{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T08:00:16Z","timestamp":1725868816384},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319480565"},{"type":"electronic","value":"9783319480572"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-48057-2_12","type":"book-chapter","created":{"date-parts":[[2016,10,22]],"date-time":"2016-10-22T04:37:01Z","timestamp":1477111021000},"page":"175-188","source":"Crossref","is-referenced-by-count":5,"title":["A Watermarking Framework for Outsourced and Distributed Relational Databases"],"prefix":"10.1007","author":[{"given":"Sapana","family":"Rani","sequence":"first","affiliation":[]},{"given":"Dileep Kumar","family":"Koshley","sequence":"additional","affiliation":[]},{"given":"Raju","family":"Halder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,23]]},"reference":[{"issue":"2","key":"12_CR1","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s00778-003-0097-x","volume":"12","author":"R Agrawal","year":"2003","unstructured":"Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking relational data: framework, algorithms and analysis. VLDB J. 12(2), 157\u2013169 (2003)","journal-title":"VLDB J."},{"key":"12_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, S., Narasayya, V., Yang, B.: Integrating vertical and horizontal partitioning into automated physical database design. In: Proceedings of the ACM SIGMOD international conference on Management of data, pp. 359\u2013370 (2004)","DOI":"10.1145\/1007568.1007609"},{"issue":"3","key":"12_CR3","first-page":"404","volume":"84","author":"AS Alfagi","year":"2016","unstructured":"Alfagi, A.S., Manaf, A.A., Hamida, B., Olanrewajub, R.: A zero-distortion fragile watermarking scheme to detect and localize malicious modifications in textual database relations. J. Theor. Appl. Inf. Technol. 84(3), 404 (2016)","journal-title":"J. Theor. Appl. Inf. Technol."},{"key":"12_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"252","DOI":"10.1007\/978-3-642-10772-6_19","volume-title":"Information Systems Security","author":"S Bhattacharya","year":"2009","unstructured":"Bhattacharya, S., Cortesi, A.: A generic distortion free watermarking technique for relational databases. In: Prakash, A., Sen Gupta, I. (eds.) ICISS 2009. LNCS, vol. 5905, pp. 252\u2013264. Springer, Heidelberg (2009)"},{"key":"12_CR5","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1155\/2014\/697165","volume":"2014","author":"L Camara","year":"2014","unstructured":"Camara, L., Li, J., Li, R., Xie, W.: Distortion-free watermarking approach for relational database integrity checking. Math. Probl. Eng. 2014, 10 (2014)","journal-title":"Math. Probl. Eng."},{"key":"12_CR6","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1007\/978-3-642-16626-6_19","volume-title":"Computational Intelligence in Security for Information Systems 2010","author":"HM El-Bakry","year":"2010","unstructured":"El-Bakry, H.M., Hamada, M.: A developed watermark technique for distributed database security. In: Herrero, \u00c1., Corchado, E., Redondo, C., Alonso, \u00c1. (eds.) Computational Intelligence in Security for Information Systems 2010. AISC, vol. 85, pp. 173\u2013180. Springer, Heidelberg (2010)"},{"issue":"1","key":"12_CR7","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1080\/02533839.2012.726041","volume":"36","author":"ME Farfoura","year":"2013","unstructured":"Farfoura, M.E., Horng, S.J., Wang, X.: A novel blind reversible method for watermarking relational databases. J. Chin. Inst. Eng. 36(1), 87\u201397 (2013)","journal-title":"J. Chin. Inst. Eng."},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/978-3-642-17714-9_16","volume-title":"Information Systems Security","author":"R Halder","year":"2010","unstructured":"Halder, R., Cortesi, A.: A persistent public watermarking of relational databases. In: Jha, S., Mathuria, A. (eds.) ICISS 2010. LNCS, vol. 6503, pp. 216\u2013230. Springer, Heidelberg (2010)"},{"issue":"21","key":"12_CR9","first-page":"3164","volume":"16","author":"R Halder","year":"2010","unstructured":"Halder, R., Pal, S., Cortesi, A.: Watermarking techniques for relational databases: survey, classification and comparison. J. Univ. Comput. Sci. 16(21), 3164\u20133190 (2010)","journal-title":"J. Univ. Comput. Sci."},{"key":"12_CR10","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511810275","volume-title":"Logic in Computer Science: Modelling and Reasoning About Systems","author":"M Huth","year":"2004","unstructured":"Huth, M., Ryan, M.: Logic in Computer Science: Modelling and Reasoning About Systems. Cambridge University Press, Cambridge (2004)"},{"key":"12_CR11","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1016\/j.entcs.2007.01.065","volume":"186","author":"S Iftene","year":"2007","unstructured":"Iftene, S.: General secret sharing based on the chinese remainder theorem with applications in e-voting. Electron. Notes Theor. Comput. Sci. 186, 67\u201384 (2007)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"issue":"15","key":"12_CR12","doi-asserted-by":"crossref","first-page":"2580","DOI":"10.1002\/sec.1196","volume":"8","author":"S Iftikhar","year":"2015","unstructured":"Iftikhar, S., Kamran, M., Anwar, Z.: A survey on reversible watermarking techniques for relational databases. Secur. Commun. Netw. 8(15), 2580\u20132603 (2015)","journal-title":"Secur. Commun. Netw."