Chaining watermarks for detecting malicious modifications to streaming data
- 1 January 2007
- journal article
- Published by Elsevier in Information Sciences
- Vol. 177 (1) , 281-298
- https://doi.org/10.1016/j.ins.2006.03.014
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- A fragile watermarking scheme for detecting malicious modifications of database relationsInformation Sciences, 2005
- Fingerprinting relational databases: schemes and specialtiesIEEE Transactions on Dependable and Secure Computing, 2005
- Rights protection for relational dataIEEE Transactions on Knowledge and Data Engineering, 2004
- Detecting Change in Data StreamsPublished by Elsevier ,2004
- Watermarking relational data: framework, algorithms and analysisThe VLDB Journal, 2003
- Authenticating real time packet streams and multicastsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Images with self-correcting capabilitiesPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Efficient authentication and signing of multicast streams over lossy channelsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Monitoring Streams — A New Class of Data Management ApplicationsPublished by Elsevier ,2002
- How to sign digital streamsPublished by Springer Nature ,1997