![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextgreen.png)
![Open Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_open_medium.gif)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltextred.png)
![Restricted Access](https://i-scholar.in/lib/pkp/templates/images/icons/fulltext_restricted_medium.gif)
A Brief Structure of Watermarking Relational Database: An Overview
Subscribe/Renew Journal
Watermarking schemes that detect, localize, and recover malicious modification of database. The database watermarking is group based and a group watermark is associated to specific order of tuples in a group. The basic idea is to build watermark after partitioning tuples with actual attributes. This solution provides a candidate solution to copyright protection of relation database, maintain integrity of database information.
Keywords
Watermarking, Database Watermarking.
Subscription
Login to verify subscription
User
Font Size
Information
![](https://i-scholar.in/public/site/images/abstractview.png)
Abstract Views: 297
![](https://i-scholar.in/public/site/images/pdfview.png)
PDF Views: 2