Gandhi et al., 2020 - Google Patents
A Genetic Approach for Reversible Database Watermarking using Fingerprint maskingGandhi et al., 2020
View PDF- Document ID
- 15705621080341498350
- Author
- Gandhi J
- Shredha T
- Vishali S
- Vishnupriya V
- Publication year
External Links
Snippet
Data mining involves the practice of examining large pre-existing raw databases to generate usable new information. Authenticity, privacy, and confidentiality of larger datasets are outsourced to the cloud and internet in the encrypted format. Although it has wide attention …
- 230000002441 reversible 0 title abstract description 11
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Zhu et al. | Secure neural network watermarking protocol against forging attack | |
Xue et al. | Intellectual property protection for deep learning models: Taxonomy, methods, attacks, and evaluations | |
KR102224998B1 (en) | Computer-implemented system and method for protecting sensitive data via data re-encryption | |
US20140053240A1 (en) | System, method and apparatus for electronically protecting data and digital content | |
US20100005509A1 (en) | System, method and apparatus for electronically protecting data and digital content | |
Xue et al. | DNN intellectual property protection: Taxonomy, attacks and evaluations | |
US20220141014A1 (en) | Storing secret data on a blockchain | |
Lederer et al. | Identifying appropriate intellectual property protection mechanisms for machine learning models: A systematization of watermarking, fingerprinting, model access, and attacks | |
Yu | [Retracted] Encryption Technology for Computer Network Data Security Protection | |
Noninska et al. | Organization of technological structures for personal data protection | |
Khanduja et al. | A generic watermarking model for object relational databases | |
Gandhi et al. | A Genetic Approach for Reversible Database Watermarking using Fingerprint masking | |
US20080126808A1 (en) | Encrypted dataset access by custodians | |
JP2017219997A (en) | Information processing system, information processing device and program | |
Hambolu et al. | Provenance threat modeling | |
Kaushik et al. | Securing the transfer and controlling the piracy of digital files using Blockchain | |
Gupta et al. | A Review on Data Leakage Detection for Secure Communication | |
Lee | Multipurpose protection for numeric data with capabilities of self-authentication and ownership declaration | |
Lafta et al. | Secure Content-Based Image Retrieval with Copyright Protection within Cloud Computing Environment. | |
Bhatia | User authentication in big data | |
Bharvada | Electronic Signatures, Biometrics and PKI in the UK | |
Xue et al. | Turn Passive to Active: A Survey on Active Intellectual Property Protection of Deep Learning Models | |
Mariappan et al. | Digital Forensic and Machine Learning | |
Ahmed et al. | Towards The Data Security And Digital Evidence Based Solution In Bangladesh Perspective | |
Agaian et al. | Secure Multilayer Database System for Digital Image Archiving |