|
[1]R. Agrawal and J. Kiernan, “Watermarking Rela¬tional Databases,” in Proceedings of the 28th Interna¬tional Conference on Very Large Data¬bases, Hong Kong, China, 2002, pp. 155-166. [2]R. Agrawal, P. J. Haas, and J. Kiernan, “Watermarking Relational Data: Framework, Algorithms and Analysis,” The VLDB Journal, Vol. 12, No. 2, 2003, pp. 157-169. [3]R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order-Preserving Encryption for Numeric Data,” in Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, Paris, France, 2004, pp. 563-574. [4]A. Asuncion and D.J. Newman, UCI Machine Learning Repository, Irvine, CA: University of California, School of Information and Computer Science, 2007, available at http://www.ics.uci.edu/~mlearn/MLRepository.html. [5]E. Bertino, S. Jajodia, and P. Samarati, “Database Security: Research and Practice,” Information Systems, Vol. 20, No. 7, 1995, pp. 537-556. [6]F. Bao, R. H. Deng, B. C. Ooi, and Y. Yang, “Tailored Reversible Watermarking Schemes for Authentication of Electronic Clinical Atlas,” IEEE Transac¬tions on Information Technology in Biomedicine, Vol. 9, No. 4, 2005, pp. 554-564. [7]C. C. Chang and C. J. Lin, LIBSVM: a library for support vector machines, 2001, software avail¬able at http://www.csie.ntu.edu.tw/~cjlin/libsvm. [8]E. C. Chang, M.S. Kankanhalli, X. Guan, Z. Y. Huang, and Y. H. Wu, “Robust Image Authentication Using Content Based Compression,” Multimedia System, Vol. 9, No. 2, pp. 121-130. [9]I. J. Cox, M. L. Miller, and J. A. Bloom, Digital Watermarking: Principles and Practice, Morgan Kaufmann, 2001. [10]M. Chen, Y. He, and R. L. Lagendijk, “A Fragile Watermark Error Detection Scheme for Wireless Video Communications,” IEEE Transac¬tions on Multimedia, Vol. 7, No. 2, 2005, pp. 201-211. [11]G. I. Divada and D. L. Wells, “A Database En¬cryption System with Subkeys,” ACM Transac¬tions on Database Systems, Vol. 6, No. 2, 1981, pp. 312-328. [12]Harris Drucker, Chris J.C. Burges, Linda Kaufman, Alex Smola, and Vladimir Vapnik, “Support Vector Regression Machines,” in Proceedings of the Neural Information Processing Systems, 1996, pp. 155-161. [13]R. A. Fisher, “The Use of Multiple Measure¬ments in Taxonomic Problems,” Annual Eugen¬ics, Vol. 7, Part 2, 1936, pp. 179-188. [14]J. Fridrich, J Goljan, and R. Du, “Invertible Authentication,” in Proceedings of SPIE, Security and Watermarking of Multimedia Contents III, vol. 4314, P. W. Wong and E. J. Delp, Eds., 2001, pp. 197–208. [15]J. Fridrich and M. Du, “Images with Self-correcting Capabilities,” in Proceedings of the IEEE International Conference on Image Processing, 1999, pp. 792-796. [16]J. Fridrich, M. Goljan, and A.C. Baldoza, “New Fragile Authentication Watermark for Images,” in Proceedings of IEEE International Conference on Image Processing, Vol. 1, Vancouver, Canada, 2000, pp. 446-449. [17]J. Fridrich, “Security of Fragile Authentication Watermarks with Localization,” in Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents, Vol. 4675, San Jose, California, 2002, pp. 691-700. [18]H. Guo, Y. Li, A. Liu, and S. Jajodia, “A Fragile Watermarking Scheme for Detecting Malicious Modifications of Database Relations,” Informa¬tion Sciences, Vol. 176, No, 10, 2006, pp. 1350-1378. [19]F. Hartung and M. Kutter, “Multimedia Watermarking Techniques,” in Proceedings of the IEEE : special issue on Protection of Multimedia Content, Vol. 87, No. 7, 1999, pp. 1079-1107. [20]M. S. Hwang and W. P. Yang, “Multilevel Se¬cure Database Encryption with Subkeys,” Data & Knowledge Engineering, Vol. 22, 1997, pp. 117-131. [21]N. F. Johnson, Z. Duric, and S. Jajodia, Information Hiding: Steganography and Watermarking- Attacks and Countermeasures, Kluwer Publishers, 2000. [22]S. Katzenbeisser and F. A. Petitcolas (editors). Information Hiding Techniques for Steganography and Digital Watermarking, Artech House, 2000. [23]C. Y. Lin and S.F. Chang, “A Robust Image Authentication Method Distinguishing