Downloads: 108
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 10, October 2015
Effective Watermarking Techniques on Structured Datasets
Mini Joswin | Deeksha Bhardwaj [7]
Abstract: The data that floats on the web has a wide exposure to authorized and unauthorized users who may copy and reuse or manipulate the data. This can lead to serious breach in the security of the individual or organization who owns the data. Apart from unauthorized regeneration, the data may be subjected to various types of attacks. Watermarking serves as an effective measure to ensure ownership protection and attack resilience of digital data. In this paper we survey the current state-of-the-art methodologies advocated for watermarking relational databases and their effectiveness against different categories of data attacks.
Keywords: Watermarking, Robust, Reversible, Usability constraints, Data attacks
Edition: Volume 4 Issue 10, October 2015,
Pages: 2153 - 2156
Similar Articles with Keyword 'Watermarking'
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 10 Issue 12, December 2021
Pages: 1257 - 1264Digital Image Watermarking Technique Using Discrete Wavelet Transform and Discrete Cosine Transform
Bhupendra Ram
Downloads: 73
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 470 - 478Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT
Aditya Tiwari | Ayush Pandey