2018
DOI: 10.1007/s41403-018-0058-8
|View full text |Cite
|
Sign up to set email alerts
|

Software Watermarking: Progress and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 67 publications
0
4
0
Order By: Relevance
“…The table shows each attribute's maximum and average length (columns Max and Mean, respectively), using the number of characters of their values as references. On the other hand, we used the dataset Forest Cover Type (denoted as D C ) 10 to evaluate the watermark preservation in numerical data. In this case, we perform the watermark synchronization with MA-NM.…”
Section: A Experimental Setupmentioning
confidence: 99%
See 2 more Smart Citations
“…The table shows each attribute's maximum and average length (columns Max and Mean, respectively), using the number of characters of their values as references. On the other hand, we used the dataset Forest Cover Type (denoted as D C ) 10 to evaluate the watermark preservation in numerical data. In this case, we perform the watermark synchronization with MA-NM.…”
Section: A Experimental Setupmentioning
confidence: 99%
“…Since this work targets the quality of the watermark and the data resulting from the query, we use metrics oriented to evaluate those aspects. Considering that the technique uses 10 The Forest Cover Type dataset is available online in the University of California Irvine (UCI) machine learning repository at http://kdd.ics.uci.edu/ databases/covertype/covertype.html [48] 11 The binary length BL denotes the number of bits used for the value binary representation. The bigger the binary length, the higher the cover for mark embedding.…”
Section: A Experimental Setupmentioning
confidence: 99%
See 1 more Smart Citation
“…These attributes pose significant information integrity and preservation challenges [6]. Another challenge is the complexity of hiding innumerable types of digital information in a carrier signal over multimedia systems causing the carrier's channel's to prove their authenticity and validity during a cyber incident [7]. Furthermore, the remote evidence acquisition process itself is highly vulnerable while collecting digital evidence from different sources on the network including handling data nodes from an entry point of discovery to evidence remote data recovery, reconstruction, and verification [8,9].…”
Section: Introductionmentioning
confidence: 99%