Cited By
View all- Backes MGrimm NKate A(2016)Data Lineage in Malicious EnvironmentsIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2015.239929613:2(178-191)Online publication date: 1-Mar-2016
The advancements in network technologies and processing of multimedia contents have provided the way for the distribution and sharing of multimedia contents through networks. This in turn has increased the demand for protecting the multimedia contents ...
Image authentication and restoration is an important area of modern research. In digital photography, copyright protection is very crucial. Visible signatures distract from the meaning of the photograph as well as they are easy to be removed by using ...
Proving ownership right on outsourced relational database is a crucial issue in today's internet-based application environments and in many content distribution applications. We present a mechanism for proof of ownership which is based on the secure ...
Hindawi Limited
London, United Kingdom
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in