Academic literature on the topic 'Database tamper detection'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Database tamper detection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Database tamper detection"

1

Tripathi, Shweta, and Bandu Baburao Meshram. "Digital Evidence for Database Tamper Detection." Journal of Information Security 03, no. 02 (2012): 113–21. http://dx.doi.org/10.4236/jis.2012.32014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Qi, Tao, Bo Wang, and Su Juan Zhao. "The Research of Website Tamper-Resistant Technology." Advanced Materials Research 850-851 (December 2013): 475–78. http://dx.doi.org/10.4028/www.scientific.net/amr.850-851.475.

Full text
Abstract:
Webpage tamperproof technology is a website technology to protect webpage not to display tamper contents and to carry out real-time recovery. Webpage tamperproof system uses advanced Web server core embedded technology and tamper detection technology based on cryptography to give a comprehensive protection of static webpage and dynamic webpage of the website. Webpage tamperproof system supports the automatic release, tamper detection, application protection, warning, and real-time recovery of webpage, guarantees the safety of various links of transmission, identification, address access, form submission, and auditing, fully eliminates the possibility of access to tampered webpage in a real-time manner, and puts an end to any tamper of backstage database in a manner of Web.
APA, Harvard, Vancouver, ISO, and other styles
3

Yao, Xiao Ming, Hong Yu Chen, Hong Lei Li, and Xiao Yi Zhou. "Tamper Detection in RFID Tags Using Zero-Watermarks." Applied Mechanics and Materials 511-512 (February 2014): 169–72. http://dx.doi.org/10.4028/www.scientific.net/amm.511-512.169.

Full text
Abstract:
Recently data integrity issues of applications based on radio frequency identification (RFID) have drawn great concerns worldwide and many watermarking-based schemes have been proposed. While those schemes can effectively verify if the protected tag data be modified, they also expose both the protected data and the watermark to any adversaries. In this paper, we present a zero-watermark scheme, which stores the watermark not in part of the data fields of RFID tags but in the back-end database system or that of a trusted third party without any modification of the original RFID data. The novelty of this zero-watermark scheme lies in the fact that we extend the zero-watermark technology to the RFID tags and the use of data tampering from the limited applications of copyright protection of digital works. We term this scheme ZMark-TamDetect because it is a tamper detection solution using zero-watermarks, which is so designed that it can be easily plugged into existing RFID middleware applications. This proposal is one of the first works that integrates zero-watermark and RFID technologies together and it provides a detailed theoretical foundation for the ZMark-TamDetect.
APA, Harvard, Vancouver, ISO, and other styles
4

Thanki, Rohit, Surekha Borra, and Ashish Kothari. "Fragile Watermarking Framework for Tamper Detection of Color Biometric Images." International Journal of Digital Crime and Forensics 13, no. 2 (March 2021): 35–56. http://dx.doi.org/10.4018/ijdcf.2021030103.

Full text
Abstract:
Application of fragile watermarking on biometric images stored at a server or cloud ensures proper authentication and tamper detection when access to the servers was shared. In this paper, a hybrid domain fragile watermarking technique for authenticity of color biometric images, using hybridization of various transforms such as discrete cosine transform (DCT), fast discrete curvelet transform (FDCuT), and singular value decomposition (SVD) is proposed. The hybrid transform coefficients are modified according to the scrambled color watermark to obtain watermarked color biometric image. The security of this technique is strengthened with the usage of Arnold scrambling, and by using multiple secret keys. The proposed technique is analyzed on FEI Brazilian face database. The experimental results show that this technique performs better than the existing fragile watermarking techniques.
APA, Harvard, Vancouver, ISO, and other styles
5

Hamadou, Ali, Lanciné Camara, Abdoul Aziz Issaka Hassane, and Harouna Naroua. "Reversible Fragile Watermarking Scheme for Relational Database Based on Prediction-Error Expansion." Mathematical Problems in Engineering 2020 (May 5, 2020): 1–9. http://dx.doi.org/10.1155/2020/1740205.

