2017 International Conference on Computational Science and Computational Intelligence (CSCI) 2017
DOI: 10.1109/csci.2017.10
|View full text |Cite
|
Sign up to set email alerts
|

A Highly-Reliable Virtual Primary Key Scheme for Relational Database Watermarking Techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 13 publications
0
6
0
Order By: Relevance
“…Despite our proposal contributes to increment the quality of the synchronized WM using the VPK sets generated by any scheme, we validated our approach using the S and M schemes, since those are the options that generate one VPK TABLE 2. WM embedded using each VPK scheme [10], [24].…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Despite our proposal contributes to increment the quality of the synchronized WM using the VPK sets generated by any scheme, we validated our approach using the S and M schemes, since those are the options that generate one VPK TABLE 2. WM embedded using each VPK scheme [10], [24].…”
Section: Resultsmentioning
confidence: 99%
“…The Ext-Scheme was proposed in 2017 by Pérez Gort et al [24] with the goal of varying the elements involved in the VPK generation. Same as the S-Scheme and the M-Scheme, the Ext-Scheme generates one VPK for each tuple, but the attributes involved can vary depending on their values.…”
Section: ) the Ext-schemementioning
confidence: 99%
See 1 more Smart Citation
“…The VPK is generated based on two numeric attributes in [24]. Different attributes are selected each time in [25]. The HQR-Scheme [26] generates one VPK per tuple based on the cyclic model of the attribute.…”
Section: B: Virtual Primary Key Basedmentioning
confidence: 99%
“…We used the relation's PK to perform the watermark synchronization. To avoid the use of the PK we recommend the generation of virtual primary keys by using the Ext-Scheme (Gort et al, 2017) or the HQR-Scheme (Gort et al, 2019). These schemes were originally proposed for numerical attributes, but they can be applied by combining numerical and textual cover types as well.…”
Section: Ssimmentioning
confidence: 99%