Survey on relational database watermarking techniques
Digital watermarking has been in multimedia data use over the past years. Recently it has become applicable in relational database system not only to secure copyright ownership but also to ensure data contents integrity. Further, it is used in locating tampered and modified places. However, the...
| Main Authors: | Alfagi, abdalrahman, Manaf, Azizah, Hamida, Belal Ahmed, Khan, Sheroz, Elrowayati, Ali |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Asian Research Publishing Network (ARPN)
2016
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/49746/ http://irep.iium.edu.my/49746/1/SURVEY_ON_RELATIONAL_DATABASE_WATERMARKING_TECHNIQUES.pdf http://irep.iium.edu.my/49746/4/49746_SURVEY%20ON%20RELATIONAL%20DATABASE%20WATERMARKING%20TECHNIQUES_Scopus.pdf |
Similar Items
A zero-distortion fragile watermarking scheme to detect and localize malicious modifications in textual database relations
by: Alfagi, Abdalrahman, et al.
Published: (2016)
by: Alfagi, Abdalrahman, et al.
Published: (2016)
A systematic literature review on necessity,challenges, applications and attacks of watermarking relational database
by: Alfagi, Abdalrahman, et al.
Published: (2017)
by: Alfagi, Abdalrahman, et al.
Published: (2017)
Digital audio watermarking; techniques and applications
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
by: Olanweraju, Rashidah Funke, et al.
Published: (2012)
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020)
by: Elrowayati, Ali Abdulhafid
Published: (2020)
Digital watermarking and data hiding techniques
by: Zeki. Khedher, Akram M., et al.
Published: (2006)
by: Zeki. Khedher, Akram M., et al.
Published: (2006)
HEVC watermarking techniques for authentication and copyright applications: challenges and opportunities
by: Ali A., Elrowayati, et al.
Published: (2020)
by: Ali A., Elrowayati, et al.
Published: (2020)
Watermark Compression in Medical Image Watermarking Using
Lempel-Ziv-Welch (LZW) Lossless Compression Technique
by: Badshah, Gran, et al.
Published: (2016)
by: Badshah, Gran, et al.
Published: (2016)
Watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2010)
by: Zeki, Akram M., et al.
Published: (2010)
A survey of digital image watermarking techniques
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
On the issue of fly-back spikes in PWM operated single-phase transformer-less grid-tied inverter
by: Shahid, Zeeshan, et al.
Published: (2015)
by: Shahid, Zeeshan, et al.
Published: (2015)
A novel watermarking technique in data transmission between QR codes and database
by: Mohamed, Kartini, et al.
Published: (2013)
by: Mohamed, Kartini, et al.
Published: (2013)
Subjective assessment of audio watermarked quran
by: Adamu, Abubakar Ibrahim, et al.
Published: (2014)
by: Adamu, Abubakar Ibrahim, et al.
Published: (2014)
State-of-the-art digital watermarking attacks
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
High watermarking capacity based on spatial domain technique
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
Improving the robustness of ISB watermarking techniques by repetition of the embedding
by: Zeki, Akram M., et al.
Published: (2011)
by: Zeki, Akram M., et al.
Published: (2011)
A Quick Glance at Digital Watermarking in Medical Images Technique Classification, Requirements, Attacks and Application of Tamper Localization
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Variable size of blocks for embedding watermark images using ISB technique
by: Zeki, Akram M., et al.
Published: (2016)
by: Zeki, Akram M., et al.
Published: (2016)
Digital watermarking: A counterfeiting and piracy deterrence
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
by: Olanrewaju, Rashidah Funke, et al.
Published: (2012)
An Improved Wavelet Digital Watermarking
Software Implementation
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
A recent survey on image watermarking using scaling factor techniques for copyright protection
by: Ernawan, Ferda, et al.
Published: (2023)
by: Ernawan, Ferda, et al.
Published: (2023)
Reversible Medical Image Watermarking for Tamper Detection and Recovery
by: Liew, Siau-Chuin, et al.
Published: (2010)
by: Liew, Siau-Chuin, et al.
Published: (2010)
Watermark Embedder and Detector for Medical Images: The Requirements and Design
by: Liew, Siau-Chuin, et al.