Full text
Abstract:
The protection of database systems content using digital watermarking is nowadays an emerging research direction in information security. In the literature, many solutions have been proposed either for copyright protection and ownership proofing or integrity checking and tamper localization. Nevertheless, most of them are distortion embedding based as they introduce permanent errors into the cover data during the encoding process, which inevitably affect data quality and usability. Since such distortions are not tolerated in many applications, including banking, medical, and military data, reversible watermarking, primarily designed for multimedia content, has been extended to relational databases. In this article, we propose a novel prediction-error expansion based on reversible watermarking strategy, which not only detects and localizes malicious modifications but also recovers back the original data at watermark detection. The effectiveness of the proposed method is proved through rigorous theoretical analysis and detailed experiments.
APA, Harvard, Vancouver, ISO, and other styles
6

Tang, Qi, Guoli Ma, Weiming Zhang, and Nenghai Yu. "Reversible Data Hiding for DNA Sequences and Its Applications." International Journal of Digital Crime and Forensics 6, no. 4 (October 2014): 1–13. http://dx.doi.org/10.4018/ijdcf.2014100101.

Full text
Abstract:
As the blueprint of vital activities of most living things on earth, DNA has important status and must be protected perfectly. And in current DNA databases, each sequence is stored with several notes that help to describe that sequence. However, these notes have no contribution to the protection of sequences. In this paper, the authors propose a reversible data hiding method for DNA sequences, which could be used either to embed sequence-related annotations, or to detect and restore tampers. When embedding sequence annotations, the methods works in low embedding rate mode. Only several bits of annotations are embedded. When used for tamper detection and tamper restoration, all possible embedding positions are utilized to assure the maximum restoration capacity.
APA, Harvard, Vancouver, ISO, and other styles
7

