[1] |
Xu J, Chen H, Yang X, et al. Verifiable image revision from chameleon hashes. Cybersecurity, 2021, 4: 34. doi: 10.1186/s42400-021-00097-3
|
[2] |
Yuan G, Hao Q. Digital watermarking secure scheme for remote sensing image protection. China Communications, 2020, 17: 88–98. doi: 10.23919/JCC.2020.04.009
|
[3] |
Sun J, Jiang X, Liu J, et al. An anti-recompression video watermarking algorithm in bitstream domain. Tsinghua Science and Technology, 2020, 26: 154–162. doi: 10.26599/TST.2019.9010050
|
[4] |
Munir R, Harlili. A secure fragile video watermarking algorithm for content authentication based on Arnold cat map. In: 2019 4th International Conference on Information Technology (InCIT). Bangkok, Thailand: IEEE, 2019 : 32–37.
|
[5] |
Wang F, Zhou H, Fang H, et al. Deep 3D mesh watermarking with self-adaptive robustness. Cybersecurity, 2022, 5: 24. doi: 10.1186/s42400-022-00125-w
|
[6] |
Hamidi M, Haziti M E, Cherifi H, et al. A robust blind 3-D mesh watermarking based on wavelet transform for copyright protection. In: 2017 International Conference on Advanced Technologies for Signal and Image Processing (ATSIP). Fez, Morocco: IEEE, 2017 : 1–6.
|
[7] |
Hou J U, Kim D G, Lee H K. Blind 3D mesh watermarking for 3D printed model by analyzing layering artifact. IEEE Transactions on Information Forensics and Security, 2017, 12: 2712–2725. doi: 10.1109/TIFS.2017.2718482
|
[8] |
Duy T P, Tran D, Ma W. An intelligent learning-based watermarking scheme for outsourced biomedical time series data. In: 2017 International Joint Conference on Neural Networks (IJCNN). Anchorage, AK, USA: IEEE, 2017 : 4408–4415.
|
[9] |
Kaur S, Singhal R, Farooq O, et al. Digital watermarking of ECG data for secure wireless commuication. In: 2010 International Conference on Recent Trends in Information, Telecommunication and Computing. Kerala, India: IEEE, 2010 : 140–144.
|
[10] |
Edward Jero S, Ramu P, Swaminathan R. Imperceptibility- Robustness tradeoff studies for ECG steganography using Continuous Ant Colony Optimization. Expert Systems With Applications, 2016, 49: 123–135. doi: 10.1016/j.eswa.2015.12.010
|
[11] |
Agrawal R, Kiernan J. Watermarking relational databases. In: Proceedings of the 28th international conference on Very Large Data Bases. New York: ACM, 2002 : 155–166.
|
[12] |
Guo F, Wang J, Li D. Fingerprinting relational databases. In: Proceedings of the 2006 ACM symposium on Applied computing. New York: ACM, 2006 : 487–492.
|
[13] |
Guo F, Wang J, Zhang Z, et al. An improved algorithm to watermark numeric relational data. In: Proceedings of the 6th international conference on Information Security Applications. New York: ACM, 2005 : 138–149.
|
[14] |
Franco-Contreras J, Coatrieux G. Robust watermarking of relational databases with ontology-guided distortion control. IEEE Transactions on Information Forensics and Security, 2015, 10: 1939–1952. doi: 10.1109/TIFS.2015.2439962
|
[15] |
Sion R, Atallah M, Prabhakar S. Rights protection for relational data. In: Proceedings of the 2003 ACM SIGMOD international conference on Management of data, New York: ACM, 2003: 98–109.
|
[16] |
Shehab M, Bertino E, Ghafoor A. Watermarking relational databases using optimization-based techniques. IEEE Transactions on Knowledge and Data Engineering, 2008, 20: 116–129. doi: 10.1109/TKDE.2007.190668
|
[17] |
Gross-Amblard D. Query-preserving watermarking of relational databases and XML documents. In: Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. New York: ACM, 2003 : 191–201.
|
[18] |
Zhang Y, Yang B, Niu X. Reversible watermarking for relational database authentication. Journal of Computer, 2006 , 17(2): 59–65.
