{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:35:32Z","timestamp":1760708132178,"version":"3.37.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642107719"},{"type":"electronic","value":"9783642107726"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-10772-6_19","type":"book-chapter","created":{"date-parts":[[2009,11,13]],"date-time":"2009-11-13T07:37:49Z","timestamp":1258097869000},"page":"252-264","source":"Crossref","is-referenced-by-count":21,"title":["A Generic Distortion Free Watermarking Technique for Relational Databases"],"prefix":"10.1007","author":[{"given":"Sukriti","family":"Bhattacharya","sequence":"first","affiliation":[]},{"given":"Agostino","family":"Cortesi","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Kiernan, J.: Watermarking relational databases. In: 28th Int. Conference on Very Large Databases, Hong Kong, pp. 155\u2013166 (2002)","DOI":"10.1016\/B978-155860869-6\/50022-6"},{"issue":"12","key":"19_CR2","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.3844\/jcssp.2008.1024.1029","volume":"4","author":"A. Al-Haj","year":"2008","unstructured":"Al-Haj, A., Odeh, A.: Robust and blind watermarking of relational database systems. Journal of Computer Science\u00a04(12), 1024\u20131029 (2008)","journal-title":"Journal of Computer Science"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Bhattacharya, S., Cortesi, A.: A distortion free watermarking framework for relational databases. In: Proc. 4th International Conference on Software and Data technology, ICSOFT 2009, Sofia, Bulgaria, pp. 229\u2013234 (2009)","DOI":"10.5220\/0002256402290234"},{"key":"19_CR4","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1109\/TSE.2002.1027797","volume":"28","author":"C. Collberg","year":"2000","unstructured":"Collberg, C., Thomborson, C.: Watermarking, tamper-proofing, and obfuscation - tools for software protection. IEEE Trans. Software Eng.\u00a028, 735\u2013746 (2000)","journal-title":"IEEE Trans. Software Eng."},{"key":"19_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"138","DOI":"10.1007\/3-540-44577-3_10","volume-title":"Informatics \u2013 10 years back, 10 years ahead","author":"P. Cousot","year":"2001","unstructured":"Cousot, P.: Abstract interpretation based formal methods and future challenges. In: Wilhelm, R. (ed.) Informatics: 10 Years Back, 10 Years Ahead. LNCS, vol.\u00a02000, pp. 138\u2013156. Springer, Heidelberg (2001)"},{"key":"19_CR6","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1145\/512950.512973","volume-title":"POPL 1977: Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages","author":"P. Cousot","year":"1977","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In: POPL 1977: Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages, pp. 238\u2013252. ACM Press, New York (1977)"},{"key":"19_CR7","doi-asserted-by":"publisher","first-page":"511","DOI":"10.1093\/logcom\/2.4.511","volume":"2","author":"P. Cousot","year":"1992","unstructured":"Cousot, P., Cousot, R.: Abstract interpretation frameworks. Journal of Logic and Computation\u00a02, 511\u2013547 (1992)","journal-title":"Journal of Logic and Computation"},{"key":"19_CR8","volume-title":"Digital Watermarking: Principles and Practice","author":"I. Cox","year":"2001","unstructured":"Cox, I.: Digital Watermarking: Principles and Practice. Morgan Kaufman Publ. Inc., San Francisco (2001)"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Gross-Amblard, D.: Query-preserving watermarking of relational databases and xml documents. In: Proc. of the Twenty-Second ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, San Diego, CA, USA, June 9-12, pp. 191\u2013201 (2003)","DOI":"10.1145\/773153.773172"},{"key":"19_CR10","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4302-0348-3","volume-title":"Applied Mathematics for Database Professionals","author":"L. Haan de","year":"2007","unstructured":"de Haan, L., Koppelaars, T.: Applied Mathematics for Database Professionals. Apress, Berkely (2007)"},{"key":"19_CR11","volume-title":"Attacks and countermeasures","author":"Z.J. Sushil","year":"2000","unstructured":"Sushil, Z.J., Duric, J.N.F.: Information hiding: steganography and watermarking. In: Attacks and countermeasures. Kluwer Academic Publishers, Dordrecht (2000)"},{"key":"19_CR12","unstructured":"Mineta, N.Y., Shavers, C.L., Kammer, R.G., Mehuron, W.: The keyed-hash message authentication code (HMAC). Federal Information Process Standards Publication (2002)"},{"key":"19_CR13","volume-title":"Applied Cryptography","author":"B. Schneier","year":"1996","unstructured":"Schneier, B.: Applied Cryptography. John Wiley & Sons, Chichester (1996)"},{"key":"19_CR14","first-page":"584","volume-title":"Proving ownership over categorical data","author":"R. Sion","year":"2004","unstructured":"Sion, R.: Proving ownership over categorical data, vol.\u00a00, p. 584. IEEE Computer Society, Los Alamitos (2004)"},{"key":"19_CR15","first-page":"1509","volume-title":"Rights protection for relational data","author":"R. Sion","year":"2004","unstructured":"Sion, R., Atallah, M., Prabhakar, S.: Rights protection for relational data, vol.\u00a016, pp. 1509\u20131525. IEEE Computer Society, Los Alamitos (2004)"}],"container-title":["Lecture Notes in Computer Science","Information Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-10772-6_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,13]],"date-time":"2025-02-13T06:15:55Z","timestamp":1739427355000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-10772-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642107719","9783642107726"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-10772-6_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}