K K A, Abdullah, Robert A B C, and Adeyemo A B. "August 2016 VOLUME 5, ISSUE 8, AUGUST 2016 5th Generation Wi-Fi Shatha Ghazal, Raina S Alkhlailah Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5801 ECG Arrhythmia Detection Using Choi-Williams Time-Frequency Distribution and Artificial Neural Network Sanjit K. Dash, G. Sasibhushana Rao Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5802 Data Security using RSA Algorithm in Cloud Computing Santosh Kumar Singh, Dr. P.K. Manjhi, Dr. R.K. Tiwari Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5803 Detection Algorithms in Medical Imaging Priyanka Pareek, Pankaj Dalal Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5804 A Review Study on the CPU Scheduling Algorithms Shweta Jain, Dr. Saurabh Jain Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5805 Healthcare Biosensors - A Paradigm Shift To Wireless Technology Taha Mukhtar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5806 Congestion Control for Peer to Peer Application using Random Early Detection Algorithm Sonam Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5807 Quantitative and Qualitative Analysis of Milk Parameters using Arduino Controller Y.R. Bhamare, M.B. Matsagar, C.G. Dighavkar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5808 Ardunio Based Security and Safety using GSM as Fault Alert System for BTS (Base Transceiver Station) Umeshwari Khot, Prof. Venkat N. Ghodke Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5809 Automatic Single and Multi Topic Summarization and Evolution to Generate Timeline Mrs. V. Meenakshi, Ms. S. Jeyanthi Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5810 Data Hiding in Encrypted HEVC/AVC Video Streams Saltanat Shaikh, Prof. Shahzia Sayyad Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5811 A Study of Imbalanced Classification Problem P. Rajeshwari, D. Maheshwari Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5812 Design of PTL based Area Efficient and Low Power 4-bit ALU Saraabu Narendra Achari, Mr. C. Pakkiraiah Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5813 The Design of Driver Safety Awareness and Assistance System through Sleep Activated and Auto Brake System for Vehicle Control D. Sivabalaselvamani, Dr. A. Tamilarasi, L. Rahunathan and A.S. Harishankher Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5814 Parameters Selection, Applications & Convergence Analysis of PSO Algorithms Sachin Kumar, Mr. N.K. Gupta Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5815 Effective Pattern Deploying Model for the Document Restructuring and Classification Niketa, Jharna Chopra Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5816 Cataloging Telugu Sentences by Hidden Morkov Techniques V. Suresh Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5817 Biometrics for Cell Phone Safety Jyoti Tiwari, Santosh Kumar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5818 Digital Image Watermarking using Modified DWT&DCT Combination and Bi Linear Interpolation Yannam .Nagarjuna, K. Chaitanya Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5819 Comparative Study and Analysis on the Techniques of Web Mining Dipika Sahu, Yamini Chouhan Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5820 A Review of MIL-STD-1553 Bus Trends and Future K. Padmanabham, Prabhakar Kanugo, Dr. K. Nagabhushan Raju, M. Chandrashekar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5821 Design of QPSK Digital Modulation Scheme Using Turbo Codes for an Air Borne System D. Sai Brunda, B. Geetha Rani Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5822 An Efficient Locally Weighted Spectral Cluster for Automatic Image Segmentation Vishnu Priya M, J Santhosh Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5823 An Efficient Sliding Window Based Micro Cluster Over Data Streams Nancy Mary, A. Venugopal Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5824 Comparative Analysis of Traditional Frequency Reuse Techniques in LTE Network Neelam Rani, Dr. Sanjeev Kumar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5825 Score Level Integration of Fingerprint and Hand Geometry Biometrics Jyoti Tiwari, Santosh Kumar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5826 CHARM: Intelligently Cost and Bandwidth Detection for FTP Servers using Heuristic Algorithm Shiva Urolagin Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5827 Image Enhancement Using Modified Exposure Based Histogram SK. Nasreen, N. Anupama Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5828 Human Gesture Based Recognition and Classification Using MATLAB Suman, Er. Kapil Sirohi Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5829 Image Denoising- A Novel Approach Dipali D. Sathe, Prof. K.N. Barbole Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5830 Design of Low Pass Digital FIR Filter Using Nature Inspired Technique Nisha Rani, Balraj Singh, Darshan Singh Sidhu Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5831 Issues and Challenges in Software Quality Assurance Himangi, Surender singh Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5832 Hybridization of GSA and AFSA to Detect Black Hole Attack in Wireless Sensor Network Soni Rani, Charanjit Singh Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5833 Reversible Watermarking Technique for Data Hiding, Accurate Tamper Detection in ROI and Exact Recovery of ROI Y. Usha Madhuri, K. Chaitanya Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5834 Fault Tolerance and Concurrency Control in Heterogeneous Distributed Database Systems Sagar Patel, Meghna Burli, Nidhi Shah, Prof. (Mrs.) Vinaya Sawant Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5835 Collection of Offline Tamil Handwriting Samples and Database Creation D. Rajalakshmi, Dr. S.K. Jayanthi Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5836 Overview of Renewable Energy in Maharashtra Mr. Sagar P. Thombare, Mr. Vishal Gunjal, Miss. Snehal Bhandarkar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5837 Comparative Analysis of Efficient Image Steganographic Technique with the 2-bit LSB Algorithm for Color Images K. S. Sadasiva Rao, Dr A. Damodaram Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5838 An Efficient Reverse Converter Design for Five Moduli Set RNS Y. Ayyavaru Reddy, B. Sekhar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5839 VLSI Design of Area Efficient High Performance SPMV Accelerator using VBW-CBQCSR Scheme N. Narasimharao, A. Mallaiah Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5840 Customer Retention of MCDR using 3SCDM Approaches Suban Ravichandran, Chandrasekaran Ramasamy Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5841 User Privacy and Data Trustworthiness in Mobile Crowd Sensing Ms. T. Sharadha, Dr. R. Vijaya Bhanu Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5842 A Safe Anti-Conspiracy Data Model For Changing Groups in Cloud G. Ajay Kumar, Devaraj Verma C Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5843 Scope and Adoption of M-Commerce in India Anurag Mishra, Sanjay Medhavi, Khan Shah Mohd, P.C. Mishra Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5844 A Secure Data Hiding Scheme For Color Image Mrs. S.A. Bhavani Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5845 A Study of Different Content Based Image Retrieval Techniques C. Gururaj, D. Jayadevappa, Satish Tunga Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5846 Cache Management for Big Data Applications: Survey Kiran Grover, Surender Singh Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5847 Survey on Energy Efficient Protocols and Challenges in IOT Syeda Butool Fatima, Sayyada Fahmeeda Sultana, Sadiya Ansari Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5848 Educational Data Mining For Evaluating Students Performance Sampreethi P.K, VR. Nagarajan Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5849 Iterative Pareto Principle for Software Test Case Prioritization Manas Kumar Yogi, G. Vijay Kumar, D. Uma Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5850 Localization Techniques in Wireless Sensor Networks: A Review Abhishek Kumar, Deepak Prashar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5851 Ensemble Averaging Filter for Noise Reduction Tom Thomas Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5852 Survey Paper on Get My Route Application Shubham A. Purohit, Tushar R. Khandare, Prof. Swapnil V. Deshmukh Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5853 Design and Implementation of Smart Car with Self-Navigation and Self-Parking Systems using Sensors and RFID Technology Madhuri M. Bijamwar, Prof. S.G. Kole, Prof. S.S. Savkare Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5854 Comparison Study of Induction Motor Drives using Microcontroller and FPGA Sooraj M S, Sreerag K T V Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5855 A Survey on Text Categorization Senthil Kumar B, Bhavitha Varma E Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5856 Multirate Signal Reconstruction Using Two Channel Orthogonal Filter Bank Sijo Thomas, Darsana P Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5857 The Multi-keyword Synonym Search for Encrypted Cloud Data Using Clustering Method Monika Rani H G, Varshini Vidyadhar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5858 A Review on Various Speech Enhancement Techniques Alugonda Rajani, Soundarya .S.V.S Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5859 A Survey on Various Spoofing Attacks and Image Fusion Techniques Pravallika .P, Dr. K. Satya Prasad Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5860 Non-Invasive Vein Detection using Infra-red Rays Aradhana Singh, Dr. S.C. Prasanna Kumar, Dr. B.G. Sudershan Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5861 Boundary-Polygons for Minutiae based Fingerprinst Recognition Kusha Maharshi, Prashant Sahai Saxena Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5862 Image Forgery Detection on Digital Images Nimi Susan Saji, Ranjitha Rajan Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5863 Enhancing Information Security in Big Data Renu Kesharwani Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5864 Secure Multi-Owner Data Sharing for Dynamic Groups in Cloud Ms. Nilophar M. Masuldar, Prof. V. P. Kshirsagar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5865 Compact Microstrip Octagonal Slot Antenna for Wireless Communication Applications Thasneem .H, Midhun Joy Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5866 ‘Aquarius’- Smart IOT Technology for Water Level Monitoring System Prof. A. M. Jagtap, Bhaldar Saniya Sikandar, Shinde Sharmila Shivaji, Khalate Vrushali Pramod, Nirmal Kalyani Sarangdhar Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5867 Future of Results in Select Search Engine Peerzada Mohammad Iqbal, Dr. Abdul Majid Baba, Aasim Bashir Abstract | PDF with Text | DOI: 10.17148/IJARCCE.2016.5868 Semantic Indexing Techniques on Information Retrieval of Web Content." IJARCCE 5, no. 8 (August 30, 2016): 347–52. http://dx.doi.org/10.17148/ijarcce.2016.5869.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rupali Chopade and Vinod Pachghare. "Data Tamper Detection from NoSQL Database in Forensic Environment." Journal of Cyber Security and Mobility, April 8, 2021. http://dx.doi.org/10.13052/jcsm2245-1439.1025.

