Littérature scientifique sur le sujet « DATABASE WATERMARKING »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « DATABASE WATERMARKING ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "DATABASE WATERMARKING"
Kumar, Manoj, et O. P. Verma. « Content characteristics based robust watermarking for relational database : a new approach to database security ». International Journal of Engineering & ; Technology 7, no 1.9 (1 mars 2018) : 234. http://dx.doi.org/10.14419/ijet.v7i1.9.10003.
Texte intégralKumar, Manoj, et O. P. Verma. « Content Characteristics Based Robust Watermarking for Relational Database : A New Approach to Database Security ». International Journal of Engineering & ; Technology 7, no 1.9 (1 mars 2018) : 302. http://dx.doi.org/10.14419/ijet.v7i1.9.12694.
Texte intégralMazhar, Mohammed, et Rajesh Dhakad. « Survey on Relational Database Watermarking Employing Evolutionary Methods ». Journal of Information Technology and Sciences 9, no 1 (16 janvier 2023) : 13–29. http://dx.doi.org/10.46610/joits.2023.v09i01.003.
Texte intégralKhan, Aihab, et Syed Afaq Husain. « A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations ». Scientific World Journal 2013 (2013) : 1–16. http://dx.doi.org/10.1155/2013/796726.
Texte intégralJi, Guang Cui, Zhen Rong Lin et Jian Min Li. « A Watermarking Algorithm for Relational Database Based on Image ». Advanced Materials Research 301-303 (juillet 2011) : 661–65. http://dx.doi.org/10.4028/www.scientific.net/amr.301-303.661.
Texte intégralWang, Mei Ting. « Relational Database Watermarking Algorithm Based on Comparison Table ». Applied Mechanics and Materials 433-435 (octobre 2013) : 1800–1804. http://dx.doi.org/10.4028/www.scientific.net/amm.433-435.1800.
Texte intégralZhang, Ye Hong, Zhi Xian Gao et Dong Xian Yu. « Speech Algorithm for Watermarking Relational Databases Based on Weighted ». Advanced Materials Research 121-122 (juin 2010) : 399–404. http://dx.doi.org/10.4028/www.scientific.net/amr.121-122.399.
Texte intégralLi, Yan, Junwei Wang et Xiangyang Luo. « A reversible database watermarking method non-redundancy shifting-based histogram gaps ». International Journal of Distributed Sensor Networks 16, no 5 (mai 2020) : 155014772092176. http://dx.doi.org/10.1177/1550147720921769.
Texte intégralImamoglu, Mustafa Bilgehan, Mustafa Ulutas et Guzin Ulutas. « A New Reversible Database Watermarking Approach with Firefly Optimization Algorithm ». Mathematical Problems in Engineering 2017 (2017) : 1–14. http://dx.doi.org/10.1155/2017/1387375.
Texte intégralAlqassab, Asmaa, et Mafaz Alanezi. « Relational Database Watermarking Techniques : A Survey ». Journal of Physics : Conference Series 1818, no 1 (1 mars 2021) : 012185. http://dx.doi.org/10.1088/1742-6596/1818/1/012185.
Texte intégralThèses sur le sujet "DATABASE WATERMARKING"
Кучма, Олександр Русланович, et Oleksandr Kuchma. « Розроблення модуля забезпечення приховування даних на основі стеганографічного методу найменш значущого біту ». Master's thesis, ТНТУ, 2021. http://elartu.tntu.edu.ua/handle/lib/36794.
Texte intégralПояснювальна записка містить результати розроблення модуля «Вбудовування інформації в зображенні методом найменш значущого біту». Проведено аналіз предметної області, розроблені моделі бізнес-процесів об’єкта проектування, розроблені специфікації бізнес-вимог, функціональних та не функціональних вимог, спроектовані логічна та фізична моделі бази даних. Виконаний математичний опис задачі для вирішення на ПК та розроблений додаток за допомогою середовища програмування Microsoft Visual Studio 2010. Наведені результати тестування програмного продукту та вимоги щодо його розгортання. Результати роботи можуть бути використані для підтвердження авторського права, для приховування інформації в цифрових зображеннях.
