Sciweavers

4113 search results - page 23 / 823
» Watermarking Relational Databases
Sort
View
ISCAS
2003
IEEE
97views Hardware» more  ISCAS 2003»
15 years 7 months ago
Watermark re-synchronization using log-polar mapping of image autocorrelation
Many watermarking algorithms embed the watermark into the image as contiguous non-overlapping tiles. This tiling structure forms an implicit synchronization template that can be r...
Adnan M. Alattar, Joel Meyer
VLDB
1991
ACM
141views Database» more  VLDB 1991»
15 years 6 months ago
Efficiency of Nested Relational Document Database Systems
Systems designed for efficient retrieval of conventional data can be very inefficient at retrieving documents. Documents have more complex structure than conventional data, and th...
Justin Zobel, James A. Thom, Ron Sacks-Davis
195
Voted
ICDE
1995
IEEE
98views Database» more  ICDE 1995»
16 years 3 months ago
Relational Database Compression Using Augmented Vector Quantization
Data compression is one way to alleviate the 1/0bottleneck problem faced by I/O-intensive applications such as databases. However, this approach is not widely used because of the ...
Wee Keong Ng, Chinya V. Ravishankar
IWDW
2004
Springer
15 years 7 months ago
A Multi-feature Based Invertible Authentication Watermarking for JPEG Images
: Invertible authentication techniques have been used in some special applications (such as medical or military) where original data can be recovered after authenticated. In this p...
Deng-Pan Ye, Yaobin Mao, Yuewei Dai, Zhiquan Wang
DEXAW
2005
IEEE
164views Database» more  DEXAW 2005»
15 years 8 months ago
Mobile Digital Rights Management: Security Requirements and Copy Detection Mechanisms
This paper addresses the specification of security modules in a Mobile Digital Rights Management (DRM) approach with a focus on copy detection mechanisms. The presented DRM approa...
Miguel Soriano, Stephan Flake, Jürgen Tacken,...