|
[1]R. Agrawal and J. Kiernan, "Watermark Relational Databases," in Proceedings of the 28th international conference on Very Large Data Base, Hong Kong, 2002, pp. 155-166. [2]R. Agrawal, P.J. Hass, and J. Kiernan, "Watermarking Relational Data: Framework, Algorithms and Analysis, " The VLDB Journal, Vol. 12, No. 2, 2003, pp. 157-169. [3]M. T. Fang, R. C. T. Lee, and C. C. Change, "The Idea of De-Clustering and Its Applications," in Proceedings of the 12th international conference on Very Large Data Base, Kyoto, 1986, pp. 181-188. [4]G. Gautam and B. B Chaudhuri, "A Novel Genetic Algorithm for Automatic Clustering," Pattern Recognition Letters, Vol. 25, 2004, pp. 173-187. [5]F. Guo, J. Wang, and Di Li, "Fingerprinting Relational Databases," in Proceedings of the 2006 ACM symposium on Applied computing table of contents, Dijon, April 2006,pp. 487 – 492. [6]H. Guo, Y. Li, A. Liu, and S. Jajodia, "A Fragile Watermarking Scheme for Detecting Malicious Modifications of Database Relations," Information Sciences, Vol. 176, No. 10, May 2006, pp. 1350-1378. [7]H. Guo, Y. Li, and S. Jajodia, "Chaining Watermarks for Detecting Malicious Modifications to Streaming Data,” Information Sciences, Vol. 177, No. 1, 1 January 2007, pp. 281-298. [8]M. Huang, J. Cao, Z. Peng, and Y. Fang, "A New Watermark Mechanism for Relational Data," in Proceedings of the 4th International Conference on Computer and Information Technology, Shanghai , September 2004, pp. 946 – 950. [9]L. Kaufman and P.J Rousseeuw, Finding Groups in Data: An Introduction to Cluster Analysis, John Wiley and Sons, 1990. [10]E. Lin and E. Delp, "A Review of Fragile Image Watermarks," in Proceedings of the Multimedia and Security Workshop (ACM Multimedia’99), October 30-Novermeber 5, 1999, pp. 25-29. [11]Y. Li, H. Guo, and S. Jajodia, "Tamper Detection and Localization for Categorical Data Using Fragile Watermarks," in Proceedings of the 4th ACM Workshop on Digital Rights Management, Washington DC, 2004, pp. 73 – 82. [12]Y. Li, V. Swarup, and S. Jajodia, "Fingerprinting Relational Databases: Schemes and Specialties, " IEEE Transactions on Dependable and Secure Computing, Vol. 2, No. 1, January- March 2005, pp. 34 – 45. [13]Y. Li and R. H. Deng, "Publicly Verifiable Ownership Protection for Relational Databases, " in Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security Table of Contents, Taiwan, March 2006, pp. 78 – 89. [14]Z. M. Lu, D. G. Xu, and S. H. Sun, "Multipurpose Image Watermarking Algorithm Based on Multistage Vector Quantization," IEEE Transactions Image Processing, Vol. 14, No. 6, June 2005, pp. 822-831. [15]J. MacQueen, "Some Methods for Classification and Analysis of Multivariate Observations," in Proceedings of 5th Berkeley Symposium on Mathematical Statistics and Probability, Vol. 1, 1967, pp. 281-297. [16]M. H. Tsai, H. Y. Tseng, and C. Y. Lai, "A Database Watermarking Technique for Temper Detection," in Proceedings of the 9th Joint Conference on Information Sciences, Kaohsiung, Taiwan, October 2006. [17]R. Sion, M. Atallah, and S. Prabhakar, "Rights Protection for Relational Data," in Proceedings of ACM SIGMOD 2003, San Diego, 2003, pp. 98 – 109. [18]R. Sion, M. Atallah, and S. Prabhakar, "Rights Protection for Categorical Data," IEEE Transactions on Knowledge and Data Engineering, Vol. 17, No. 7, 2005, pp. 912-926. [19]Z. H. Zhang, X. M. Jin, J. M. Wang, and D.Y. Li, "Watermarking Relational Database Using Image," in Proceedings of the 3rd International Conference on Machine Learning and Cybernetics, Beijing, 2004, pp. 1739- 1744.
|