{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,4]],"date-time":"2025-09-04T14:11:30Z","timestamp":1756995090597,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030113889"},{"type":"electronic","value":"9783030113896"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-11389-6_12","type":"book-chapter","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T16:51:03Z","timestamp":1548348663000},"page":"151-166","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Dynamic Watermarking-Based Integrity Protection of Homomorphically Encrypted Databases \u2013 Application to Outsourced Genetic Data"],"prefix":"10.1007","author":[{"given":"David","family":"Niyitegeka","sequence":"first","affiliation":[]},{"given":"Gouenou","family":"Coatrieux","sequence":"additional","affiliation":[]},{"given":"Reda","family":"Bellafqira","sequence":"additional","affiliation":[]},{"given":"Emmanuelle","family":"Genin","sequence":"additional","affiliation":[]},{"given":"Javier","family":"Franco-Contreras","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,24]]},"reference":[{"key":"12_CR1","doi-asserted-by":"crossref","unstructured":"Bellafqira, R., Coatrieux, G., Bouslimi, D., Quellec, G.: Content-based image retrieval in homomorphic encryption domain. In: 37th Annual International Conference of the IEEE Engineering in Medicine and Biology Society, pp. 2944\u20132947 (2015)","DOI":"10.1109\/EMBC.2015.7319009"},{"issue":"2","key":"12_CR2","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1149976.1149977","volume":"2","author":"E Mykletun","year":"2006","unstructured":"Mykletun, E., Narasimha, M., Tsudik, G.: Authentication and integrity in outsourced databases. ACM Trans. Storage 2(2), 107\u2013138 (2006)","journal-title":"ACM Trans. Storage"},{"key":"12_CR3","unstructured":"Almulla, S.A., Yeun, C.Y.: Cloud computing security management. In: 2nd International Conference on Engineering Systems Management and Its Applications, pp. 1\u20137 (2010)"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/B978-155860869-6\/50022-6","volume-title":"VLDB '02: Proceedings of the 28th International Conference on Very Large Databases","author":"Rakesh Agrawal","year":"2002","unstructured":"Agrawal, R., Kiernan, J.: Watermarking relational databases. In: Proceedings of the 28th International Conference on Very Large Data Bases (VLDB 2002), pp. 155\u2013166 (2002)"},{"issue":"3","key":"12_CR5","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/TIFS.2013.2294240","volume":"9","author":"J Franco-Contreras","year":"2014","unstructured":"Franco-Contreras, J., Coatrieux, G., Cuppens, F., Cuppens-Boulahia, N., Roux, C.: Robust lossless watermarking of relational databases based on circular histogram modulation. IEEE Trans. Inf. Forensics Secur. 9(3), 397\u2013410 (2014)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"12_CR6","doi-asserted-by":"crossref","unstructured":"Wang, C., Wang, J., Zhou, M., Chen, G., Li, D.: ATBaM: an Arnold transform based method on watermarking relational data. In: International Conference on Multimedia and Ubiquitous Engineering, pp. 263\u2013270. IEEE (2008)","DOI":"10.1109\/MUE.2008.45"},{"key":"12_CR7","doi-asserted-by":"crossref","unstructured":"Kamel, I., Kamel, K.: Toward protecting the integrity of relational databases. In: World Congress on Internet Security, pp. 258\u2013261. IEEE (2011)","DOI":"10.1109\/WorldCIS17046.2011.5749863"},{"issue":"3","key":"12_CR8","first-page":"115","volume":"1","author":"V Prasannakumari","year":"2009","unstructured":"Prasannakumari, V.: A robust tamperproof watermarking for data integrity in relational databases. Res. J. Inf. Technol. 1(3), 115\u2013121 (2009)","journal-title":"Res. J. Inf. Technol."},{"key":"12_CR9","doi-asserted-by":"publisher","first-page":"1350","DOI":"10.1016\/j.ins.2005.06.003","volume":"176","author":"H Guo","year":"2006","unstructured":"Guo, H., Li, Y., Liu, A., Jajodia, S.: A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci. 176, 1350\u20131378 (2006)","journal-title":"Inf. Sci."