},{"issue":"12","key":"12_CR13","doi-asserted-by":"crossref","first-page":"2694","DOI":"10.1109\/TKDE.2012.227","volume":"25","author":"M Kamran","year":"2013","unstructured":"Kamran, M., Suhail, S., Farooq, M.: A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints. IEEE Trans. Knowl. Data Eng. 25(12), 2694\u20132707 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"12_CR14","first-page":"16","volume":"2013","author":"A Khan","year":"2013","unstructured":"Khan, A., Husain, S.A.: A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations. Sci. World J. 2013, 16 (2013)","journal-title":"Sci. World J."},{"key":"12_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"212","DOI":"10.1007\/978-3-319-09912-5_18","volume-title":"Active Media Technology","author":"V Khanduja","year":"2014","unstructured":"Khanduja, V., Chakraverty, S., Verma, O.P., Singh, N.: A scheme for robust biometric watermarking in web databases for ownership proof with identification. In: \u015al\u0229zak, D., Schaefer, G., Vuong, S.T., Kim, Y.-S. (eds.) AMT 2014. LNCS, vol. 8610, pp. 212\u2013225. Springer, Heidelberg (2014)"},{"key":"12_CR16","unstructured":"Forest Cover Type. https:\/\/kdd.ics.uci.edu\/databases\/covertype\/covertype.html"},{"key":"12_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1007\/3-540-39466-4_27","volume-title":"Cryptography","author":"M Mignotte","year":"1983","unstructured":"Mignotte, M.: How to share a secret? In: Beth, T. (ed.) EUROCRYPT 1982. LNCS, vol. 149, pp. 371\u2013375. Springer, Heidelberg (1983)"},{"key":"12_CR18","volume-title":"Principles of Distributed Database Systems","author":"MT \u00d6zsu","year":"2011","unstructured":"\u00d6zsu, M.T., Valduriez, P.: Principles of Distributed Database Systems. Springer, New York (2011)"},{"key":"12_CR19","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-81-322-2653-6_11","volume-title":"Advanced Computing and Systems for Security","author":"S Rani","year":"2016","unstructured":"Rani, S., Kachhap, P., Halder, R.: Data-flow analysis-based approach of database watermarking. In: Chaki, R., Cortesi, A., Saeed, K., Chaki, N. (eds.) Advanced Computing and Systems for Security. AISC, vol. 396, pp. 153\u2013171. Springer, Heidelberg (2016). doi: 10.1007\/978-81-322-2653-6_11"},{"key":"12_CR20","series-title":"Lecture Notes in Computer Science","first-page":"181","volume-title":"Data Engineering and Management","author":"BVS Rao","year":"2012","unstructured":"Rao, B.V.S., Prasad, M.V.N.K.: Subset selection approach for watermarking relational databases. In: Kannan, R., Andres, F. (eds.) ICDEM 2010. LNCS, vol. 6411, pp. 181\u2013188. Springer, Heidelberg (2012)"},{"key":"12_CR21","unstructured":"Razdan, R.: Real-time, distributed, transactional, hybrid watermarking method to provide trace-ability and copyright protection of digital content in peer-to-peer networks (Mar 7 2001), uS Patent App. 09\/799,509"},{"key":"12_CR22","doi-asserted-by":"crossref","unstructured":"Rodr\u00edguez, L., Li, X.: A dynamic vertical partitioning approach for distributed database system. In: 2011 IEEE International Conference on Systems, Man, and Cybernetics (SMC), pp. 1853\u20131858. IEEE (2011)","DOI":"10.1109\/ICSMC.2011.6083941"},{"issue":"11","key":"12_CR23","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Fragments and loose associations: respecting privacy in data publishing. Proc. VLDB Endowment 3(1\u20132), 1370\u20131381 (2010)","DOI":"10.14778\/1920841.1921009"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Zhou, X., Huang, M., Peng, Z.: An additive-attack-proof watermarking mechanism for databases\u2019 copyrights protection using image. In: SAC 2007: Proceedings of the 2007 ACM symposium on Applied computing, Seoul, Korea, pp. 254\u2013258 (2007)","DOI":"10.1145\/1244002.1244066"}],"container-title":["Lecture Notes in Computer Science","Future Data and Security Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-48057-2_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T01:51:37Z","timestamp":1498355497000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-48057-2_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319480565","9783319480572"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-48057-2_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}