[1] |
IFTIKHAR S, KAMRAN M, ANWAR Z. RRW—A robust and reversible watermarking technique for relational data[J]. IEEE Transactions on Knowledge and Data Engineering, 2014,27(4):1132-1145.
|
[2] |
HU D H, ZHAO D, ZHENG S L. A new robust approach for reversible database watermarking with distortion control[J]. IEEE Transactions on Knowledge and Data Engineering, 2018,31(6):1024-1037.
|
[3] |
吴军基,盛琪,贺济峰,等. 小波数字水印在电力系统信息安全中的应用[J]. 电力自动化设备, 2004(12):40-42.
|
[4] |
朱少敏,张志强. 混合变换域数字水印在电力系统信息安全中的应用[C]// 2013电力行业信息化年会. 2013:611-612.
|
[5] |
AGRAWAL R, KIERNAN J. Watermarking relational databases[C]// Proceedings of the 28th International Conference on Very Large Databases. 2002:155-166.
|
[6] |
XIE M R, WU C C, SHEN J J, et al. A survey of data distortion watermarking relational databases[J]. International Journal of Network Security, 2016,18(6):1022-1033.
|
[7] |
王春东,杨蕾,万福金,等. 数据库水印模型及其算法综述[J]. 电子学报, 2019,47(4):946-954.
|
[8] |
GUPTA G, PIEPRZYK J. Reversible and blind database watermarking using difference expansion[M]// New Technologies for Digital Crime and Forensics: Devices, Applications, and Software. 2011:190-201.
|
[9] |
JAWAD K, KHAN A. Genetic algorithm and difference expansion based reversible watermarking for relational databases[J]. Journal of Systems and Software, 2013,86(11):2742-2753.
|
[10] |
IMAMOGLU M B, ULUTAS M, ULUTAS G. A new reversible database watermarking approach with firefly optimization algorithm[J]. Mathematical Problems in Engineering, 2017(2):1-14.
|
[11] |
POURNAGHSHBAND V. A new watermarking approach for relational data[C]// Proceedings of the 46th Annual Southeast Regional Conference on XX. 2008:127-131.
|
[12] |
LI Y, GUO H P, JAJODIA S. Tamper detection and localization for categorical data using fragile watermarks[C]// Proceedings of the 4th ACM Workshop on Digital Rights Management. 2004:73-82.
|
[13] |
KAMRAN M, FAROOQ M. An information-preserving watermarking scheme for right protection of EMR systems[J]. IEEE Transactions on Knowledge and Data Engineering, 2011,24(11):1950-1962.
|
[14] |
KAMRAN M, FAROOQ M. An optimized information-preserving relational database watermarking scheme for ownership protection of medical data[J]. Multimedia, arXiv preprint arXiv:1801.09741, 2018.
|
[15] |
KAMRAN M, SUHAIL S, FAROOQ M. A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints[J]. IEEE Transactions on Knowledge and Data Engineering, 2013,25(12):2694-2707.
|
[16] |
BONEH D, SHAW J. Collusion-secure fingerprinting for digital data[J]. IEEE Transactions on Information Theory, 1998,44(5):1897-1905.
|
[17] |
BUI T V, NGUYEN B Q, NGUYEN T D, et al. Robust fingerprinting codes for database[C]// International Conference on Algorithms and Architectures for Parallel Processing. 2013:167-176.
|
[18] |
LAFAYE J, GROSS-AMBLARD D, CONSTANTIN C, et al. Watermill: An optimized fingerprinting system for databases under constraints[J]. IEEE Transactions on Knowledge and Data Engineering, 2008,20(4):532-546.
|
[19] |
MOHANPURKAR A, JOSHI M. A fingerprinting technique for numeric relational databases with distortion minimization[C]// 2015 International Conference on Computing Communication Control and Automation. 2015:655-660.
|
[20] |
LI Y, SWARUP V, JAJODIA S. Fingerprinting relational databases: Schemes and specialties[J]. IEEE Transactions on Dependable and Secure Computing, 2005,2(1):34-45.
|
[21] |
CHAI H, YANG S, JIANG Z L, et al. A robust and reversible watermarking technique for relational dataset based on clustering[C]// 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/the 13th IEEE International Conference on Big Data Science and Engineering(TrustCom/BigDataSE). 2019:411-418.
|
[22] |
ROSS Q J. Induction of decision trees[J]. Machine Learning, 1986,1(1):81-106.
|
[23] |
ROSS Q J. C4.5: Programs for Machine Learning[M]. Elsevier, 2014.
|
[24] |
BREIMAN L, FRIEDMAN J, STONE C J, et al. Classification and Regression Trees[M]. CRC Press, 1984.
|