2011 World Congress on Information and Communication Technologies 2011
DOI: 10.1109/wict.2011.6141387
|View full text |Cite
|
Sign up to set email alerts
|

Applying watermarking for copyright protection, traitor identification and joint ownership: A review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4

Citation Types

0
3
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 25 publications
0
3
0
Order By: Relevance
“…Watermark security is also ensured by checking the system against the attacks. Some recent surveys (Halder, Pal, & Cortesi, 2010;Mohanpurkar & Joshi, 2011) present a review of several watermarking techniques which apply different approaches to achieve ownership protection. A few techniques have attempted fingerprinting of relational databases and a very few have claimed for collusion secure fingerprinting.…”
Section: Related Workmentioning
confidence: 99%
“…Watermark security is also ensured by checking the system against the attacks. Some recent surveys (Halder, Pal, & Cortesi, 2010;Mohanpurkar & Joshi, 2011) present a review of several watermarking techniques which apply different approaches to achieve ownership protection. A few techniques have attempted fingerprinting of relational databases and a very few have claimed for collusion secure fingerprinting.…”
Section: Related Workmentioning
confidence: 99%
“…As per the latest study [5], to the best of our knowledge no technique has been proposed yet which achieves fingerprinting in numeric relational database where distortion is minimum, decoding accuracy is 100% and performs traitor tracing. Fig.…”
Section: Related Workmentioning
confidence: 99%
“…Different approaches and types of watermarking numeric relational databases are suggested in [8,9,11,13] where information preservation and fingerprinting are not taken into consideration hence no question of collusion attack.…”
Section: Related Workmentioning
confidence: 99%
“…An exhaustive literature survey [10,11,13] done here helps us to conclude that there is a need for a system which is able to insert and detect fingerprints in numeric databases that preserves information and avoids collusion.…”
Section: Related Workmentioning
confidence: 99%