{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,11]],"date-time":"2026-02-11T16:19:29Z","timestamp":1770826769565,"version":"3.50.1"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031578076","type":"print"},{"value":"9783031578083","type":"electronic"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-57808-3_32","type":"book-chapter","created":{"date-parts":[[2024,4,5]],"date-time":"2024-04-05T15:02:05Z","timestamp":1712329325000},"page":"438-452","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["FRBBM-Scheme: A Flexible Ratio Virtual Primary Key Generation Approach Based on\u00a0Binary Matching"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5392-0754","authenticated-orcid":false,"given":"Tiancai","family":"Liang","sequence":"first","affiliation":[]},{"given":"Yun","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Haolin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ziwen","family":"Cai","sequence":"additional","affiliation":[]},{"given":"Zhaoguo","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-4451-8671","authenticated-orcid":false,"given":"Wenchao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Chuanyi","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,4,6]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Sardroudi, H.M., Ibrahim, S.: A new approach for relational database watermarking using image. In: 5th International Conference on Computer Sciences and Convergence Information Technology, pp. 606\u2013610. IEEE (2010)","DOI":"10.1109\/ICCIT.2010.5711126"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Wang, W., Liu, C., Wang, Z., Liang, T.: FBIPT: a new robust reversible database watermarking technique based on position tuples. In: 2022 4th International Conference on Data Intelligence and Security (ICDIS), pp. 67\u201374. IEEE (2022)","DOI":"10.1109\/ICDIS55630.2022.00018"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Gort, M.L., P\u00e9rez, O., Martina, C., Agostino, U., Claudia, F.: Semantic-driven watermarking of relational textual databases. Expert Syst. Appl. 167, 114013 (2021)","DOI":"10.1016\/j.eswa.2020.114013"},{"key":"32_CR4","doi-asserted-by":"crossref","unstructured":"Li, W., Li, N., Yan, J., Zhang, Z., Yu, P., Long, G.: Secure and high-quality watermarking algorithms for relational database based on semantic. IEEE Trans. Knowl. Data Eng. (2022)","DOI":"10.1109\/TKDE.2022.3194191"},{"issue":"2","key":"32_CR5","first-page":"107","volume":"9","author":"SB Siledar","year":"2021","unstructured":"Siledar, S.B., Tamane, S.: Quadratic difference expansion based reversible watermarking for relational database. J. Integr. Sci. Technol. 9(2), 107\u2013112 (2021)","journal-title":"J. Integr. Sci. Technol."},{"key":"32_CR6","doi-asserted-by":"publisher","first-page":"1552","DOI":"10.1007\/s11036-019-01491-5","volume":"26","author":"R Hou","year":"2021","unstructured":"Hou, R., Xian, H.: A graded reversible watermarking scheme for relational data. Mob. Netw. Appl. 26, 1552\u20131563 (2021)","journal-title":"Mob. Netw. Appl."},{"key":"32_CR7","unstructured":"Zhang, Y., Yang, B.. Niu, X.-M.: Reversible watermarking for relational database authentication (2008)"},{"issue":"6","key":"32_CR8","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.1109\/TKDE.2018.2851517","volume":"31","author":"D Hu","year":"2018","unstructured":"Hu, D., Zhao, D., Zheng, S.: A new robust approach for reversible database watermarking with distortion control. IEEE Trans. Knowl. Data Eng. 31(6), 1024\u20131037 (2018)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. In: Proceedings of the 4th ACM Workshop on Digital Rights Management, pp. 73\u201382 (2004)","DOI":"10.1145\/1029146.1029159"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Bhattacharya, S., Cortesi, A.: A distortion free watermark framework for relational databases. In: ICSOFT (2), pp. 229\u2013234 (2009)","DOI":"10.5220\/0002256402290234"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Li, M., Zhao, W., Guo, J.: An asymmetric watermarking scheme for relational database. In: 2011 IEEE 3rd International Conference on Communication Software and Networks, pp. 180\u2013184. IEEE (2011)","DOI":"10.1109\/ICCSN.2011.6014246"},{"key":"32_CR12","doi-asserted-by":"crossref","unstructured":"Li, Y., Deng, R.H.: