[2]
A. Bamatraf, R. Ibrahim, and M.N. Salleh, "Digital watermarking
algorithm using LSB", Computer Applications and Industrial Electronics
(ICCAIE), pp. 155-159, December 2010.
[3]
F. Rahman, and N.N. Mandaogade, "Digital audio watermarking
techniques with musical audio feature classification", Int. J. Curr.
Eng. Technol., vol. 4, no. 5, October 2014.
[4]
S. Aljawarneh, and M.B. Yassein, "A resource-efficient encryption algorithm for multimedia big data", Multimedia Tools Appl., vol. 76, no. 21, pp. 22703-22724, 2017.
[5]
S.A. Aljawarneh, A. Alawneh, and R. Jaradat, "Cloud security engineering: Early stages of SDLC", Future Gener. Comput. Syst., vol. 74, pp. 385-392, 2017.
[6]
S.S. Kshatriya, and S.S. Sane, "A study of watermarking relational databases", Int. J. Appl. Innov. Eng. Manag. (IJAIEM), vol. 3, no. 10, October 2014. ISSN 2319–4847.
[7]
H. Rashidi, "A novel watermarking scheme for detecting and recovering
distortions in database tables", Int. J. Database Manage.
Syst. (IJDMS), vol. 2, no. 3, August 2010.
[8]
M.K. Rathva, and G.J. Sahani, "Watermarking relational databases", Int. J. Comput. Sci. Eng. Appl. (IJCSEA), vol. 3, no. 1, p. 71, February 2013.
[9]
S.A. Aljawarneh, R.A. Moftah, and A.M. Maatuk, "Investigations of automatic methods for detecting the polymorphic worms signatures", Future Gener. Comput. Syst., vol. 60, pp. 67-77, 2016.
[10]
S. Aljawarneh, "A web engineering security methodology for e-learning systems", Netw. Secur., vol. 2011, no. 3, pp. 12-15, 2011.
[11]
S. Iftikhar, M. Kamran, and Z. Anwar, "A survey on reversible watermarking techniques for relational databases", Secur. Commun. Netw., vol. 8, no. 15, pp. 2580-2603, 2015.
[14]
S. Aljawarneh, M. Aldwairi, and M.B. Yassein, "Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model", J. Comput. Sci., vol. 25, pp. 152-160, 2018.
[15]
S.A. Aljawarneh, and M.O. Yassein, "A conceptual security framework for cloud computing issues", Int. J. Intell. Inf. Technol. (IJIIT), vol. 12, no. 2, pp. 12-24, April 2016.
[16]
R. Halder, S. Pal, and A. Cortesi, "Watermarking techniques for relational databases: Survey, classification and comparison", J. Univers. Comput. Sci., vol. 16, no. 21, pp. 3164-3190, 2010.
[17]
A.S. Alfagi, A.A. Manaf, B.A. Hamida, S. Khan, and A.A. Elrowayati, "Survey on relational database watermarking techniques", ARPN J. Eng. Appl. Sci., vol. 11, no. 1, January 2016.
[18]
A. Robust, "Distortion minimizing technique for watermarking relational databases using once-for-all usability constraints", IEEE Trans. Knowl. Data Eng., vol. 25, no. 12, pp. 2694-2707, 2013.
[19]
A. Khan, and S.A. Husain, "A fragile zero watermarking scheme to
detect and characterize malicious modifications in database relations", Sci. World J., vol. 2013, 2013.
[20]
H.-I. Choi, T. wan Kim, S.-H. Kwon, H. Pyo, S.H. Park, H.-J. Shin, and J.-K. Sohn, "Digital watermarking of polygonal meshes with linear operators of scale functions", Comput. Aided Des., vol. 42, no. 3, pp. 163-172, March 2010.
[21]
S. Aljawarneh, "Cloud security engineering: Avoiding security threats the right way", Int. J. Cloud Appl. Comput. (IJCAC), vol. 1, no. 2, pp. 64-70, 2011.
[22]
S.A. Aljawarneh, R. Vangipuram, V.K. Puligadda, and J. Vinjamuri, "G-SPAMINE: An approach to discover temporal association patterns and trends in internet of things", Future Gener. Comput. Syst., vol. 74, pp. 430-443, 2017.