JPEG Compression from Malicious Manipulation,” IEEE Transactions on Circuits System and Video Technology, Vol. 11, No. 2, 2003, pp. 153-168. [24]Y. Li, H. Guo, and S. Jajodia, “Tamper Detection and Localization for Categorical Data Using Frag¬ile Watermarks,” in Proceedings of the 4th ACM Workshop on Digital Rights Management, Washington DC, USA, 2004, pp. 73-82. [25]C. Lu, H. Liao, and L. Chen, “Multipurpose Audio Watermarking,” in Proceedings of the 15th International Conference on Pattern Recognition, Beijing, China, 2000, pp. 677-680. [26]G. Langelaar, I. Setyawan, and R. Lagendijk. “Watermarking Digital Image and Video Data: A State-of-the-Art Overview,” IEEE Signal Proceeding Magazine, Vol. 17, No. 5, 2000, pp. 20-46. [27]Y. Li, V. Swarup, and S. Jajodia, “Fingerprinting Relational Databases: Schemes and Specialties,” IEEE Transactions on Dependable and Secure Computing, 2005, pp. 34-45. [28]Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” IEEE Transac¬tions on Circuits and Systems for Video Technology, Vol. 16, No. 3, 2006, pp. 354-362. [29]A. H. Paquet, R. K. Ward, and I. Pitas, “Wavelet Packets-based Digital Watermarking for Image Verification and Authentication,” Signal Processing, Vol. 88, No. 9, pp. 2193-2205. [30]R. M. Shen, Y. G. Fu, and H. T. Lu, “A Novel Image Watermarking Scheme Based on Support Vector Regression,” Journal of Systems and Software, Vol. 78, No. 1, pp. 1-8. [31]R. Sion, M. Atallah, and S. Prahakar, “Rights Protection for Relational Data,” IEEE Transac¬tions on Knowledge and Data Engineering, Vol. 16, No. 12, 2004, pp. 1509-1525. [32]R. Sion, M. Atallah, and S. Prahakar, “Rights Protection for Categorical Data,” IEEE Transac¬tions on Knowledge and Data Engineering, Vol. 17, No. 7, 2005, pp. 912-926. [33]M. Swanson, M Kobayashi, and A. Tewfik, “Multimedia Data-Embedding and Watermarking Technologies,” in Proceedings of the IEEE, Vol. 86, No. 6, 1998, pp.1064-1087. [34]H. H. Tsai and D. W. Sun, “Color Image Watermark Extraction Based on Support Vector Machines,” Information Sciences, Vol. 177, No. 2, 2007, pp. 550-569. [35]J. Tian, “Reversible Watermarking by Difference Expansion,” in Proceedings Workshop on Multimedia and Security, Dec. 2002, pp. 19-22. [36]M. H. Tsai, H. Y. Tseng, and C. Y. Lai, “A Database Watermarking Technique for Tamper Detection,” in Proceedings of the 9th Joint Conference on Information Sciences, Kaohsiung, Taiwan, Oct. 2006, pp. 615-618. [37]V. Vapnik, The Nature of Statistical Learning Theory, Springer-Verlag, New York, 1995. [38]V. Vapnik, Statistical Learning Theory, John Wiley, New York, 1998. [39]H. C. Wu, S. Y. Shih, and Y. H. Lai, “A Dual Database Watermarking Scheme for Malicious Tam¬pering Detection and Copyright Protection,” GESTS International Transactions on Computer Science and Engineering, Vol. 34, No. 1, 2006, pp. 151-163. [40]P. Wong and N. Memon, “Secret and Public Key Authentication Watermarking Schemes That Resist Vector Quantization Attack,” in Proceedings of SPIE Conference on Security and Watermarking of Multimedia Contents, Vol. 3971, San Jose, California, 2000, pp. 417-427. [41]X. T. Wang, C. Y. Shao, X. G. Xu, and X. M. Niu, “Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion,” IEEE Transac¬tions on Information Forensics and Security, Vol. 2, No. 3, 2007, pp. 311-320. [42]X. Y. Wang, H. Y. Yang, and C. Y. Cui, “An SVM-based Robust Digital Image Watermarking Against Desynchronization Attacks,” Signal Processing, Vol. 88, No 9, 2008, pp. 2193-2205. [43]M. Yeung and F. Mintzer, “An Invisible Watermarking Technique for Image Verification,” in Proceedings of IEEE International Conference on Image Processing, Vol. 2, Santa Barbara, California, 1997, pp. 680-683. [44]Y. Zhang, X. Niu, D. Zhao, J. Li, and S. Liu, “Re¬lational Databases Watermark Technique Based on Content Characteristic,” in Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), Beijing, China, 2006, pp. 677-680.
|