Explanatory note contains the results of the development module "Embedding information in an image using the least significant bit. The analysis domain, the model business processes of the project, developed the specification of business requirements, functional and non functional requirements, designed logical and physical database models. The mathematical description of the problem for solution on the PC application developed using the programming environment Microsoft Visual Studio 2010. The results of software testing and requirements for its deployment. The results may be used to confirm the copyright for hiding information in digital images.
ПЕРЕЛІК УМОВНИХ СКОРОЧЕНЬ ... 7 ВСТУП ... 8 РОЗДІЛ 1... 10 1.1 Коротка характеристика підприємства... 10 Базою підприємства виступає Інтернет-магазин «TradeBox»... 10 1.2 Аналіз предметної області ... 11 Заголовки ... 13 Потоковий контейнер ... 13 Фіксований контейнер ... 13 1.3. Аналіз існуючого програмного продукту, що реалізують функцію предметної області ... 16 РОЗДІЛ 2... 21 2.1. Глосарій проекту ... 21 2.2. Розроблення варіанту використання ... 23 2.2.1. Розроблення діаграми варіантів використання. ... 24 2.2.2. Специфікація варіантів використання ... 25 2.2.3. Розкадровка варіантів використання ... 34 2.3. Специфікація функціональних і не функціональних вимог ... 42 РОЗДІЛ 3... 46 3.1 Математична постановка задачі ... 46 3.2. Проектування структури бази даних ... 50 3.3. Опис архітектури додатку. ... 52 3.3.1 Розроблення діаграми класів, що реалізують бізнес-логіку програмної системи. ... 52 3.3.2. Розроблення діаграми використання елементів графічного інтерфейсу користувача. ... 53 3.4. Тестування додатку. ... 53 3.5. Розгортання програмного продукту. ... 55 3.5.1. Системні мінімальні характеристики ... 55 3.5.2. Вимоги до програмного забезпечення клієнтської частини. ... 55 3.5.3. Спосіб виклику програми, запуск програми. ... 56 РОЗДІЛ 4 ОХОРОНА ПРАЦІ ТА БЕЗПЕКА В НАДЗВИЧАЙНИХ СИТУАЦІЯХ ... 57 4.1 Охорона праці ... 57 4.2 Підвищення стійкості роботи об'єктів господарської діяльності в воєнний час... 59 СПИСОК ВИКОРИСТАНИХ ДЖЕРЕЛ ... 65 ДОДАТКИ ... 66 ДОДАТОК А ... 67 ДОДАТОК Б ... 69 ДОДАТОК В ... 91 ДОДАТОК Д ... 92 ДОДАТОК Е ... 93
Halder, Raju <1981>. « Extending abstract interpretation to new applicative scenarios ». Doctoral thesis, Università Ca' Foscari Venezia, 2012. http://hdl.handle.net/10579/1236.
Texte intégralYang, Yin-Yi, et 楊英一. « A Study on Database Watermarking ». Thesis, 2004. http://ndltd.ncl.edu.tw/handle/26479548608530274514.
Texte intégral國立高雄第一科技大學
資訊管理所
92
The growing study of data mining increases the requirements of data resource and more and more research groups demand databases from the data provider. Also, some enterprises would like to have part of their data warehouses for sale, so research groups could purchase these databases for their advance analysis. The demand and provision of databases forms a data resource market. Nevertheless, the digital data is easy to duplicate, so those databases might be abused. Then how to protect the copyright of a sold database becomes a serious problem. In order to solve this problem, we provide an approach of utilizing a robust watermarking technique. The database might be embedded watermarks which are generated by an unique key number to identify each buyer, and we could distinguish the right of a database through the result of watermark detection. In order to keep the usability of database, we apply the concept of Spread Spectrum. That would spread watermarks into the tuples of protected database, and this concept increases the robustness of watermarks. We also design two different methodologies correspond to each situation of with or without original database in detecting watermarks, and the methodologies could be applied to numerical and non-numerical data types of database. Finally, the experimental results prove that both methodologies are practical and robust.
GOYAL, SAKSHI. « DATABASE WATERMARKING USING BEZIER CURVES ». Thesis, 2014. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15382.
