A Highly-Reliable Virtual Primary Key Scheme for Relational Database Watermarking Techniques
Citations
12 citations
11 citations
8 citations
8 citations
6 citations
Cites background or methods from "A Highly-Reliable Virtual Primary K..."
...[24] with the goal of varying the elements involved in the VPK generation....
[...]
...Considering that choosing a process featuring a high entropy in the generation of the seeds is an important factor for our approach to succeed, we proposed a version of the ExtScheme [24] to perform this task despite having been initially conceived for VPK generation....
[...]
...WM embedded using each VPK scheme [10], [24]....
[...]
References
382 citations
"A Highly-Reliable Virtual Primary K..." refers background in this paper
...[1] oriented to mark numeric attributes....
[...]
...PK)) where the operator ° represents concatenation and H represents a one-way hash function [1] such as SHA-2 or SHA-3....
[...]
86 citations
65 citations
"A Highly-Reliable Virtual Primary K..." refers background or methods in this paper
...Years later, the PK dependent scheme for tuple selection on AHK algorithms, was named T-Scheme [10]....
[...]
...[10]) this will result in many identical marks, seriously compromising the synchronization of WM extraction....
[...]
...independently; (ii) every mark is embedded multiple times, and (iii) a majority vote is used in WM detection [10]....
[...]
...This problem, defined as deletion problem [10], also compromises the WM detection....
[...]
...T-Scheme has proven to be robust against common set attacks (elimination or modification of tuples or attributes) due to: (i) every tuple is marked 978-1-5386-2652-8/17 $31.00 © 2017 IEEE DOI 10.1109/CSCI.2017.10 55 independently; (ii) every mark is embedded multiple times, and (iii) a majority vote is used in WM detection [10]....
[...]
45 citations
"A Highly-Reliable Virtual Primary K..." refers background in this paper
...That is why most of the following techniques, proposed since 2002, are also PK-dependent [4, 8, 11]....
[...]
33 citations
"A Highly-Reliable Virtual Primary K..." refers background in this paper
...Also, WMs can be used for controlling the integrity of data and protect them against tampering and fraud [2, 14]....
[...]