watermark framework for relational databases. In
CISOFT-EA, pages 229–234.
Boncz, P. A., Zukowski, M., and Nes, N. (2005). Mon-
etDB/X100: Hyper-pipelining query execution. In
CIDR, pages 225–237.
Camara, L., Li, J., Li, R., and Xie, W. (2014). Distortion-
free watermarking approach for relational database in-
tegrity checking. Mathematical problems in engineer-
ing.
Franco-Contreras, J., Coatrieux, G., Cuppens, F., Cuppens-
Boulahia, N., and Roux, C. (2014). Robust lossless
watermarking of relational databases based on circu-
lar histogram modulation. IEEE Transactions on In-
formation Forensics and Security, 9(3):397–410.
Guo, H., Li, Y., Liu, A., and Jajodia, S. (2006). A fragile
watermarking scheme for detecting malicious modi-
fications of database relations. Information Sciences,
176(10):1350 – 1378.
Hu, Z., Cao, Z., and Sun, J. (2009). An image based algo-
rithm for watermarking relational databases. In 2009
International Conference on Measuring Technology
and Mechatronics Automation, pages 425–428.
Kamel, I. (2009). A schema for protecting the integrity of
databases. Computers & Security, 28(7):698 – 709.
Kamel, I., AlaaEddin, M., Yaqub, W., and Kamel, K.
(2016). Distortion-free fragile watermark for rela-
tional databases. International Journal of Big Data
Intelligence, 3(3):190–201.
Kamel, I. and Kamel, K. (2011). Toward protecting the
integrity of relational databases. In Internet Security
World Congress, pages 258–261. IEEE.
Kamel, I., Yaqub, W., and Kamel, K. (2013). An empiri-
cal study on the robustness of a fragile watermark for
relational databases. In 9th International Conference
on Innovations in Information Technology (IIT), pages
227–232.
Khan, A. and Husain, S. A. (2013). A fragile zero wa-
termarking scheme to detect and characterize mali-
cious modifications in database relations. The Scien-
tific World Journal. Article ID 796726.
Khanna, S. and Zane, F. (2000). Watermarking maps:
Hiding information in structured data. In 11th An-
nual ACM-SIAM Symposium on Discrete Algorithms,
SODA ’00, pages 596–605. Society for Industrial and
Applied Mathematics.
Lee, S.-J. and Jung, S.-H. (2001). A survey of watermarking
techniques applied to multimedia. In IEEE Interna-
tional Symposium on Industrial Electronics Proceed-
ings (ISIE), pages 272–277.
Li, Y. and Deng, R. H. (2006). Publicly verifiable ownership
protection for relational databases. In ACM Sympo-
sium on Information, Computer and Communications
Security, ASIACCS ’06, pages 78–89. ACM.
Li, Y., Guo, H., and Jajodia, S. (2004). Tamper detection
and localization for categorical data using fragile wa-
termarks. In 4th ACM Workshop on Digital Rights
Management, DRM ’04, pages 73–82. ACM.
P
´
erez Gort, M. L., Feregrino Uribe, C., and Nummenmaa,
J. (2017). A minimum distortion: High capacity wa-
termarking technique for relational data. In 5th ACM
Workshop on Information Hiding and Multimedia Se-
curity, pages 111–121. ACM.
Potdar, V. M., Han, S., and Chang, E. (2005). A sur-
vey of digital image watermarking techniques. In 3rd
IEEE International Conference on Industrial Infor-
matics INDIN, pages 709–716.
Rani, S., Koshley, D. K., and Halder, R. (2017).
Partitioning-insensitive watermarking approach for
distributed relational databases. In Transactions on
Large-Scale Data-and Knowledge-Centered Systems
XXXVI, pages 172–192. Springer.
Rao, B. V. S. and Prasad, M. V. N. K. (2012). Subset selec-
tion approach for watermarking relational databases.
In Data Engineering and Management, pages 181–
188. Springer Berlin Heidelberg.
UCI Knowledge Discovery in Databases Archive (1999).
Forest CoverType.
Wang, C., Wang, J., Zhou, M., Chen, G., and Li, D. (2008).
Atbam: An arnold transform based method on water-
marking relational data. In 2008 International Con-
ference on Multimedia and Ubiquitous Engineering
(MUE), pages 263–270.
Zhang, Y., Niu, X., Zhao, D., Li, J., and Liu, S. (2006). Re-
lational databases watermark technique based on con-
tent characteristic. In First International Conference
on Innovative Computing, Information and Control -
Volume I (ICICIC’06), pages 677–680.
Distortion-free Watermarking Scheme for Compressed Data in Columnar Database
187