|
[1]M. Alattar, “Reversible Watermark Using the Difference Expansion of a Generalized Integer Transform,” IEEE Transactions on Image Process, Vol. 13, No. 8, 2004, pp. 1147-1156. [2]R. Agrawal and J. Kiernan, “Watermarking Relational Databases,” in Proceedings of the 28th International Conference on Very Large Databases, 2002, pp. 155-166. [3]R. Agrawal, P. J. Haas, and J. Kiernan, “Watermarking Relational Data: Framework, Algorithms and Analysis,” The VLDB Journal, Vol. 12, No. 2, 2003, pp. 157-169. [4]R. Agrawal, J. Kiernan, R. Srikant, and Y. Xu, “Order Preserving Encryption for Numeric Data,” in Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, 2004, pp. 563-574. [5]A. Asuncion and D.J. Newman, UCI Machine Learning Repository, Irvine, CA: University of California, School of Information and Computer Science, 2007, available at http://www.ics.uci.edu/~mlearn/MLRepository.html. [6]E. Bertino, S. Jajodia, and P. Samarati, “Database Security: Research and Practice,” Information Systems, Vol. 20, No. 7, 1995, pp. 537-556. [7]F. Bao, R. H. Deng, B. C. Ooi, and Y. Yang, “Tailored Reversible Watermarking Schemes for Authentication of Electronic Clinical Atlas,” IEEE Transactions on Information Technology in Biomedicine, Vol. 9, No. 4, 2005, pp. 554-564. [8]C. C. Chang and C. J. Lin, LIBSVM: a library for support vector machines, 2001, software available at http://www.csie.ntu.edu.tw/~cjlin/libsvm. [9]D. Coltuc, “Low Distortion Transform for Reversible Watermarking,” IEEE Transactions on image processing, Vol. 21, No. 1, 2012, pp. 412-417. [10]M. Chen, Z. Chen, X. Zeng, and Z. Xiong, “Reversible Data Hiding using Additive Prediction Error Expansion,” in Proceedings of ACM multimedia and security, 2009, pp. 19-24. [11]M. Chen, Z. Chen, X. Zeng, and Z. Xiong, “Reversible Image Watermarking Based on Full Context Prediction,” Image Processing (ICIP), 16th IEEE International Conference, 2009, pp.4253-4256. [12]G. I. Divada and D. L. Wells, “A Database Encryption System with Subkeys,” ACM Transactions on Database Systems, Vol. 6, No. 2, 1981, pp. 312-328. [13]J. Fridrich, J. Goljan, and R. Du, “Invertible authentication,” in SPIE Proceedings of Security and Watermarking of Multimedia Content, 2002, pp. 197-208. [14]G. Gupta and J. Pieprzyk, “Reversible and Blind Database Watermarking Using Difference Expansion,” International Journal of Digital Crime and Forensics, Vol. 1, No. 2, 2009, pp. 42-54. [15]H. Guo, Y. Li, A. Liu, and S. Jajodia, “A Fragile Watermarking Scheme for Detecting Malicious Modifications of Database Relations,” Information Sciences, Vol. 176, No. 10, 2006, pp. 1350-1378. [16]F. Hartung and M. Kutter, “Multimedia Watermarking Techniques,” in Proceedings of the IEEE : special issue on Protection of Multimedia Content, Vol. 87, No. 7, 1999, pp. 1079-1107. [17]J. Han, J. Pei and Y. Yin, “Mining Frequent Patterns Without Candidate Generation,” in The 2000 ACM SIGMOD International Conference on Management of Data, 2000, pp. 1-12. [18]M. S. Hwang and W. P. Yang, “Multilevel Secure Database Encryption with Subkeys,” Data and Knowledge Engineering, Vol. 22, No. 2, 1997, pp. 117-131. [19]I. Kamel, “A Schema for Protecting the Integrity of Databases,” The Journal of Computers and Security, Vol.28, No. 7, 2009, pp.698-709. [20]G. Langelaar, I. Setyawan, and R. Lagendijk. “Watermarking Digital Image and Video Data: A State-of-the-Art Overview,” IEEE Signal Proceeding Magazine, Vol. 17, No. 5, 2000, pp. 20-46. [21]Y. Li, V. Swarup, and S. Jajodia, “Fingerprinting Relational Databases: Schemes and Specialties,” IEEE Transactions on Dependable and Secure Computing, 2005, pp. 