Texte intégralGABA, GUNJAN. « APPLICATION OF DATABASE WATERMARKING DIGITAL IMAGES ». Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/14855.
Texte intégralVERMA, ARPIT. « ROBUST DATABASE WATERMARKING TECHNIQUE FOR NUMERICAL DATA ». Thesis, 2016. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15033.
Texte intégralKe, Chi-Hung, et 柯祈宏. « A study of watermarking in relational database ». Thesis, 2006. http://ndltd.ncl.edu.tw/handle/78632519689440143625.
Texte intégral國立成功大學
工程科學系專班
94
Like digital data, a database system is also easily to be duplicated and exchanged. To protect the content of a database system is necessary and urgent. In this thesis, except to servey the related techniques that have been used to discuss the watermarking methods for relational database, a novel watermarking method was proposed for the same purpose. The proposed method embeds an image watermark into the relational database under the assumption that the muneric attributes allowed a slight modification. The pixels values of the image watermark are quantized into ten levels to match the representing range of numeric attributes. Duplicated watermarks are embedded for increasing the robust of the proposed method. Majority voting method was adopted to extract the embedded watermarks for considering different kinds of attacks. The experimental results are verified and compared with some exsited methods. It is shown that the proposed method is practical and more robust than that of the discussed exsiting methods.
SAXENA, ARCHANA. « DATABASE WATERMARKING USING ELLIPTIC CURVE CRYPTOGRAPHY (ECC) ». Thesis, 2015. http://dspace.dtu.ac.in:8080/jspui/handle/repository/15549.
Texte intégralHsu, Fang-Yu, et 徐芳玉. « A Study on Database Watermarking by Applying Support Vector Machine ». Thesis, 2008. http://ndltd.ncl.edu.tw/handle/00679664627079382976.
Texte intégral國立臺中技術學院
資訊科技與應用研究所
97
In this thesis, a study on digital watermarking technology by applying support vector machine (SVM) for relational database integrity authentication is proposed. Owing to the elegant machine learning ability of SVM, SVM is used to learn and predict the correlation for relational database, and then to perform the purpose of the database content integrity. In Chapter 3, an effective solution based on the fragile watermarking technique is proposed by exploiting the trained SVR predicting function to distribute the digital watermark over the particular numeric attributes. While the watermark bit is equal to 1, add 1 to the predicted value and replace the original attribute value with the new predicted value. Otherwise, while the watermark bit is equal to 0, corresponding original attribute value is replaced by the value which is subtracted 1 from the predicted value. In detection phase, the same SVR predicting function is used to generate predicted value, and if the absolute difference value between predicted value and attribute value is more than the designed fixed value, like one, then the database content is determined to be tampered with. In Chapter 4, the proposed watermarking scheme based on SVR prediction, which exploits the digital watermarking technology for guaranteeing the database integrity underlying distortion free of database content. The proposed scheme employs SVR predictive function to obtain characteristic of the database and uses Huffman coding to encode the characteristic for compressing important payload information. In detection procedure, minor and necessary additional payload information of the database is used to accomplish tampering detection. Eventually, Chapter 5 proposed a reversible fragile watermarking based on SVR prediction for authenticating database integrity with original values recovery. While the protected database is modified by malicious users, the trained SVR predicting function is used to generate difference and extract embedded watermark bits to detect modified tuples. Furthermore, the proposed scheme is capable of recovering any original value after a tamper-free recovery procedure where the embedded watermark bits are properly extracted. In other words, the proposed method really has the power of effective detection and locating malicious tampering, achieving database authentication and recovering content integrity.
Shih, Siou-Yan, et 施秀燕. « A Study of Database Authentication and Ownerships Protection Based on Digital Watermarking ». Thesis, 2007. http://ndltd.ncl.edu.tw/handle/00996009103070903477.