Published: (2010)
by: Liew, Siau-Chuin, et al.
Published: (2010)
A novel digital watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2009)
by: Zeki, Akram M., et al.
Published: (2009)
Secured Telemedicine Using Whole Image as Watermark with Tamper Localization and Recovery Capabilities
by: Liew, Siau-Chuin, et al.
Published: (2015)
by: Liew, Siau-Chuin, et al.
Published: (2015)
The Usage of Block Average Intensity in Tamper Localization for Image Watermarking
by: Liew, Siau-Chuin, et al.
Published: (2011)
by: Liew, Siau-Chuin, et al.
Published: (2011)
Wideband and compact erbium-doped fiber amplifier using parallel double-pass configuration
by: Hamida, Belal Ahmed, et al.
Published: (2012)
by: Hamida, Belal Ahmed, et al.
Published: (2012)
Digital watermarking for mammogram authentication
by: Abdul Manaf, Azizah, et al.
Published: (2010)
by: Abdul Manaf, Azizah, et al.
Published: (2010)
A Novel Approach for Audio Watermarking
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Parallel Digital Watermarking Process on Ultrasound Medical
Images in Multicores Environment
by: Khor, Hui Liang, et al.
Published: (2016)
by: Khor, Hui Liang, et al.
Published: (2016)
Watermarking of single and multi frame ultrasound medical images
by: Gran, Badshah
Published: (2016)
by: Gran, Badshah
Published: (2016)
Analysis on perceptibility and robustness of digital watermarking using discrete wavelet transform
by: Yusof, Yusnita, et al.
Published: (2008)
by: Yusof, Yusnita, et al.
Published: (2008)
Robust And Imperceptible Digital Video
Watermarking Techniques
by: al-Taweel, Sadik Ali Murshid
Published: (2011)
by: al-Taweel, Sadik Ali Murshid
Published: (2011)
Robust and imperceptible digital video watermarking techniques.
by: Al-Taweel, Sadik Ali Murshid
Published: (2011)
by: Al-Taweel, Sadik Ali Murshid
Published: (2011)
Watermark Embedder and Image Authenticator (WEIA)
by: Lu, Chun Ling, et al.
Published: (2014)
by: Lu, Chun Ling, et al.
Published: (2014)
Multi premises network based on coding technique
by: Eltaif, Tawfig, et al.
Published: (2013)
by: Eltaif, Tawfig, et al.
Published: (2013)
Investigating digital watermark dynamics on carrier file by feed-forward neural network
by: Zeki, Akram M., et al.
Published: (2013)
by: Zeki, Akram M., et al.
Published: (2013)
Robust Image Watermarking Theories and Techniques: A Review
by: Jasni, Mohamad Zain, et al.
Published: (2014)
by: Jasni, Mohamad Zain, et al.
Published: (2014)
A Survey on SQL injection: vulnerabilities, attacks, and prevention techniques
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
by: Kindy, Diallo Abdoulaye, et al.
Published: (2011)
Experiment of Tamper Detection and Recovery Watermarking in PACS
by: Siau-Chuin, Liew, et al.
Published: (2010)
by: Siau-Chuin, Liew, et al.
Published: (2010)
On an optimal robust digital image watermarking based on SVD using differential evolution algorithm
by: Ling, Huo-Chong, et al.
Published: (2011)
by: Ling, Huo-Chong, et al.
Published: (2011)
Similar Items
-
A zero-distortion fragile watermarking scheme to detect and localize malicious modifications in textual database relations
by: Alfagi, Abdalrahman, et al.
Published: (2016) -
A systematic literature review on necessity,challenges, applications and attacks of watermarking relational database
by: Alfagi, Abdalrahman, et al.
Published: (2017) -
Digital audio watermarking; techniques and applications
by: Olanweraju, Rashidah Funke, et al.
Published: (2012) -
A secure HEVC video watermarking scheme for authentication and copyright purposes
by: Elrowayati, Ali Abdulhafid
Published: (2020) -
Digital watermarking and data hiding techniques
by: Zeki. Khedher, Akram M., et al.
Published: (2006)