2021
DOI: 10.1007/s11704-020-0112-z
|View full text |Cite
|
Sign up to set email alerts
|

Robust watermarking of databases in order-preserving encrypted domain

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(1 citation statement)
references
References 28 publications
0
1
0
Order By: Relevance
“…Contrary, watermarking techniques must implement the public system requirement following Kerckhoffs' principle [31], [32], which establishes that the cryptosystem security must rely on the secrecy of its parameter values (in particular, the cryptographic keys) and not in hiding its details. For this reason, watermarking techniques must guarantee robustness and security [33], [34], considering protected digital assets are expected to be attacked, and the watermark embedded into them has to resist the malicious operations trying to remove the marks or compromise the watermark detection [6], [35].…”
Section: Related Workmentioning
confidence: 99%
“…Contrary, watermarking techniques must implement the public system requirement following Kerckhoffs' principle [31], [32], which establishes that the cryptosystem security must rely on the secrecy of its parameter values (in particular, the cryptographic keys) and not in hiding its details. For this reason, watermarking techniques must guarantee robustness and security [33], [34], considering protected digital assets are expected to be attacked, and the watermark embedded into them has to resist the malicious operations trying to remove the marks or compromise the watermark detection [6], [35].…”
Section: Related Workmentioning
confidence: 99%