Mohanpurkar et al., 2015 - Google Patents
A fingerprinting technique for numeric relational databases with distortion minimizationMohanpurkar et al., 2015
- Document ID
- 3551248226761487444
- Author
- Mohanpurkar A
- Joshi M
- Publication year
- Publication venue
- 2015 International Conference on Computing Communication Control and Automation
External Links
Snippet
With the ever-increasing usage of internet, the availability of digital data is in tremendous demand. In this context, it is essential to protect the ownership of the data and to be able to find the guilty user. In this paper, a fingerprinting scheme is proposed to provide protection …
- 238000000034 method 0 title description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30781—Information retrieval; Database structures therefor; File system structures therefor of video data
- G06F17/30784—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre
- G06F17/30799—Information retrieval; Database structures therefor; File system structures therefor of video data using features automatically derived from the video content, e.g. descriptors, fingerprints, signatures, genre using low-level visual features of the video content
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30286—Information retrieval; Database structures therefor; File system structures therefor in structured data stores
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30908—Information retrieval; Database structures therefor; File system structures therefor of semistructured data, the undelying structure being taken into account, e.g. mark-up language structure data
- G06F17/30914—Mapping or conversion
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3074—Audio data retrieval
- G06F17/30755—Query formulation specially adapted for audio data retrieval
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30017—Multimedia data retrieval; Retrieval of more than one type of audiovisual media
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/30861—Retrieval from the Internet, e.g. browsers
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Kumar et al. | A recent survey on multimedia and database watermarking | |
Sion et al. | Rights protection for relational data | |
Li et al. | Fingerprinting relational databases: Schemes and specialties | |
Farfoura et al. | A novel blind reversible method for watermarking relational databases | |
Franco-Contreras et al. | Robust lossless watermarking of relational databases based on circular histogram modulation | |
Sion et al. | On watermarking numeric sets | |
Peng et al. | Multipurpose watermarking for vector map protection and authentication | |
Franco-Contreras et al. | Robust watermarking of relational databases with ontology-guided distortion control | |
US7539872B2 (en) | Method and system for rights assessment over digital data through watermarking | |
Xie et al. | A Survey of Data Distortion Watermarking Relational Databases. | |
Kamel et al. | A robust software watermarking for copyright protection | |
Liu et al. | A block oriented fingerprinting scheme in relational database | |
Živic | Robust image authentication in the presence of noise | |
Mehta et al. | A Novel approach as Multi-place Watermarking for Security in Database | |
Mohanpurkar et al. | A fingerprinting technique for numeric relational databases with distortion minimization | |
Lohegaon | A robust, distortion minimization fingerprinting technique for relational database | |
Schäler et al. | Reliable provenance information for multimedia data using invertible fragile watermarks | |
Khanduja et al. | Identification and Proof of Ownership by WatermarkingRelational Databases | |
Bedi et al. | A unique approach for watermarking non-numeric relational database | |
Saikia et al. | Coded fingerprinting based watermarking to resist collusion attacks and trace colluders | |
CN115828194A (en) | Data privacy protection method and detection method of privacy enhanced semi-blind digital fingerprint | |
Deshpande et al. | New watermarking technique for relational databases | |
Mohanpurkar et al. | Applying watermarking for copyright protection, traitor identification and joint ownership: A review | |
Pleşca et al. | Efficient and robust perceptual hashing using log-polar image representation | |
Mohanpurkar et al. | Fingerprinting Numeric Databases with Information Preservation and Collusion Avoidance |