|
[19] |
Gupta G, Pieprzyk J. Reversible and blind database watermarking using difference expansion. International Journal of Digital Crime and Forensics, 2009, 1: 42–54. doi: 10.4018/jdcf.2009040104
|
[20] |
Jawad K, Khan A. Genetic algorithm and difference expansion based reversible watermarking for relational databases. Journal of Systems and Software, 2013, 86: 2742–2753. doi: 10.1016/j.jss.2013.06.023
|
[21] |
Hu D, Zhao D, Zheng S. A new robust approach for reversible database watermarking with distortion control. IEEE Transactions on Knowledge and Data Engineering, 2019, 31: 1024–1037. doi: 10.1109/TKDE.2018.2851517
|
[22] |
Imamoglu M B, Ulutas M, Ulutas G. A new reversible database watermarking approach with firefly optimization algorithm. Mathematical Problems in Engineering, 2017, 2017: 1387375. doi: 10.1155/2017/1387375
|
[23] |
Farfoura M E, Horng S J, Wang X. A novel blind reversible method for watermarking relational databases. Journal of the Chinese Institute of Engineers, 2013, 36: 87–97. doi: 10.1080/02533839.2012.726041
|
[24] |
Iftikhar S, Kamran M, Anwar Z. RRW—a robust and reversible watermarking technique for relational data. IEEE Transactions on Knowledge and Data Engineering, 2015, 27: 1132–1145. doi: 10.1109/TKDE.2014.2349911
|
[25] |
Li Y, Wang J, Jia H. A robust and reversible watermarking algorithm for a relational database based on continuous columns in histogram. Mathematics, 2020, 8: 1994. doi: 10.3390/math8111994
|
[26] |
Li Y, Wang J, Luo X. A reversible database watermarking method non-redundancy shifting-based histogram gaps. International Journal of Distributed Sensor Networks, 2020, 16: 1550147720921769. doi: 10.1177/1550147720921769
|
[27] |
Tang X, Cao Z, Dong X, et al. PKMark: A robust zero-distortion blind reversible scheme for watermarking relational databases. In: 2021 IEEE 15th International Conference on Big Data Science and Engineering (BigDataSE). Shenyang, China: IEEE, 2021 : 72–79.
|
[28] |
Ge C, Sun J, Sun Y, et al. Reversible database watermarking based on random forest and genetic algorithm. In: 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). Chongqing, China: IEEE, 2020 : 239–247.
|
[29] |
Wang W, Liu C, Wang Z, et al. FBIPT: A new robust reversible database watermarking technique based on position tuples. In: 2022 4th International Conference on Data Intelligence and Security (ICDIS). Shenzhen, China: IEEE, 2022 : 67–74.
|
[30] |
Energy Market Company Pte Ltd. Uniform Singapore Energy Price and Demand Forecast, 2022 . https://www.emcsg.com/MarketData/PriceInformation#priceDataView. Accessed March 01, 2023.
|
[1] |
Xu J, Chen H, Yang X, et al. Verifiable image revision from chameleon hashes. Cybersecurity, 2021, 4: 34. doi: 10.1186/s42400-021-00097-3
|
[2] |
Yuan G, Hao Q. Digital watermarking secure scheme for remote sensing image protection. China Communications, 2020, 17: 88–98. doi: 10.23919/JCC.2020.04.009
|
[3] |
Sun J, Jiang X, Liu J, et al. An anti-recompression video watermarking algorithm in bitstream domain. Tsinghua Science and Technology, 2020, 26: 154–162. doi: 10.26599/TST.2019.9010050
|
[4] |
Munir R, Harlili. A secure fragile video watermarking algorithm for content authentication based on Arnold cat map. In: 2019 4th International Conference on Information Technology (InCIT). Bangkok, Thailand: IEEE, 2019 : 32–37.
|
[5] |
Wang F, Zhou H, Fang H, et al. Deep 3D mesh watermarking with self-adaptive robustness. Cybersecurity, 2022, 5: 24. doi: 10.1186/s42400-022-00125-w
|
[6] |
Hamidi M, Haziti M E, Cherifi H, et al. A robust blind 3-D mesh watermarking based on wavelet transform for copyright protection. In: 2017 International Conference on Advanced Technologies for Signal and Image Processing (ATSIP). Fez, Morocco: IEEE, 2017 : 1–6.
|
[7] |
Hou J U, Kim D G, Lee H K. Blind 3D mesh watermarking for 3D printed model by analyzing layering artifact. IEEE Transactions on Information Forensics and Security, 2017, 12: 2712–2725. doi: 10.1109/TIFS.2017.2718482
|
[8] |
Duy T P, Tran D, Ma W. An intelligent learning-based watermarking scheme for outsourced biomedical time series data. In: 2017 International Joint Conference on Neural Networks (IJCNN). Anchorage, AK, USA: IEEE, 2017 : 4408–4415.
|
[9] |
Kaur S, Singhal R, Farooq O, et al. Digital watermarking of ECG data for secure wireless commuication. In: 2010 International Conference on Recent Trends in Information, Telecommunication and Computing. Kerala, India: IEEE, 2010 : 140–144.