Publicly verifiable ownership protection for relational databases. In: Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, pp. 78\u201389 (2006)","DOI":"10.1145\/1128817.1128832"},{"key":"32_CR13","doi-asserted-by":"crossref","unstructured":"Bhattacharya, S., Cortesi, A.: A generic distortion free watermarking technique for relational databases. In: ICISS, pp. 252\u2013264 (2009)","DOI":"10.1007\/978-3-642-10772-6_19"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Halder, R., Cortesi, A.: Persistent watermarking of relational databases. In: Proceedings of IEEE International Conference on Advances in Communication, Network, and Computing (CNC), pp. 4\u20135 (2010)","DOI":"10.1007\/978-3-642-17714-9_16"},{"key":"32_CR15","doi-asserted-by":"crossref","unstructured":"Hamadou, A., Sun, X., Gao, L., Shah, S.A.: A fragile zero-watermarking technique for authentication of relational databases. Int. J. Digit. Content Technol. Appl. 5(5) (2011)","DOI":"10.4156\/jdcta.vol5.issue5.21"},{"key":"32_CR16","doi-asserted-by":"crossref","unstructured":"Camara, L., Li, J., Li, R., Xie, W.: Distortion-free watermarking approach for relational database integrity checking. Math. Probl. Eng. 2014 (2014)","DOI":"10.1155\/2014\/697165"},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J.: Watermarking relational databases. In: VLDB\u201902: Proceedings of the 28th International Conference on Very Large Databases, pp. 155\u2013166 (2002)","DOI":"10.1016\/B978-155860869-6\/50022-6"},{"key":"32_CR18","doi-asserted-by":"crossref","unstructured":"Li, Y., Swarup, V., Jajodia, S.: Constructing a virtual primary key for fingerprinting relational data. In: Proceedings of the 3rd ACM Workshop on Digital Rights Management, pp. 133\u2013141 (2003)","DOI":"10.1145\/947380.947398"},{"key":"32_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-10772-6_17","volume-title":"Information Systems Security","author":"G Gupta","year":"2009","unstructured":"Gupta, G., Pieprzyk, J.: Database relation watermarking resilient against secondary watermarking attacks. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 222\u2013236. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-10772-6_17"},{"key":"32_CR20","doi-asserted-by":"crossref","unstructured":"Xiao, X., Sun, X., Chen, M.: Second-LSB-dependent robust watermarking for relational database. In: Third International Symposium on Information Assurance and Security, pp. 292\u2013300. IEEE (2007)","DOI":"10.1109\/ISIAS.2007.4299789"},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"Halder, R., Dasgupta, P., Naskar, S., Sarma, S.S.: An internet-based IP protection scheme for circuit designs using linear feedback shift register (LFSR)-based locking. In: Proceedings of the 22nd Annual Symposium on Integrated Circuits and System Design: Chip on the Dunes, pp. 1\u20136 (2009)","DOI":"10.1145\/1601896.1601915"},{"key":"32_CR22","doi-asserted-by":"crossref","unstructured":"Gort, M.L.P., D\u00edaz, E.A., Uribe, C.F.: A highly-reliable virtual primary key scheme for relational database watermarking techniques. In: 2017 International Conference on Computational Science and Computational Intelligence (CSCI), pp. 55\u201360 (2017)","DOI":"10.1109\/CSCI.2017.10"},{"key":"32_CR23","doi-asserted-by":"crossref","unstructured":"Gort, M.L.P., Feregrino-Uribe, C., Cortesi, A., Fern\u00e1ndez-Pe\u00f1a, F.: HQR-scheme: a high quality and resilient virtual primary key generation approach for watermarking relational data. Expert Syst. Appl. 138, 112770 (2019)","DOI":"10.1016\/j.eswa.2019.06.058"},{"key":"32_CR24","doi-asserted-by":"crossref","unstructured":"Cox, I.J., Do\u00ebrr, G., Furon, T.: Watermarking is not cryptography. In: International Workshop on Digital Watermarking, pp. 1\u201315 (2006)","DOI":"10.1007\/11922841_1"},{"issue":"21","key":"32_CR25","first-page":"3164","volume":"16","author":"R Halder","year":"2010","unstructured":"Halder, R., Pal, S., Cortesi, A.: Watermarking techniques for relational databases: survey, classification and comparison. J. Univ. Comput. Sci. 16(21), 3164\u20133190 (2010)","journal-title":"J. Univ. Comput. Sci."