Texte intégral國立臺中技術學院
資訊科技與應用研究所
95
This thesis focuses on digital watermarking and its applications in database protection. Digital watermarking is a kind of information hiding techniques, it can partition into two parts: one is robust watermarking for copyright protection, the other is fragile watermarking for tampering detection. Database watermarking is used to protect the database by embedding digital watermarks into the protected database. Hence digital watermarking can be used to achieve database ownership verification and tampering detection. In recent years, most existing database watermarking schemes altered the data of tables to embed watermarks. However, most data in a database are sensitive. When some data are modified, it would let the data become useless. Hence, how to embed watermark without modifying any data is very important. In this thesis, a database watermarking schemes is proposed that it embed watermark into databases without destroying any protected data’s meaning. This scheme extracts a feature from each tuple to combine with each pixel of a watermark image for embedding a robust watermark, and the features of each couple of t uples are compared to embed a fragile watermark by an embedding rule. The experimental results showed that the proposed scheme can not only copyright verification but also tampering detection, and have a significant achievement. In addition, this thesis proposed two reversible watermarking schemes to protect database. These schemes can restore original data after extracting watermark and verify ownership or integrity according to extracting watermark. The first scheme is a robust reversible watermarking scheme by building quart-tree to embed a watermark. The first reversible watermarking scheme utilizes extracting features from every attributes to build quarter-tree. When user verified ownership according to the extracted watermark, the data in the database can restore its original value. The experimental results showed that the first reversible watermarking scheme can not only achieve copyright verification by extracting watermark under different alteration rate attacks and attribute out-of-order attacks but also restore original data after extracting watermark image. The second scheme is a fragile reversible watermarking by using de-clustering technique to embed a watermark. The second reversible watermarking scheme utilizes extracting features from every attribute to group four groups for representing watermark information. It utilizes features of every attributes to find the small least value from the corresponding watermark group and utilizes the fined value to change the original feature of the attribute for embedding watermark. When users verified database integrity according to the extracted watermark, the data can restore the original value in the same time. The experimental results showed that the second reversible watermarking scheme not only verifies integrity of database but also restores original data in 100% rate after extracting watermark. Keywords: Digital watermarking, copyright protection, database watermarking, dual watermarking, ownership verification, integrity verification, reversible watermarking, de-clustering technique.
Livres sur le sujet "DATABASE WATERMARKING"
A, Hanjalic, dir. Image and video databases : Restoration, watermarking, and retrieval. Amsterdam : Elsevier Science B. V., 2000.
Trouver le texte intégralHanjalic, A., J. Biemond, R. L. Lagendijk, G. C. Langelaar et P. M. B. van Roosmalen. Image and Video Databases : Restoration, Watermarking and Retrieval. Elsevier Science & Technology Books, 2000.
Trouver le texte intégralHanjalic, A., G. C. Langelaar, P. M. B. van Roosmalen, J. Biemond et R. L. Lagendijk. Image and Video Databases : Restoration, Watermarking and Retrieval (Advances in Image Communication). Elsevier Science, 2000.
Trouver le texte intégralChapitres de livres sur le sujet "DATABASE WATERMARKING"
Nematollahi, Mohammad Ali, Chalee Vorakulpipat et Hamurabi Gamboa Rosales. « Relational Database, XML, and Ontology Watermarking ». Dans Digital Watermarking, 145–61. Singapore : Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-2095-7_10.
Texte intégralJin, Xiaoming, Zhihao Zhang, Jianmin Wang et Deyi Li. « Watermarking Spatial Trajectory Database ». Dans Database Systems for Advanced Applications, 56–67. Berlin, Heidelberg : Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11408079_8.
Texte intégralGao, Xinting, Bo Qiu, JingJing Shen, Tian-Tsong Ng et Yun Qing Shi. « A Smart Phone Image Database for Single Image Recapture Detection ». Dans Digital Watermarking, 90–104. Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-18405-5_8.
Texte intégralGupta, Gaurav, et Josef Pieprzyk. « Database Relation Watermarking Resilient against Secondary Watermarking Attacks ». Dans Information Systems Security, 222–36. Berlin, Heidelberg : Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-10772-6_17.
Texte intégralFranco-Contreras, Javier, Gouenou Coatrieux, Nora Cuppens-Boulahia, Frédéric Cuppens et Christian Roux. « Adapted Quantization Index Modulation for Database Watermarking ». Dans Digital-Forensics and Watermarking, 120–34. Cham : Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19321-2_9.
