[1] IFTIKHAR S, KAMRAN M, ANWAR Z. RRW—A robust and reversible watermarking technique for relational data[J]. IEEE Transactions on Knowledge and Data Engineering, 2014,27(4):1132-1145.
[2] HU D H, ZHAO D, ZHENG S L. A new robust approach for reversible database watermarking with distortion control[J]. IEEE Transactions on Knowledge and Data Engineering, 2018,31(6):1024-1037.
[3] 吴军基,盛琪,贺济峰,等. 小波数字水印在电力系统信息安全中的应用[J]. 电力自动化设备, 2004(12):40-42.
[4] 朱少敏,张志强. 混合变换域数字水印在电力系统信息安全中的应用[C]// 2013电力行业信息化年会. 2013:611-612.
[5] AGRAWAL R, KIERNAN J. Watermarking relational databases[C]// Proceedings of the 28th International Conference on Very Large Databases. 2002:155-166.
[6] XIE M R, WU C C, SHEN J J, et al. A survey of data distortion watermarking relational databases[J]. International Journal of Network Security, 2016,18(6):1022-1033.
[7] 王春东,杨蕾,万福金,等. 数据库水印模型及其算法综述[J]. 电子学报, 2019,47(4):946-954.
[8] GUPTA G, PIEPRZYK J. Reversible and blind database watermarking using difference expansion[M]// New Technologies for Digital Crime and Forensics: Devices, Applications, and Software. 2011:190-201.
[9] JAWAD K, KHAN A. Genetic algorithm and difference expansion based reversible watermarking for relational databases[J]. Journal of Systems and Software, 2013,86(11):2742-2753.
[10]IMAMOGLU M B, ULUTAS M, ULUTAS G. A new reversible database watermarking approach with firefly optimization algorithm[J]. Mathematical Problems in Engineering, 2017(2):1-14.
[11]POURNAGHSHBAND V. A new watermarking approach for relational data[C]// Proceedings of the 46th Annual Southeast Regional Conference on XX. 2008:127-131.
[12]LI Y, GUO H P, JAJODIA S. Tamper detection and localization for categorical data using fragile watermarks[C]// Proceedings of the 4th ACM Workshop on Digital Rights Management. 2004:73-82.
[13]KAMRAN M, FAROOQ M. An information-preserving watermarking scheme for right protection of EMR systems[J]. IEEE Transactions on Knowledge and Data Engineering, 2011,24(11):1950-1962.
[14]KAMRAN M, FAROOQ M. An optimized information-preserving relational database watermarking scheme for ownership protection of medical data[J]. Multimedia, arXiv preprint arXiv:1801.09741, 2018.
[15]KAMRAN M, SUHAIL S, FAROOQ M. A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints[J]. IEEE Transactions on Knowledge and Data Engineering, 2013,25(12):2694-2707.
[16]BONEH D, SHAW J. Collusion-secure fingerprinting for digital data[J]. IEEE Transactions on Information Theory, 1998,44(5):1897-1905.
[17]BUI T V, NGUYEN B Q, NGUYEN T D, et al. Robust fingerprinting codes for database[C]// International Conference on Algorithms and Architectures for Parallel Processing. 2013:167-176.
[18]LAFAYE J, GROSS-AMBLARD D, CONSTANTIN C, et al. Watermill: An optimized fingerprinting system for databases under constraints[J]. IEEE Transactions on Knowledge and Data Engineering, 2008,20(4):532-546.
[19]MOHANPURKAR A, JOSHI M. A fingerprinting technique for numeric relational databases with distortion minimization[C]// 2015 International Conference on Computing Communication Control and Automation. 2015:655-660.
[20]LI Y, SWARUP V, JAJODIA S. Fingerprinting relational databases: Schemes and specialties[J]. IEEE Transactions on Dependable and Secure Computing, 2005,2(1):34-45.
[21]CHAI H, YANG S, JIANG Z L, et al. A robust and reversible watermarking technique for relational dataset based on clustering[C]// 2019 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/the 13th IEEE International Conference on Big Data Science and Engineering(TrustCom/BigDataSE). 2019:411-418.
[22]ROSS Q J. Induction of decision trees[J]. Machine Learning, 1986,1(1):81-106.
[23]ROSS Q J. C4.5: Programs for Machine Learning[M]. Elsevier, 2014.
[24]BREIMAN L, FRIEDMAN J, STONE C J, et al. Classification and Regression Trees[M]. CRC Press, 1984.
|