},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Chang, J.N, Wu, H.C.: Reversible fragile database watermarking technology using difference expansion based on SVR prediction. In: International Symposium on Computer, Consumer and Control, pp. 690\u2013693 (2012)","DOI":"10.1109\/IS3C.2012.179"},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"Coatrieux, G, Chazard, E., Beuscart, R., Roux, C.: Lossless watermarking of categorical attributes for verifying medical data base integrity. In: 33rd IEEE Annual International Conference of the Engineering in Medicine and Biology Society, pp. 8195\u20138198 (2011)","DOI":"10.1109\/IEMBS.2011.6092021"},{"key":"12_CR12","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/83.913598","volume":"10","author":"N Memon","year":"2001","unstructured":"Memon, N., Wong, P.: A buyer\u2013seller watermarking protocol. IEEE Trans. Image Process. Image 10, 643\u2013649 (2001)","journal-title":"IEEE Trans. Image Process. Image"},{"key":"12_CR13","doi-asserted-by":"crossref","unstructured":"Bouslimi, D., Coatrieux, G., Roux, C.: A joint watermarking\/encryption algorithm for verifying medical image integrity and authenticity in both encrypted and spatial domains. In: IEEE Annual International Conference of the Engineering in Medicine and Biology Society, pp. 8066\u20138069 (2011)","DOI":"10.1109\/IEMBS.2011.6091989"},{"key":"12_CR14","doi-asserted-by":"crossref","unstructured":"Bouslimi, D., Bellafqira, R., Coatrieux, G.: Data hiding in homomorphically encrypted medical images for verifying their reliability in both encrypted and spatial domains. In: Engineering in Medicine and Biology Society. pp. 2496\u20132499. IEEE (2016)","DOI":"10.1109\/EMBC.2016.7591237"},{"issue":"1","key":"12_CR15","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1049\/iet-ifs.2017.0092","volume":"12","author":"S Xiang","year":"2017","unstructured":"Xiang, S., He, J.: Database authentication watermarking scheme in encrypted domain. IET Inf. Secur. 12(1), 42\u201351 (2017)","journal-title":"IET Inf. Secur."},{"key":"12_CR16","doi-asserted-by":"publisher","first-page":"1423","DOI":"10.1109\/18.923725","volume":"47","author":"B Chen","year":"2001","unstructured":"Chen, B., Wornell, G.W.: Quantization index modulation: a class of provably good methods for digital watermarking and information embedding. IEEE Trans. Inf. Theory 47, 1423\u20131443 (2001)","journal-title":"IEEE Trans. Inf. Theory"},{"key":"12_CR17","unstructured":"Xiao, L., Yen, I.L.: Security analysis for order preserving encryption schemes. In: 46th Annual Conference on Information Sciences and Systems (CISS), pp. 1\u20136 (2012)"},{"key":"12_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/3-540-48910-X_16","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201999","author":"P Paillier","year":"1999","unstructured":"Paillier, P.: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes. In: Stern, Jacques (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_16"},{"key":"12_CR19","unstructured":"Bakhtiari, S., Safavi-Naini, R., Pieprzyk, J.: Cryptographic hash functions: a survey, Technical report 95\u201309, Department of Computer Science, University of Wollongong (1995)"},{"issue":"2","key":"12_CR20","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1016\/j.jare.2015.07.002","volume":"7","author":"AG Radwan","year":"2016","unstructured":"Radwan, A.G., AbdElHaleem, S.H., AbdElHafiz, S.K.: Symmetric encryption algorithms using chaotic and non-chaotic generators: a review. J. Adv. Res. 7(2), 193\u2013208 (2016)","journal-title":"J. Adv. Res."}],"container-title":["Lecture Notes in Computer Science","Digital Forensics and Watermarking"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-11389-6_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T14:53:55Z","timestamp":1709823235000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-11389-6_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030113889","9783030113896"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-11389-6_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"24 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IWDW","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Digital Watermarking","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwdw2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iwdw2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}