{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:18:16Z","timestamp":1726003096258},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030053444"},{"type":"electronic","value":"9783030053451"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_30","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:07:56Z","timestamp":1544173676000},"page":"351-360","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["BDCP: A Framework for Big Data Copyright Protection Based on Digital Watermarking"],"prefix":"10.1007","author":[{"given":"Jingyue","family":"Yang","sequence":"first","affiliation":[]},{"given":"Haiquan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhaoyi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jieyi","family":"Long","sequence":"additional","affiliation":[]},{"given":"Bowen","family":"Du","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"unstructured":"Chen, X.: The geospatial data copyright protection research based on rubust watermarking. North China Institute of Aerospace Engineering (2018)","key":"30_CR1"},{"doi-asserted-by":"crossref","unstructured":"Sk, A., Masilamani, V.: A novel digital watermarking scheme for data authentication and copyright protection in 5G networks. Comput. Electr. Eng. (2018)","key":"30_CR2","DOI":"10.1016\/j.compeleceng.2018.02.045"},{"issue":"4","key":"30_CR3","first-page":"1","volume":"44","author":"P He","year":"2017","unstructured":"He, P., Yu, G., Zhang, Y., et al.: The prospective review of blockchain technologies and applications. Comput. Sci. 44(4), 1\u20137 (2017)","journal-title":"Comput. Sci."},{"unstructured":"Pu, H.E., Ge, Y.U., Zhang, Y.F., et al.: Survey on blockchain technology and its application prospect. Comput. Sci. (2017)","key":"30_CR4"},{"doi-asserted-by":"crossref","unstructured":"Porru, S., Pinna, A., Marchesi, M., et al.: Blockchain-oriented software engineering: challenges and new directions. In: IEEE\/ACM, International Conference on Software Engineering Companion, pp. 169\u2013171. IEEE (2017)","key":"30_CR5","DOI":"10.1109\/ICSE-C.2017.142"},{"issue":"05","key":"30_CR6","first-page":"17","volume":"46","author":"P Yun","year":"2016","unstructured":"Yun, P.: Research on data confirmation in big data environment. Mod. Telecommun. Technol. 46(05), 17\u201320 (2016)","journal-title":"Mod. Telecommun. Technol."},{"unstructured":"Zhen-Hua, D.U.: Research on data confirmation right in big data application. Mob. Commun. (2015)","key":"30_CR7"},{"key":"30_CR8","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/B978-155860869-6\/50022-6","volume-title":"VLDB '02: Proceedings of the 28th International Conference on Very Large Databases","author":"Rakesh Agrawal","year":"2002","unstructured":"Agrawal, R., Kiernan, J.: Watermarking relational databases. In: International Conference on Very Large Databases, pp. 155\u2013166 (2002)"},{"doi-asserted-by":"crossref","unstructured":"Zhang, Y., Niu, X., Zhao, D., et al.: Relational databases watermark technique based on content characteristic. In: International Conference on Innovative Computing, Information and Control, pp. 677\u2013680. IEEE (2006)","key":"30_CR9","DOI":"10.1109\/ICICIC.2006.503"},{"issue":"9","key":"30_CR10","doi-asserted-by":"publisher","first-page":"1939","DOI":"10.1109\/TIFS.2015.2439962","volume":"10","author":"J Franco-Contreras","year":"2015","unstructured":"Franco-Contreras, J., Coatrieux, G.: Robust watermarking of relational databases with ontology-guided distortion control. IEEE Trans. Inf. Forensics Secur. 10(9), 1939\u20131952 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"1","key":"30_CR11","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/TDSC.2005.12","volume":"2","author":"Y Li","year":"2005","unstructured":"Li, Y., Swarup, V., Jajodia, S.: Fingerprinting relational databases: schemes and specialties. IEEE Trans. Dependable Secure Comput. 2(1), 34\u201345 (2005)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"doi-asserted-by":"crossref","unstructured":"Sion, R., Atallah, M., Prabhakar, S.: Rights protection for relational data. In: ACM SIGMOD International Conference on Management of Data, pp. 98\u2013109. IEEE (2003)","key":"30_CR12","DOI":"10.1145\/872757.872772"},{"doi-asserted-by":"crossref","unstructured":"Khanduja, V., Chakraverty, S., Verma, O.P., et al.: A robust multiple watermarking technique for information recovery. In: Advance Computing Conference, pp. 250\u2013255. IEEE (2014)","key":"30_CR13","DOI":"10.1109\/IAdCC.2014.6779329"},{"doi-asserted-by":"crossref","unstructured":"Guo, F., Wang, J., Li, D.: Fingerprinting relational databases. In: ACM Symposium on Applied Computing, pp. 487\u2013492. ACM (2006)","key":"30_CR14","DOI":"10.1145\/1141277.1141391"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_30","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:21:34Z","timestamp":1544174494000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_30"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_30","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}