A systematic literature review on necessity,challenges, applications and attacks of watermarking relational database
Systematic literature review (SLR) is a significant research methodology in software engineering and computer science. One precarious step in applying this methodology is to enterprise and perform appropriate and effective search approach. This is a time-consuming and error-prone step, which needs t...
| Main Authors: | Alfagi, Abdalrahman, Abd Manaf, Azizah, Hamida, Belal Ahmed, Hamza, Mohd. Ghazli. Hamza |
|---|---|
| Format: | Article |
| Language: | English English |
| Published: |
Universiti Teknikal Malaysia Melaka
2017
|
| Subjects: | |
| Online Access: | http://irep.iium.edu.my/56599/ http://irep.iium.edu.my/56599/14/56599_A%20systematic%20literature%20review%20on%20necessity.pdf http://irep.iium.edu.my/56599/20/56599_A%20systematic%20literature%20review%20on%20necessity%2C%20challenges_new_scopus.pdf |
Similar Items
Survey on relational database watermarking techniques
by: Alfagi, abdalrahman, et al.
Published: (2016)
by: Alfagi, abdalrahman, et al.
Published: (2016)
A zero-distortion fragile watermarking scheme to detect and localize malicious modifications in textual database relations
by: Alfagi, Abdalrahman, et al.
Published: (2016)
by: Alfagi, Abdalrahman, et al.
Published: (2016)
State-of-the-art digital watermarking attacks
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008)
by: Huo-Chong, Ling, et al.
Published: (2008)
Digital Watermarking for Recovering Attack Areas of Medical Images using Spiral Numbering
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Evaluation of spiral pattern watermarking scheme for common attacks to social media images
by: Tiew, Boon Li, et al.
Published: (2022)
by: Tiew, Boon Li, et al.
Published: (2022)
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
Digital watermarking and data hiding techniques
by: Zeki. Khedher, Akram M., et al.
Published: (2006)
by: Zeki. Khedher, Akram M., et al.
Published: (2006)
Attacks on a robust watermarking scheme based on self-reference image
by: TING, G, et al.
Published: (2008)
by: TING, G, et al.
Published: (2008)
AI-based techniques for DDoS Attack Detection in WSN: a
systematic literature review
by: Mohammed, Al-Naeem, et al.
Published: (2020)
by: Mohammed, Al-Naeem, et al.
Published: (2020)
Digital watermarking : related work
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
A dual-watermarking with DR code against cropping and resizing attack
by: Lau, Wei Khang
Published: (2016)
by: Lau, Wei Khang
Published: (2016)
A review on type of attacks on fingerprint image and watermarking techniques
by: Lebcir, Mohamed, et al.
Published: (2019)
by: Lebcir, Mohamed, et al.
Published: (2019)
Necessity and challenges of nature conservation
by: Mohd Kamil, Nor Amani Filzah, et al.
Published: (2020)
by: Mohd Kamil, Nor Amani Filzah, et al.
Published: (2020)
A Novel Approach for Audio Watermarking
by: Zamani, Mazdak, et al.
Published: (2009)
by: Zamani, Mazdak, et al.
Published: (2009)
Going Native: Native XML Database vs. Relational Database
by: Lazim, Raghad Yaseen, et al.
Published: (2012)
by: Lazim, Raghad Yaseen, et al.
Published: (2012)
Watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2010)
by: Zeki, Akram M., et al.
Published: (2010)
Adaptive digital watermarking system for authentication of intellectual properties
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
by: Olanweraju, Rashidah Funke, et al.
Published: (2011)
A comparison of discrete cosine transform and discrete wavelet transform algorithm in watermarking against common attacks
by: Said, Mohamed Abdisalan
Published: (2015)
by: Said, Mohamed Abdisalan
Published: (2015)
Software Requirements Prioritisation: A Systematic Literature Review on Significance, Stakeholders, Techniques and Challenges
by: Hujainah, Fadhl, et al.
Published: (2018)
by: Hujainah, Fadhl, et al.