Full text
Abstract:
The growth of service sector is increasing the usage of digital applications worldwide. These digital applications are making use of database to store the sensitive and secret information. As the database has distributed over the internet, cybercrime attackers may tamper the database to attack on such sensitive and confidential information. In such scenario, maintaining the integrity of database is a big challenge. Database tampering will change the database state by any data manipulation operation like insert, update or delete. Tamper detection techniques are useful for the detection of such data tampering which play an important role in database forensic investigation process. Use of NoSQL database has been attracted by big data requirements. Previous research work has limited to tamper detection in relational database and very less work has been found in NoSQL database. So there is a need to propose a mechanism to detect the tampering of NoSQL database systems. Whereas this article proposes an idea of tamper detection in NoSQL database such as MongoDB and Cassandra, which are widely used document-oriented and column-based NoSQL database respectively. This research work has proposed tamper detection technique which works in forensic environment to give more relevant outcome on data tampering and distinguish between suspicious and genuine tampering.
APA, Harvard, Vancouver, ISO, and other styles
9

Lian, Jie, Siqian Wang, and Yanmiao Xie. "TDRB: An Efficient Tamper-proof Detection Middleware for Relational Database Based on Blockchain Technology." IEEE Access, 2021, 1. http://dx.doi.org/10.1109/access.2021.3076235.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

"A Semi-Fragile Watermarking Scheme for Integrity Checking of Relational Databases." International Journal of Recent Technology and Engineering 8, no. 6 (March 30, 2020): 806–12. http://dx.doi.org/10.35940/ijrte.f6996.038620.

