{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T04:49:19Z","timestamp":1758862159471},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540253341"},{"type":"electronic","value":"9783540320050"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11408079_8","type":"book-chapter","created":{"date-parts":[[2010,12,20]],"date-time":"2010-12-20T15:38:10Z","timestamp":1292859490000},"page":"56-67","source":"Crossref","is-referenced-by-count":8,"title":["Watermarking Spatial Trajectory Database"],"prefix":"10.1007","author":[{"given":"Xiaoming","family":"Jin","sequence":"first","affiliation":[]},{"given":"Zhihao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jianmin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Deyi","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Priyantha, N., Miu, A., Balakrishnan, H., Teller, S.: The cricket compass for context-aware mobile applications. In: Proc. of MOBICOM 2001, pp. 1\u201314 (2001)","key":"8_CR1","DOI":"10.1145\/381677.381679"},{"unstructured":"Chen, G., Kotz, D.: Categorizing binary topological relations between regions, lines, and points in geographic databases. Technical Report TR2000-381, A Survey of Context-Aware Mobile Computing Research, Dept. of Computer Science, Dartmouth College (2000)","key":"8_CR2"},{"doi-asserted-by":"crossref","unstructured":"Vlachos, M., Kollios, G., Gunopulos, D.: Discovering Similar Multidimensional Trajectories. In: Proc. of the 18th International Conference on Data Engineering (ICDE 2002), San Jose, California (2002)","key":"8_CR3","DOI":"10.1109\/ICDE.2002.994784"},{"doi-asserted-by":"crossref","unstructured":"Patel, J.M., Chen, Y., Chakka, V.P.: STRIPES: An Efficient Index for Predicted Trajectories. In: Proceedings of ACM SIGMOD 2004, pp. 635\u2013646 (2004)","key":"8_CR4","DOI":"10.1145\/1007568.1007639"},{"doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J., Srikant, R., Xu, Y.: Order Preserving Encryption for Numeric Data. In: Proceedings of ACM SIGMOD 2004, pp. 563\u2013574 (2004)","key":"8_CR5","DOI":"10.1145\/1007568.1007632"},{"issue":"7","key":"8_CR6","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"F.A.P. Petitcolas","year":"1999","unstructured":"Petitcolas, F.A.P., Anderson, R.J., Kuhn, M.G.: Information Hiding - A Survey. Proceedings of the IEEE\u00a087(7), 1062\u20131078 (1999)","journal-title":"Proceedings of the IEEE"},{"issue":"4","key":"8_CR7","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/49.668979","volume":"16","author":"S. Craver","year":"1998","unstructured":"Craver, S., Memon, N., Yeo, B.-L., Yeung, M.M.: Resolving Rightful Ownerships with Invisible Watermarking Techniques: Limitations, Attacks, and Implications. IEEE Journal of Selected Areas in Communications\u00a016(4), 573\u2013586 (1998)","journal-title":"IEEE Journal of Selected Areas in Communications"},{"issue":"7","key":"8_CR8","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/5.771066","volume":"87","author":"F. Hartung","year":"1999","unstructured":"Hartung, F., Kutter, M.: Multimedia Watermarking Techniques. Proceedings of the IEEE\u00a087(7), 1079\u20131107 (1999)","journal-title":"Proceedings of the IEEE"},{"issue":"4","key":"8_CR9","doi-asserted-by":"publisher","first-page":"250","DOI":"10.1049\/ip-vis:19960711","volume":"143","author":"J.J.K. Ruanaidh","year":"1996","unstructured":"Ruanaidh, J.J.K., Dowling, W.J., Boland, F.M.: Watermarking Digital Images for Copyright Protection. IEEE Proceedings on Vision, Signal and Image Processing\u00a0143(4), 250\u2013256 (1996)","journal-title":"IEEE Proceedings on Vision, Signal and Image Processing"},{"issue":"4","key":"8_CR10","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1109\/49.668980","volume":"16","author":"I.J. Cox","year":"1998","unstructured":"Cox, I.J., Linnartz, J.P.M.G.: Some General Methods for Tampering with Watermarks. IEEE Journal of Selected Areas in Communication\u00a016(4), 573\u2013586 (1998)","journal-title":"IEEE Journal of Selected Areas in Communication"},{"doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C.: On the Limits of Software Watermarking. Technique Reports, Department of Computer Sciences, The University of Auckland (1998)","key":"8_CR11","DOI":"10.1145\/292540.292569"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1007\/3-540-47870-1_10","volume-title":"Security and Privacy in Digital Rights Management","author":"H. Chang","year":"2002","unstructured":"Chang, H., Atallah, M.: Protecting software code by guards. In: Sander, T. (ed.) DRM 2001. LNCS, vol.\u00a02320, pp. 160\u2013175. Springer, Heidelberg (2002)"},{"doi-asserted-by":"crossref","unstructured":"Collberg, C., Carter, E., Debray, S., Huntwork, A., Linn, C., Stepp, M.: Dynamic path-based software watermarking. In: SIGPLAN 2004 Conference on Programming Language Design and Implementation (2004)","key":"8_CR13","DOI":"10.1145\/996841.996856"},{"doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J.: Watermarking Relational Databases. In: Proceedings of the 28th VLDB Conference, Hong Kong, China (2002)","key":"8_CR14","DOI":"10.1016\/B978-155860869-6\/50022-6"},{"doi-asserted-by":"crossref","unstructured":"Sion, R., Atallah, M., Prabhakar, S.: Rights Protection for Relational Data. In: Proceedings of ACM SIGMOD, pp. 98\u2013109 (2003)","key":"8_CR15","DOI":"10.1145\/872757.872772"},{"doi-asserted-by":"crossref","unstructured":"Ohbuchi, R., Masuda, H., Aono, M.: A Shape-Preserving Data Embedding Algorithm for NURBS Curves and Surfaces. In: Computer Graphics International 1999 (CGI 1999), Canmore, Canada (1999)","key":"8_CR16","DOI":"10.1109\/CGI.1999.777952"},{"doi-asserted-by":"crossref","unstructured":"Ohbuchi, R., Ueda, H., Endoh, S.: Robust Watermarking of Vector Digital Maps. In: Proceedings of the IEEE International Conference on Multimedia and Expo 2002 (ICME 2002), Lausanne, Switzerland (2002)","key":"8_CR17","DOI":"10.1109\/ICME.2002.1035847"}],"container-title":["Lecture Notes in Computer Science","Database Systems for Advanced Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11408079_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T14:51:37Z","timestamp":1605624697000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11408079_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540253341","9783540320050"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/11408079_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}