Published: (2018)
Systematic literature review on SQL injection attack
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
by: Aminu, Lawal Muhammad, et al.
Published: (2016)
State-of-the-art digital watermarking attacks
by: Khalifa, Othman Omran, et al.
Published: (2012)
by: Khalifa, Othman Omran, et al.
Published: (2012)
Challenges and Issues in unstructured big data : A systematic literature review
by: Nur Syafiqah, Mohd Nafis, et al.
Published: (2018)
by: Nur Syafiqah, Mohd Nafis, et al.
Published: (2018)
A novel digital watermarking technique based on ISB (Intermediate Significant Bit)
by: Zeki, Akram M., et al.
Published: (2009)
by: Zeki, Akram M., et al.
Published: (2009)
International business and the necessity to learn language and culture
by: Tang, Sze Jun
Published: (2024)
by: Tang, Sze Jun
Published: (2024)
Dynamics of watermark position in audio watermarked
files using neural networks
by: Abubakar, Adamu, et al.
Published: (2017)
by: Abubakar, Adamu, et al.
Published: (2017)
A set of embedding rules in IWT for watermark embedding in image watermarking
by: Muhammad Afnan, Hafidz, et al.
Published: (2024)
by: Muhammad Afnan, Hafidz, et al.
Published: (2024)
Watermark Compression in Digital Medical Image Watermarking
by: Badshah, Gran, et al.
Published: (2013)
by: Badshah, Gran, et al.
Published: (2013)
Related-mode attacks on block cipher modes of operation
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Fingerprint image watermarking in spatial, frequency and multiresolution domain: techniques and challenges
by: Lebcir, Mohamed, et al.
Published: (2018)
by: Lebcir, Mohamed, et al.
Published: (2018)
Security attacks and challenges in wireless sensor networks
by: Pathan, Al-Sakib Khan
Published: (2008)
by: Pathan, Al-Sakib Khan
Published: (2008)
Processing skyline queries in incomplete database: issues,
challenges and future trends
by: Gulzar, Yonis, et al.
Published: (2017)
by: Gulzar, Yonis, et al.
Published: (2017)
Digital Watermarking in Medical Images
by: Jasni, Mohamad Zain
Published: (2005)
by: Jasni, Mohamad Zain
Published: (2005)
Fingerprint Watermarking with Tamper Detection
by: Jasni, Mohamad Zain, et al.
Published: (2006)
by: Jasni, Mohamad Zain, et al.
Published: (2006)
Importance of Watermark Lossless Compression in Digital Medical Image Watermarking
by: Gran, Badshah, et al.
Published: (2015)
by: Gran, Badshah, et al.
Published: (2015)
Watermarking of Ultrasound Medical Images in Teleradiology Using Compressed Watermark
by: Gran, Badshah, et al.
Published: (2016)
by: Gran, Badshah, et al.
Published: (2016)
Efficient Mapping XML DTD to Relational Database
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2012)
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2012)
Systematic literature review and taxonomy for DDoS attack detection and prediction
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
by: Yusof, Ahmad Riza’ain, et al.
Published: (2019)
Digital watermarking : an overview
by: Khalifa, Othman Omran, et al.
Published: (2011)
by: Khalifa, Othman Omran, et al.
Published: (2011)
Full dynamic transformation model for spatial data from relational database to object-oriented database
by: Siew, Teck Kiong
Published: (2005)
by: Siew, Teck Kiong
Published: (2005)
Similar Items
-
Survey on relational database watermarking techniques
by: Alfagi, abdalrahman, et al.
Published: (2016) -
A zero-distortion fragile watermarking scheme to detect and localize malicious modifications in textual database relations
by: Alfagi, Abdalrahman, et al.
Published: (2016) -
State-of-the-art digital watermarking attacks
by: Khalifa, Othman Omran, et al.
Published: (2011) -
Attacks on SVD-Based watermarking schemes
by: Huo-Chong, Ling, et al.
Published: (2008) -
Digital Watermarking for Recovering Attack Areas of Medical Images using Spiral Numbering
by: Syifak Izhar, Hisham, et al.
Published: (2013)