Full text
Abstract:
Extensive use of the Internet coupled with tremendous growth in database applications have created a huge demand for database security. The concepts of e-governance, e-commerce, e-business, e-learning, and digital libraries are already in place and evolving across poles. This raises various concomitant threats such as illegal copying, illegal redistribution, tampering, forgery and authentication of copyrighted digital assets. Digital Watermarking is an effective technique which can be introduced for solving the above mentioned threats. Based on the detection of the Watermark, the ownership and the integrity of the data can be asserted. Database Watermarking techniques are generally classified into two: i.e., Robust or Fragile. Robust watermarking techniques are designed for copyright protection and fragile watermarking techniques are for authentication or integrity checking of data. Watermarking schemes for relational databases authentication are almost fragile in nature. These algorithms do not allow any legitimate modification of the data. In most of the cases, innocent distortions such as tuple and/or attribute sorting may be considered as tampering. In this paper, the research work proposes a novel semi-fragile watermarking technique for tamper detection of relational databases. The new semi-fragile scheme can detect and localize malicious modifications, while allowing authorized updates. Theoretical analysis and experimental results demonstrate that common database attacks can be detected with high rate of success.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Database tamper detection"

1

Pavlou, Kyriacos. "Database Forensics in the Service of Information Accountability." 2011. http://hdl.handle.net/10150/204609.

Full text
Abstract:
Poster won first place in the graduate division of Physical Sciences, Mathematics, Computer Engineering and Computer Science at GPSC Student Showcase 2011.
Regulations and societal expectations have recently expressed the need to mediate access to valuable databases, even by insiders. At one end of the spectrum is the approach of restricting access to information and on the other that of information accountability. The focus of the proposed work is effecting information accountability of data stored in databases. One way to ensure appropriate use and thus end-to-end accountability of such information is tamper detection in databases via a continuous assurance technology based on cryptographic hashing. In our current research we are working to show how to develop the necessary approaches and ideas to support accountability in high performance databases. This will include the design of a reference architecture for information accountability and several of its variants, the development of forensic analysis algorithms and their cost model, and a systematic formulation of forensic analysis for determining when the tampering occurred and what data were tampered with. Finally, for privacy, we would like to create mechanisms for allowing as well as (temporarily) preventing the physical deletion of records in a monitored database. In order to evaluate our ideas we will design and implement an integrated tamper detection and forensic analysis system. This work will show that information accountability is a viable alternative to information restriction for ensuring the correct storage, use, and maintenance of databases.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Database tamper detection"

1

Prasannakumari, V., and V. Balu. "Audio Database Watermarking for Tamper Detection." In Computer Networks and Information Technologies, 446–48. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-19542-6_84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Kumbhare, Rohit, Shivali Nimbalkar, Rupali Chopade, and V. K. Pachghare. "Tamper Detection in MongoDB and CouchDB Database." In Proceeding of International Conference on Computational Science and Applications, 109–17. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0790-8_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Chopade, Rupali, and Vinod Pachghare. "Performance Analysis of Proposed Database Tamper Detection Technique for MongoDB." In Proceedings of Fifth International Congress on Information and Communication Technology, 393–400. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-5856-6_39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Golhar, Archana, Sakshi Janvir, Rupali Chopade, and V. K. Pachghare. "Tamper Detection in Cassandra and Redis Database—A Comparative Study." In Proceeding of International Conference on Computational Science and Applications, 99–107. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-0790-8_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Database tamper detection"

1

Guo, Jie. "Fragile Watermarking Scheme for Tamper Detection of Relational Database." In 2011 International Conference on Computer and Management (CAMAN). IEEE, 2011. http://dx.doi.org/10.1109/caman.2011.5778907.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wu, Hsien-Chu, Fang-Yu Hsu, and Hwang-Yu Chen. "Tamper Detection of Relational Database Based on SVR Predictive Difference." In 2008 Eighth International Conference on Intelligent Systems Design and Applications (ISDA). IEEE, 2008. http://dx.doi.org/10.1109/isda.2008.165.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tsai, Meng-Hsiun, Fang-Yu Hsu, Jun-Dong Chang, and Hsien-Chu Wu. "Fragile Database Watermarking for Malicious Tamper Detection Using Support Vector Regression." In Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 2007. http://dx.doi.org/10.1109/iihmsp.2007.4457595.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kumari, V. Prasanna, and K. S. Easwarakumar. "Tamper Detection in Multi-format Image Databases Using Fragile Watermarking." In 2010 International Conference on Recent Trends in Information, Telecommunication and Computing (ITC 2010). IEEE, 2010. http://dx.doi.org/10.1109/itc.2010.15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography