[go: up one dir, main page]

Guo, 2011 - Google Patents

Fragile watermarking scheme for tamper detection of relational database

Guo, 2011

Document ID
5314816041302934810
Author
Guo J
Publication year
Publication venue
2011 International Conference on Computer and Management (CAMAN)

External Links

Snippet

As more and more databases are published on the internet nowadays, it is increasingly important to maintain the security of published databases. In this paper, we propose a distortion-free scheme for embedding and verifying integrity information for relational …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • G06F21/645Protecting data integrity, e.g. using checksums, certificates or signatures using a third party
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor

Similar Documents

Publication Publication Date Title
Guo Fragile watermarking scheme for tamper detection of relational database
US8225402B1 (en) Anomaly-based detection of SQL injection attacks
Guo et al. A fragile watermarking scheme for detecting malicious modifications of database relations
US20170053135A1 (en) Columnar Table Data Protection
Kamel A schema for protecting the integrity of databases
Camara et al. Distortion‐free watermarking approach for relational database integrity checking
CN101587479A (en) Database management system kernel oriented data encryption/decryption system and method thereof
Rani et al. Tampering detection of distributed databases using blockchain technology
Iftikhar et al. A survey on reversible watermarking techniques for relational databases
Dubey et al. SQL filtering: An effective technique to prevent SQL injection attack
Kamel et al. Toward protecting the integrity of relational databases
Yu [Retracted] Encryption Technology for Computer Network Data Security Protection
Siledar et al. A distortion-free watermarking approach for verifying integrity of relational databases
Hong et al. Query integrity verification based-on mac chain in cloud storage
US20230205896A1 (en) Methods for securing data
Li et al. An asymmetric watermarking scheme for relational database
Ge et al. Reversible database watermarking based on random forest and genetic algorithm
Dwivedi et al. Watermarking techniques for ownership protection of relational databases
Camara et al. Block-based scheme for database integrity verification
Silvério et al. Efficient data integrity checking for untrusted database systems
Ravan et al. A survey on querying encrypted data for database as a service
KR102108542B1 (en) Security method for video metadata and method for searching encrypted video using the same
Bhattacharya et al. Distortion-Free Authentication Watermarking.
Khanduja Dynamic watermark injection in NoSQL databases
Kamel et al. An empirical study on the robustness of a fragile watermark for relational databases