Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Databases Traceability by Means of Watermarking with Optimized Detection

    In this paper, we propose a robust lossless database watermarking scheme the detection of which is optimized for the traceability of databases merged into, for example, shared data warehouses. We basically aim...

    Javier Franco-Contreras, Gouenou Coatrieux in Digital Forensics and Watermarking (2017)

  2. No Access

    Chapter and Conference Paper

    Using Requirements Engineering in an Automatic Security Policy Derivation Process

    Traditionally, a security policy is defined from an informal set of requirements, generally written using natural language. It is then difficult to appreciate the compatibility degree of the manually generated...

    Mariem Graa, Nora Cuppens-Boulahia in Data Privacy Management and Autonomous Spo… (2012)

  3. No Access

    Chapter and Conference Paper

    Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking

    Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security mechanism to guarantee their...

    Wei Pan, Gouenou Coatrieux in Data Privacy Management and Autonomous Spo… (2010)