image Watermarking based on SVD : Improving Capacity and Imperceptibility". International Journal on Cryptography and Information Security 12, n.º 4 (30 de diciembre de 2022): 01–11. http://dx.doi.org/10.5121/ijcis.2022.12401.
Texto completoKonda, Chaitanya, U. Sathish Kumar y Arun Kodirekka. "Medical Image Watermarking for Tamper Detection in ROI Using LWT and Hashing". E3S Web of Conferences 391 (2023): 01139. http://dx.doi.org/10.1051/e3sconf/202339101139.
Texto completoLafta, Ali y Ayad Abdulsada. "Secure Content-Based Image Retrieval with Copyright Protection within Cloud Computing Environment". Iraqi Journal for Electrical and Electronic Engineering 18, n.º 2 (3 de agosto de 2022): 82–91. http://dx.doi.org/10.37917/ijeee.18.2.11.
Texto completoSy, Nguyen Chi, Ha Hoang Kha y Nguyen Minh Hoang. "An Efficient Digital Watermarking Technique for Color Images Using Directional Transforms". Journal of Science and Technology: Issue on Information and Communications Technology 3, n.º 2 (31 de diciembre de 2017): 1. http://dx.doi.org/10.31130/jst.2017.57.
Texto completo