Texte intégralHuang, Yuankun, Shunquan Tan, Bin Li et Jiwu Huang. « VPCID—A VoIP Phone Call Identification Database ». Dans Digital Forensics and Watermarking, 307–21. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11389-6_23.
Texte intégralPrasannakumari, V., et V. Balu. « Audio Database Watermarking for Tamper Detection ». Dans Computer Networks and Information Technologies, 446–48. Berlin, Heidelberg : Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19542-6_84.
Texte intégralZhang, Yexing, Zihou Wang, Zhaoguo Wang et Chuanyi Liu. « A Robust and Adaptive Watermarking Technique for Relational Database ». Dans Communications in Computer and Information Science, 3–26. Singapore : Springer Singapore, 2022. http://dx.doi.org/10.1007/978-981-16-9229-1_1.
Texte intégralNg, Wilfred, et Ho-Lam Lau. « Effective Approaches for Watermarking XML Data ». Dans Database Systems for Advanced Applications, 68–80. Berlin, Heidelberg : Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11408079_9.
Texte intégralGort, Maikel Lázaro Pérez, Martina Olliaro, Claudia Feregrino-Uribe et Agostino Cortesi. « Preventing Additive Attacks to Relational Database Watermarking ». Dans Lecture Notes in Business Information Processing, 131–40. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37632-1_12.
Texte intégralActes de conférences sur le sujet "DATABASE WATERMARKING"
Odeh, Ashraf, et Ali Al-Haj. « Watermarking relational database systems ». Dans 2008 First International Conference on the Applications of Digital Information and Web Technologies (ICADIWT). IEEE, 2008. http://dx.doi.org/10.1109/icadiwt.2008.4664357.
Texte intégralBranchetti, Simone, Flavio Bertini et Danilo Montesi. « Grayscale Text Watermarking ». Dans IDEAS'22 : International Database Engineered Applications Symposium. New York, NY, USA : ACM, 2022. http://dx.doi.org/10.1145/3548785.3548794.
Texte intégralJin, Cong, Yu Fu et Feng Tao. « The Watermarking Model for Relational Database Based on Watermarking Sharing ». Dans 2006 International Conference on Intelligent Information Hiding and Multimedia. IEEE, 2006. http://dx.doi.org/10.1109/iih-msp.2006.265092.
Texte intégralLafaye, Julien. « An Analysis of Database Watermarking Security ». Dans Third International Symposium on Information Assurance and Security. IEEE, 2007. http://dx.doi.org/10.1109/isias.2007.4299817.
Texte intégral« DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING ». Dans 5th International Conference on Software and Data Technologies. SciTePress - Science and and Technology Publications, 2010. http://dx.doi.org/10.5220/0002929302190226.
Texte intégralLafaye, Julien. « An Analysis of Database Watermarking Security ». Dans Third International Symposium on Information Assurance and Security. IEEE, 2007. http://dx.doi.org/10.1109/ias.2007.11.
Texte intégralChuri, Akshata A., et Vinayak D. Shinde. « Alphanumeric Database Security through Digital Watermarking ». Dans 2020 International Conference on Convergence to Digital World - Quo Vadis (ICCDW). IEEE, 2020. http://dx.doi.org/10.1109/iccdw45521.2020.9318731.
Texte intégralShen, Xi, Yingzhou Zhang, Tianqi Wang et Yuxin Sun. « Relational Database Watermarking for Data Tracing ». Dans 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). IEEE, 2020. http://dx.doi.org/10.1109/cyberc49757.2020.00043.
Texte intégralGaikwad, Madhuri V., et Roma A. Kudale. « Robust Reversible Watermarking for relational database ». Dans 2016 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE). IEEE, 2016. http://dx.doi.org/10.1109/wiecon-ece.2016.8009126.
Texte intégralHristov, Tsvetomir, Devriş İşler, Nikolaos Laoutaris et Zekeriya Erkin. « Graph Database Watermarking Using Pseudo-Nodes ». Dans DEC '23 : Second ACM Data Economy Workshop. New York, NY, USA : ACM, 2023. http://dx.doi.org/10.1145/3600046.3600049.
Texte intégral