34-45. [22]Z. Ni, Y. Q. Shi, N. Ansari, and W. Su, “Reversible Data Hiding,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 16, No. 3, 2006, pp. 354-362. [23]H. Peng, J. Wang, and W. Wang, “Image Watermarking Method in Multi wavelet Domain Based on Support Vector Machines,” The Journal of Systems and Software, Vol. 83, No. 8, 2010, pp.1470-1477. [24]M. Swanson, M Kobayashi, and A. Tewfik, “Multimedia Data Embedding and Watermarking Technologies,” in Proceedings of the IEEE, Vol. 86, No. 6, 1998, pp.1064-1087. [25]R. M. Shen, Y. G. Fu, and H. T. Lu, “A Novel Image Watermarking Scheme Based on Support Vector Regression,” The Journal of Systems and Software, Vol. 78, No. 1, pp. 1-8. [26]R. M. Shen, Y. G. Fu, and H. T. Lu, “A Novel Image Watermarking Scheme Based on Support Vector Regression,” The Journal of Systems and Software, Vol. 78, No. 1, 2005, pp.1-8. [27]R. Sion, M. Atallah, and S. Prahakar, “Rights Protection for Relational Data,” IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 12, 2004, pp. 1509-1525. [28]R. Sion, M. Atallah, and S. Prahakar, “Rights Protection for Categorical Data,” IEEE Transactions on Knowledge and Data Engineering, Vol. 17, No. 7, 2005, pp. 912-926. [29]W. C. Tao, Z. Y. Li, and H. F. Li, “Reversible and Blind Database Watermark Algorithm Based on Polar Angle Expansion,” Computer Engineering, Vol. 36, No. 22, 2010, pp. 155-157. [30]H. H. Tsai and D. W. Sun, “Color Image Watermark Extraction Based on Support Vector Machines,” Information Sciences, Vol. 177, No. 2, 2007, pp. 550-569. [31]J. Tian, “Reversible Watermarking by Difference Expansion,” in Proceedings Workshop on Multimedia and Security, 2002, pp. 19-22. [32]J. Tian, “Reversible Data Embedding Using a Difference Expansion,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 13, No. 8, 2003, pp. 890-896. [33]W. L. Tai, C. M. Yeh, and C. C. Chang, “Reversible Data Hiding Based on Histogram Modification of Pixel Differences,” IEEE Transactions on Circuits and Systems for Video Technology, Vol. 19, No. 6, 2009, pp. 906-910. [34]D. M. Thodi and J. J. Rodriguez, “Expansion Embedding Techniques for Reversible Watermarking,” IEEE Transactions on Image Process, Vol. 16, No. 3, 2007, pp. 721-730. [35]H. C. Wu, S. Y. Shih, and Y. H. Lai, “A Dual Database Watermarking Scheme for Malicious Tampering Detection and Copyright Protection,” GESTS International Transactions on Computer Science and Engineering, Vol. 34, No. 1, 2006, pp. 151-163. [36]S. Weng, Y. Zhao, J. S. Pan, and R. Ni, “Reversible Watermarking Based on Invariability and Adjustment on Pixel Pairs,” IEEE Signal Processing Letters, Vol. 5, 2008, pp. 721–724. [37]X. T. Wang, C. Y. Shao, X. G. Xu, and X. M. Niu, “Reversible Data-Hiding Scheme for 2-D Vector Maps Based on Difference Expansion,” IEEE Transactions on Information Forensics and Security, Vol. 2, No. 3, 2007, pp. 311-320. [38]X. Y. Wang, H. Y. Yang, and C. Y. Cui, “An SVM-based Robust Digital Image Watermarking Against Desynchronization Attacks,” Signal Processing, Vol. 88, No. 9, 2008, pp. 2193-2205. [39]X. Y. Wang, Z. H. Xu, and H.Y. Yang, “A Robust Image Watermarking Algorithm Using SVR Detection,” Expert Systems with Applications, Vol. 36, No. 5, 2009, pp. 9056-9064. [40]X. Wang, X. Li, B. Yang, and Z. Guo, “Efficient Generalized Integer Transform for Reversible Watermarking,” IEEE Signal Processing Letters, Vol. 17, No. 6, 2010, pp. 567-570. [41]Y. Zhang, X. Niu, D. Zhao, J. Li, and S. Liu, “Relational Databases Watermark Technique Based on Content Characteristic,” in Proceedings of the First International Conference on Innovative Computing, Information and Control, 2006, pp. 677-680.
|