[1]
H. Zhao, H. Zhao, J. Hou, and H. Liu, Effect of demand response on supply reliability of distribution network., Electric Power Automat. Equip, 2017.
[2]
J. Zhao, J. Liu, Z. Qin, and K. Ren, Privacy protection scheme based on remote anonymous attestation for trusted smart meters. " IEEE Transact. Smart Grid, Vol. no. 99, pp. 1-1, 2016
[3]
K.L. Gong, and X.P. Zhang, Research of digital watermarking technology for relational database., Comput. Technol. Develop, 2013.
[4]
R. Sion, M. Atallah, and S. Prabhakar, "Watermarking relational databases", Proceedings of SPIE The International Society for Optical Engineering Vol. 8349, no. 1, pp. 79, 2011
[5]
R. Sion, M. Atallah, and S. Prabhakar, "Rights protection for relational data", IEEE Trans. Knowl. Data Eng., vol. 16, no. 12, pp. 1509-1525, 2004.
[6]
X. Bai, and J. Ling, "Dynamic watermarking scheme based on chinese remaindering theorem", Comput. Eng., vol. 32, no. 16, pp. 155-156, 2006.
[7]
K. Liu, J. Liu, and S.L. Liu, "A RS Error Correcting Coding based Watermarking Algorithm for Relational Database", Communications Technology, 2016.
[8]
W. Xinwei, Y. Yanzhong, P. Renliang, and L. Jianhua, "Image watermarking algorithm based on error control", Comput. Eng., 2003..
[9]
J. Sun, and J. Liu, "Blind video watermarking scheme based on independent component analysis", Acta Electronica Sinica. Vol. 32, no. 9, pp. 1507-1510, 2004.
[10]
M. Kamran, and M. Farooq, "A formal usability constraints model for watermarking of outsourced datasets", IEEE Transact. Inform. Foren. Secur., vol. 8, no. 6, pp. 1061-1072, 2013.
[11]
K. Unnikrishnan, and K.V. Pramod, "Robust optimal position detection scheme for relational database watermarking through HOLPSOFA algorithm", J. Inform. Secur. Appl., vol. 35, pp. 1-12, 2017.
[12]
Q. Su, and B. Chen, "A novel blind color image watermarking using upper Hessenberg matrix", AEU Int. J. Electron. Commun., vol. 78, pp. 64-71, 2017.
[13]
U.P. Rao, D.R. Patel, and P.M. Vikani, "Relational database watermarking for ownership protection", Procedia Technol., vol. 6, no. 4, pp. 988-995, 2012.
[14]
K. Jawad, and A. Khan, "Genetic algorithm and difference expansion based reversible watermarking for relational databases", J. Syst. Softw., vol. 86, no. 11, pp. 2742-2753, 2013.
[15]
X. Luo, and Q. Cheng, "Health information integrating and size reducing- 2003 IEEE nuclear science symposium, 'medical imaging conference, and workshop of room-temperature semiconductor detectors In:", Nuclear Science Symposium Conference Record, vol. 4, 2003pp. 3014-3018
[16]
X. Luo, Q. Cheng, and J. Tan, "A lossless data embedding scheme for medical images in application of e-diagnosis , In: Engineering in Medicine and Biology Society, 2003", Proceedings of the International Conference of the IEEE 2003, Vol. 1, pp. 852-855.
[17]
M.E. Farfoura, S.J. Horng, J.L. Lai, R.S. Run, R.J. Chen, and M.K. Khan, "A blind reversible method for watermarking relational databases based on a time-stamping protocol", Expert Syst. Appl., vol. 39, no. 3, pp. 3185-3196, 2012.
[18]
X.M. Zhao, L.L. Li, and Q.T. Wu, "A novel multiple watch marking for relational databases using multi-media", Phys. Procedia, vol. 25, pp. 687-692, 2012.
[19]
J. Sang, X. Wu, C. Song, and S. Sudirman, "Multiparty multilevel watermarking protocol for digital secondary market based on iris recognition technology", Rec. Adv. Elec. Electron. Eng.. Vol. 10, no. 1, 2017.
[20]
B. Zhou, J. Sang, and C. Song, "A high security buyer-seller watermark protocol based on Iris Biometric", Recent Adv. Electr. Electron. Eng., vol. 9, no. 2, pp. 124-131, 2016.
[21]
Y. Gong, Y. Cai, Y. Guo, and Y. Fang, "A privacy-preserving scheme for incentive-based demand response in the smart grid", IEEE Trans. Smart Grid, vol. 7, no. 3, pp. 1304-1313, 2017.
[22]
I.J. Cox, J. Kilian, F.T. Leighton, and T. Shamoon, "Secure spread spectrum watermarking for multimedia", IEEE Trans. Image Process., vol. 6, no. 12, pp. 1673-1687, 1997.
[23]
G.V. Oliveira, F.P. Coutinho, R.J.G.B. Campello, and M.C. Naldi, "Improving k-means through distributed scalable metaheuristics", Neurocomputing, vol. 246, pp. 45-57, 2017.
[24]
J. Shi, X. Liu, X. Sha, Q. Zhang, and N. Zhang, "A sampling theorem for fractional wavelet transform with error estimates", IEEE Trans. Signal Process., vol. 65, no. 18, pp. 4797-4811, 2017.
[25]
C.P. Yan, and C.M. Pun, "Multi-scale difference map fusion for tamper localization using binary ranking hashing", IEEE Transact. Inform. Foren. Secur., vol. 12, no. 9, pp. 2144-2158, 2017.