[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Gandhi et al., 2020 - Google Patents

A Genetic Approach for Reversible Database Watermarking using Fingerprint masking

Gandhi et al., 2020

View PDF
Document ID
15705621080341498350
Author
Gandhi J
Shredha T
Vishali S
Vishnupriya V
Publication year

External Links

Snippet

Data mining involves the practice of examining large pre-existing raw databases to generate usable new information. Authenticity, privacy, and confidentiality of larger datasets are outsourced to the cloud and internet in the encrypted format. Although it has wide attention …
Continue reading at www.academia.edu (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Zhu et al. Secure neural network watermarking protocol against forging attack
Xue et al. Intellectual property protection for deep learning models: Taxonomy, methods, attacks, and evaluations
KR102224998B1 (en) Computer-implemented system and method for protecting sensitive data via data re-encryption
US20140053240A1 (en) System, method and apparatus for electronically protecting data and digital content
US20100005509A1 (en) System, method and apparatus for electronically protecting data and digital content
Xue et al. DNN intellectual property protection: Taxonomy, attacks and evaluations
US20220141014A1 (en) Storing secret data on a blockchain
Lederer et al. Identifying appropriate intellectual property protection mechanisms for machine learning models: A systematization of watermarking, fingerprinting, model access, and attacks
Yu [Retracted] Encryption Technology for Computer Network Data Security Protection
Noninska et al. Organization of technological structures for personal data protection
Khanduja et al. A generic watermarking model for object relational databases
Gandhi et al. A Genetic Approach for Reversible Database Watermarking using Fingerprint masking
US20080126808A1 (en) Encrypted dataset access by custodians
JP2017219997A (en) Information processing system, information processing device and program
Hambolu et al. Provenance threat modeling
Kaushik et al. Securing the transfer and controlling the piracy of digital files using Blockchain
Gupta et al. A Review on Data Leakage Detection for Secure Communication
Lee Multipurpose protection for numeric data with capabilities of self-authentication and ownership declaration
Lafta et al. Secure Content-Based Image Retrieval with Copyright Protection within Cloud Computing Environment.
Bhatia User authentication in big data
Bharvada Electronic Signatures, Biometrics and PKI in the UK
Xue et al. Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models
Mariappan et al. Digital Forensic and Machine Learning
Ahmed et al. Towards The Data Security And Digital Evidence Based Solution In Bangladesh Perspective
Agaian et al. Secure Multilayer Database System for Digital Image Archiving