{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:04:42Z","timestamp":1771704282514,"version":"3.50.1"},"publisher-location":"New Delhi","reference-count":28,"publisher":"Springer India","isbn-type":[{"value":"9788132226512","type":"print"},{"value":"9788132226536","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,11,19]],"date-time":"2015-11-19T00:00:00Z","timestamp":1447891200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-81-322-2653-6_11","type":"book-chapter","created":{"date-parts":[[2015,11,18]],"date-time":"2015-11-18T15:47:51Z","timestamp":1447861671000},"page":"153-171","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Data-Flow Analysis-Based Approach of Database Watermarking"],"prefix":"10.1007","author":[{"given":"Sapana","family":"Rani","sequence":"first","affiliation":[]},{"given":"Preeti","family":"Kachhap","sequence":"additional","affiliation":[]},{"given":"Raju","family":"Halder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,19]]},"reference":[{"issue":"2","key":"11_CR1","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s00778-003-0097-x","volume":"12","author":"R Agrawal","year":"2003","unstructured":"Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking relational data: framework, algorithms and analysis. VLDB J. 12(2), 157\u2013169 (2003)","journal-title":"VLDB J."},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.3844\/jcssp.2008.1024.1029","volume":"4","author":"A Al-Haj","year":"2008","unstructured":"Al-Haj, A., Odeh, A.: Robust and blind watermarking of relational database systems. J. Comput. Sci. 4, 1024\u20131029 (2008)","journal-title":"J. Comput. Sci."},{"key":"11_CR3","unstructured":"Arboit, G.: A method for watermarking java programs via opaque predicates. In: Proceedings of the 5th International Conference on Electronic Commerce Research (ICECR-5). pp. 184\u2013196. ACM Press, San Diego (2002)"},{"key":"11_CR4","unstructured":"Bhattacharya, S., Cortesi, A.: A distortion free watermark framework for relational databases. In: Proceedings of the 4th International Conference on Software and Data Technologies, Sofia (2009)"},{"key":"11_CR5","doi-asserted-by":"crossref","unstructured":"Bhattacharya, S., Cortesi, A.: A generic distortion free watermarking technique for relational databases. In: Proceedings of the Fifth International Conference on Information Systems Security (ICISS 2009). LNCS Springer Verlag, Kolkata (2009)","DOI":"10.1007\/978-3-642-10772-6_19"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Bhattacharya, S., Cortesi, A.: Distortion-free authentication watermarking. In: Cordeiro, J., Virvou, M., Shishkov, B. (eds.) Software and Data Technologies, pp. 205\u2013219. Springer CCIS, Volume 170 (2013)","DOI":"10.1007\/978-3-642-29578-2_13"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Camara, L., Li, J., Li, R., Xie, W.: Distortion-free watermarking approach for relational database integrity checking. Mathematical Problems in Engineering (2014)","DOI":"10.1155\/2014\/697165"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Collberg, C., Thomborson, C., Low, D.: Manufacturing cheap, resilient, and stealthy opaque constructs. In: Proceedings of the 25th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL\u201998). pp. 184\u2013196. ACM Press, San Diego (1998)","DOI":"10.1145\/268946.268962"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Dalla Preda, M., Madou, M., De Bosschere, K., Giacobazzi, R.: Opaque predicates detection by abstract interpretation. In: Johnson, M., Vene, V. (eds.) Algebraic Methodology and Software Technology, pp. 8\u201395. Springer LNCS 4019 (2006)","DOI":"10.1007\/11784180_9"},{"key":"11_CR10","doi-asserted-by":"publisher","first-page":"1350","DOI":"10.1016\/j.ins.2005.06.003","volume":"176","author":"H Guo","year":"2006","unstructured":"Guo, H., Li, Y., Liua, A., Jajodia, S.: A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci. 176, 1350\u20131378 (2006)","journal-title":"Inf. Sci."