![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Databases Traceability by Means of Watermarking with Optimized Detection
In this paper, we propose a robust lossless database watermarking scheme the detection of which is optimized for the traceability of databases merged into, for example, shared data warehouses. We basically aim...
-
Chapter and Conference Paper
Using Requirements Engineering in an Automatic Security Policy Derivation Process
Traditionally, a security policy is defined from an informal set of requirements, generally written using natural language. It is then difficult to appreciate the compatibility degree of the manually generated...
-
Chapter and Conference Paper
Medical Image Integrity Control Combining Digital Signature and Lossless Watermarking
Enforcing protection of medical content becomes a major issue of computer security. Since medical contents are more and more widely distributed, it is necessary to develop security mechanism to guarantee their...