|
[10] |
Edward Jero S, Ramu P, Swaminathan R. Imperceptibility- Robustness tradeoff studies for ECG steganography using Continuous Ant Colony Optimization. Expert Systems With Applications, 2016, 49: 123–135. doi: 10.1016/j.eswa.2015.12.010
|
[11] |
Agrawal R, Kiernan J. Watermarking relational databases. In: Proceedings of the 28th international conference on Very Large Data Bases. New York: ACM, 2002 : 155–166.
|
[12] |
Guo F, Wang J, Li D. Fingerprinting relational databases. In: Proceedings of the 2006 ACM symposium on Applied computing. New York: ACM, 2006 : 487–492.
|
[13] |
Guo F, Wang J, Zhang Z, et al. An improved algorithm to watermark numeric relational data. In: Proceedings of the 6th international conference on Information Security Applications. New York: ACM, 2005 : 138–149.
|
[14] |
Franco-Contreras J, Coatrieux G. Robust watermarking of relational databases with ontology-guided distortion control. IEEE Transactions on Information Forensics and Security, 2015, 10: 1939–1952. doi: 10.1109/TIFS.2015.2439962
|
[15] |
Sion R, Atallah M, Prabhakar S. Rights protection for relational data. In: Proceedings of the 2003 ACM SIGMOD international conference on Management of data, New York: ACM, 2003: 98–109.
|
[16] |
Shehab M, Bertino E, Ghafoor A. Watermarking relational databases using optimization-based techniques. IEEE Transactions on Knowledge and Data Engineering, 2008, 20: 116–129. doi: 10.1109/TKDE.2007.190668
|
[17] |
Gross-Amblard D. Query-preserving watermarking of relational databases and XML documents. In: Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems. New York: ACM, 2003 : 191–201.
|
[18] |
Zhang Y, Yang B, Niu X. Reversible watermarking for relational database authentication. Journal of Computer, 2006 , 17(2): 59–65.
|
[19] |
Gupta G, Pieprzyk J. Reversible and blind database watermarking using difference expansion. International Journal of Digital Crime and Forensics, 2009, 1: 42–54. doi: 10.4018/jdcf.2009040104
|
[20] |
Jawad K, Khan A. Genetic algorithm and difference expansion based reversible watermarking for relational databases. Journal of Systems and Software, 2013, 86: 2742–2753. doi: 10.1016/j.jss.2013.06.023
|
[21] |
Hu D, Zhao D, Zheng S. A new robust approach for reversible database watermarking with distortion control. IEEE Transactions on Knowledge and Data Engineering, 2019, 31: 1024–1037. doi: 10.1109/TKDE.2018.2851517
|
[22] |
Imamoglu M B, Ulutas M, Ulutas G. A new reversible database watermarking approach with firefly optimization algorithm. Mathematical Problems in Engineering, 2017, 2017: 1387375. doi: 10.1155/2017/1387375
|
[23] |
Farfoura M E, Horng S J, Wang X. A novel blind reversible method for watermarking relational databases. Journal of the Chinese Institute of Engineers, 2013, 36: 87–97. doi: 10.1080/02533839.2012.726041
|
[24] |
Iftikhar S, Kamran M, Anwar Z. RRW—a robust and reversible watermarking technique for relational data. IEEE Transactions on Knowledge and Data Engineering, 2015, 27: 1132–1145. doi: 10.1109/TKDE.2014.2349911
|
[25] |
Li Y, Wang J, Jia H. A robust and reversible watermarking algorithm for a relational database based on continuous columns in histogram. Mathematics, 2020, 8: 1994. doi: 10.3390/math8111994
|
[26] |
Li Y, Wang J, Luo X. A reversible database watermarking method non-redundancy shifting-based histogram gaps. International Journal of Distributed Sensor Networks, 2020, 16: 1550147720921769. doi: 10.1177/1550147720921769
|
[27] |
Tang X, Cao Z, Dong X, et al. PKMark: A robust zero-distortion blind reversible scheme for watermarking relational databases. In: 2021 IEEE 15th International Conference on Big Data Science and Engineering (BigDataSE). Shenyang, China: IEEE, 2021 : 72–79.
|
[28] |
Ge C, Sun J, Sun Y, et al. Reversible database watermarking based on random forest and genetic algorithm. In: 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). Chongqing, China: IEEE, 2020 : 239–247.
|
[29] |
Wang W, Liu C, Wang Z, et al. FBIPT: A new robust reversible database watermarking technique based on position tuples. In: 2022 4th International Conference on Data Intelligence and Security (ICDIS). Shenzhen, China: IEEE, 2022 : 67–74.
|
[30] |
Energy Market Company Pte Ltd. Uniform Singapore Energy Price and Demand Forecast, 2022 . https://www.emcsg.com/MarketData/PriceInformation#priceDataView. Accessed March 01, 2023.
|