{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T22:13:26Z","timestamp":1725574406930},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540210610"},{"type":"electronic","value":"9783540246244"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24624-4_11","type":"book-chapter","created":{"date-parts":[[2011,1,6]],"date-time":"2011-01-06T23:00:52Z","timestamp":1294354852000},"page":"141-153","source":"Crossref","is-referenced-by-count":12,"title":["Resilient Information Hiding for Abstract Semi-structures"],"prefix":"10.1007","author":[{"given":"Radu","family":"Sion","sequence":"first","affiliation":[]},{"given":"Mikhail","family":"Atallah","sequence":"additional","affiliation":[]},{"given":"Sunil","family":"Prabhakar","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1007\/3-540-36415-3_13","volume-title":"Information Hiding","author":"M.J. Atallah","year":"2003","unstructured":"Atallah, M.J., Raskin, V., Hempelmann, C.F., Karahan, M., Sion, R., Triezenberg, K.E., Topkara, U.: Natural language watermarking and tamperproofing. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol.\u00a02578, pp. 196\u2013212. Springer, Heidelberg (2003)"},{"key":"11_CR2","doi-asserted-by":"crossref","unstructured":"Babai, L., Kucera, L.: Canonical labeling of graphs in linear average time. In: Proc. 20th IEEE Symposium on Foundations of Computer Science, pp. 39\u201346 (1979)","DOI":"10.1109\/SFCS.1979.8"},{"key":"11_CR3","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1145\/800061.808746","volume-title":"Fifteenth Annual ACM Symposium on Theory of Computing","author":"L. Babai","year":"1983","unstructured":"Babai, L., Luks, E.: Canonical labeling of graphs. In: Fifteenth Annual ACM Symposium on Theory of Computing, pp. 171\u2013183. ACM, New York (1983)"},{"key":"11_CR4","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C.: Software watermarking: Models and dynamic embeddings. In: Principles of Programming Languages, San Antonio, TX (January 1999)","DOI":"10.1145\/292540.292569"},{"key":"11_CR5","volume-title":"Digital Watermarking","author":"I. Cox","year":"2001","unstructured":"Cox, I., Bloom, J., Miller, M.: Digital watermarking. In: Digital Watermarking, Morgan Kaufmann, San Francisco (2001)"},{"key":"11_CR6","unstructured":"Katzenbeisser, S., Petitcolas, F. (eds.) Information hiding techniques for steganography and digital watermarking, Artech House, Norwood (2001)"},{"key":"11_CR7","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1021\/ci9702914","volume":"38","author":"J. Faulon","year":"1998","unstructured":"Faulon, J.: Automorphism partitioning and canonical labeling can be solved in polynomial time for molecular graphs. J. Chem. Inf. Comput. Sci.\u00a038, 432\u2013444 (1998)","journal-title":"J. Chem. Inf. Comput. Sci."},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Juels, A., Wattenberg, M.: A fuzzy commitment scheme. In: ACM Conference on Computer and Communications Security, pp. 28\u201336 (1999)","DOI":"10.1145\/319709.319714"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Kucera, L.: Canonical labeling of regular graphs in linear average time. In: IEEE Symposium on Foundations of Computer Science, pp. 271\u2013279 (1987)","DOI":"10.1109\/SFCS.1987.11"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Palsberg, J., Krishnaswamy, S., Kwon, M., Ma, D., Shao, Q., Zhang, Y.: Experience with software watermarking. In: Proceedings of ACSAC, 16th Annual Computer Security Applications Conference, pp. 308\u2013316 (2000)","DOI":"10.1109\/ACSAC.2000.898885"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Sion, R.: Proving ownership over categorical data. In: Proceedings of the IEEE International Conference on Data Engineering ICDE 2004 (2004)","DOI":"10.1109\/ICDE.2004.1320029"},{"key":"11_CR12","volume-title":"Proceedings of IEEE ITCC 2002, CERIAS TR 2001- 55","author":"R. Sion","year":"2002","unstructured":"Sion, R., Atallah, M., Prabhakar, S.: Power: Metrics for evaluating watermarking algorithms. In: Proceedings of IEEE ITCC 2002, CERIAS TR 2001- 55, IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Sion, R., Atallah, M., Prabhakar, S.: Rights protection for relational data. In: CERIAS-TR 2002-28, Proceedings of ACM SIGMOD (2003)","DOI":"10.1145\/872757.872772"}],"container-title":["Lecture Notes in Computer Science","Digital Watermarking"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24624-4_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T13:05:31Z","timestamp":1559912731000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24624-4_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540210610","9783540246244"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24624-4_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}