2021
DOI: 10.1007/s12083-021-01096-4
|View full text |Cite
|
Sign up to set email alerts
|

Copyright protection method of big data based on nash equilibrium and constraint optimization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
3
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…Relational watermarking techniques can also be classified by their (i) cover-type, defining the type of data of the attribute in R selected to embed the marks; (ii) intent, i.e., ownership protection [1]- [3], [56], data tampering detection [4], [5], [57], traitor tracing [58]- [62], among others; (iii) watermark source, which can be meaningless such as a random binary stream [19], [31], or meaningful, i.e., a source for watermark generation presenting a meaning that does not depend on the watermarking technique [17], [64], [65]. Regarding the covertype, some techniques embed the watermark into attributes storing categorical values [66]- [69], information regarding date or time [70], textual [1], [47] or numerical content [17], [71], [72]. Note that the relational watermarking approach we propose in this work is distortion-based, oriented to protect the ownership of the data to which it is applied.…”
Section: Related Workmentioning
confidence: 99%
“…Relational watermarking techniques can also be classified by their (i) cover-type, defining the type of data of the attribute in R selected to embed the marks; (ii) intent, i.e., ownership protection [1]- [3], [56], data tampering detection [4], [5], [57], traitor tracing [58]- [62], among others; (iii) watermark source, which can be meaningless such as a random binary stream [19], [31], or meaningful, i.e., a source for watermark generation presenting a meaning that does not depend on the watermarking technique [17], [64], [65]. Regarding the covertype, some techniques embed the watermark into attributes storing categorical values [66]- [69], information regarding date or time [70], textual [1], [47] or numerical content [17], [71], [72]. Note that the relational watermarking approach we propose in this work is distortion-based, oriented to protect the ownership of the data to which it is applied.…”
Section: Related Workmentioning
confidence: 99%