},{"issue":"4","key":"32_CR26","doi-asserted-by":"publisher","first-page":"1132","DOI":"10.1109\/TKDE.2014.2349911","volume":"27","author":"S Iftikhar","year":"2014","unstructured":"Iftikhar, S., Kamran, M., Anwar, Z.: RRW\u2013a robust and reversible watermarking technique for relational data. IEEE Trans. Knowl. Data Eng. 27(4), 1132\u20131145 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"15","key":"32_CR27","doi-asserted-by":"publisher","first-page":"2580","DOI":"10.1002\/sec.1196","volume":"8","author":"S Iftikhar","year":"2015","unstructured":"Iftikhar, S., Kamran, M., Anwar, Z.: A survey on reversible watermarking techniques for relational databases. Secur. Commun. Netw. 8(15), 2580\u20132603 (2015)","journal-title":"Secur. Commun. Netw."},{"issue":"7","key":"32_CR28","doi-asserted-by":"publisher","first-page":"8603","DOI":"10.1007\/s11042-018-7128-5","volume":"78","author":"N Agarwal","year":"2019","unstructured":"Agarwal, N., Singh, A.K., Singh, P.K.: Survey of robust and imperceptible watermarking. Multimedia Tools Appl. 78(7), 8603\u20138633 (2019)","journal-title":"Multimedia Tools Appl."},{"key":"32_CR29","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-0506-0","volume-title":"Watermarking Security: Fundamentals, Secure Designs and Attacks","author":"P Bas","year":"2016","unstructured":"Bas, P., Furon, T., Cayre, F., Do\u00ebrr, G., Mathon, B.: Watermarking Security: Fundamentals, Secure Designs and Attacks. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-981-10-0506-0"},{"key":"32_CR30","doi-asserted-by":"crossref","unstructured":"Rani, S., Koshley, D.K., Halder, R.: A watermarking framework for outsourced and distributed relational databases. In: International Conference on Future Data and Security Engineering, pp. 175\u2013188 (2016)","DOI":"10.1007\/978-3-319-48057-2_12"},{"key":"32_CR31","unstructured":"Khanna, S., Zane, F.: Watermarking maps: hiding information in structured data. In: Proceedings of the Eleventh Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 596\u2013605 (2000)"},{"key":"32_CR32","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Haas, P.J, Kiernan, J.: A system for watermarking relational databases. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, p. 674 (2003)","DOI":"10.1145\/872757.872865"},{"key":"32_CR33","doi-asserted-by":"crossref","unstructured":"Qin, Z., Ying, Y., LE, J., Lup, Y.: Watermark based copyright protection of outsourced database. In: 2006 10th International Database Engineering and Applications Symposium (IDEAS\u201906), pp. 301\u2013308 (2006)","DOI":"10.1109\/IDEAS.2006.53"},{"key":"32_CR34","first-page":"66","volume":"46","author":"Y Xiang","year":"2009","unstructured":"Xiang, Y., Li, J.Y., Pan, J.F.: Database watermarking algorithm based on virtual primary key. J. Comput. Res. Dev. 46, 66\u201370 (2009)","journal-title":"J. Comput. Res. Dev."}],"container-title":["IFIP Advances in Information and Communication Technology","Intelligent Information Processing XII"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-57808-3_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,15]],"date-time":"2024-11-15T19:55:55Z","timestamp":1731700555000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-57808-3_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031578076","9783031578083"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-57808-3_32","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"6 April 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IIP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Information Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzhen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 May 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 May 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iip2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/mi.hitsz.edu.cn\/iip2024.htm","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair online submission","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"58","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"49","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"84% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7 Abstracts include 4 Keynotes speakers and 3 Invited Speakers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}