},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Gupta, G., Pieprzyk, J.: Database relation watermarking resilient against secondary watermarking attacks. In: Proceedings of the Fifth International Conference on Information Systems Security (ICISS 2009). pp. 222\u2013236. LNCS Springer Verlag, Kolkata (2009)","DOI":"10.1007\/978-3-642-10772-6_17"},{"key":"11_CR12","doi-asserted-by":"crossref","unstructured":"Halder, R., Cortesi, A.: Persistent watermarking of relational databases. In: Proceedings of the IEEE International Conference on Advances in Communication, Network, and Computing (CNC\u201910). IEEE CS, India (2010)","DOI":"10.1007\/978-3-642-17714-9_16"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Halder, R., Cortesi, A.: A persistent public watermarking of relational databases. In: Proceedings of the 6th International Conference on Information Systems Security (ICISS\u201910). pp. 216\u2013230. Springer LNCS 6503, India (2010)","DOI":"10.1007\/978-3-642-17714-9_16"},{"key":"11_CR14","first-page":"123","volume":"38","author":"R Halder","year":"2012","unstructured":"Halder, R., Cortesi, A.: Abstract interpretation of database query languages. Comput. Lang. Syst. Struct. 38, 123\u2013157 (2012)","journal-title":"Comput. Lang. Syst. Struct."},{"issue":"21","key":"11_CR15","first-page":"3164","volume":"16","author":"R Halder","year":"2010","unstructured":"Halder, R., Pal, S., Cortesi, A.: Watermarking techniques for relational databases: survey, classification and comparison. J. Univ. Comput. Sci. 16(21), 3164\u20133190 (2010)","journal-title":"J. Univ. Comput. Sci."},{"key":"11_CR16","doi-asserted-by":"crossref","unstructured":"Hamilton, J., Danicic, S.: A survey of static software watermarking. In: 2011 World Congress on Internet Security (WorldCIS\u201911). pp. 100\u2013107. IEEE (2011)","DOI":"10.1109\/WorldCIS17046.2011.5749891"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Khan, A., Husain, S.A.: A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations. Sci. World J. (2013)","DOI":"10.1155\/2013\/796726"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Khanduja, V., Chakraverty, S., Verma, O.P., Singh, N.: A scheme for robust biometric watermarking in web databases for ownership proof with identification. In: Active Media Technology, pp. 212\u2013225. Springer (2014)","DOI":"10.1007\/978-3-319-09912-5_18"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Khanduja, V., Verma, O.P., Chakraverty, S.: Watermarking relational databases using bacterial foraging algorithm. Multimed. Tools Appl. pp. 1\u201327 (2013)","DOI":"10.1007\/s11042-013-1700-9"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Li, Y., Deng, R.H.: Publicly verifiable ownership protection for relational databases. In: Proceedings of the 2006 ACM Symposium on Information, computer and communications security (ASIACCS\u201906). pp. 78\u201389. ACM, Taipei (2006)","DOI":"10.1145\/1128817.1128832"},{"key":"11_CR21","doi-asserted-by":"crossref","unstructured":"Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. In: Proceedings of the 4th ACM workshop on Digital rights management (DRM\u201904). pp. 73\u201382. ACM Press, Washington DC (2004)","DOI":"10.1145\/1029146.1029159"},{"key":"11_CR22","doi-asserted-by":"crossref","unstructured":"Monden, A., Iida, H., Matsumoto, K.i., Inoue, K., Torii, K.: A practical method for watermarking java programs. In: Proceedings of the 24th Annual International Computer Software and Applications Conference, (COMPSAC 2000). pp. 191\u2013197. IEEE (2000)","DOI":"10.1109\/CMPSAC.2000.884716"},{"key":"11_CR23","doi-asserted-by":"crossref","unstructured":"Myles, G., Collberg, C.: Software watermarking via opaque predicates: implementation, analysis, and attacks 6(2), 155\u2013171 (2006)","DOI":"10.1007\/s10660-006-6955-z"},{"key":"11_CR24","doi-asserted-by":"crossref","unstructured":"Nielson, F., Nielson, H.R., Hankin, C.: Principles of program analysis. Springer, New York (1999)","DOI":"10.1007\/978-3-662-03811-6"},{"key":"11_CR25","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1109\/TKDE.2005.116","volume":"17","author":"R Sion","year":"2005","unstructured":"Sion, R., Atallah, M., Prabhakar, S.: Rights protection for categorical data. IEEE Trans. Knowl. Data Eng. 17, 912\u2013926 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"11_CR26","unstructured":"Yingjiu, L.: Database watermarking: A systematic view. Springer, Berlin (2007)"},{"key":"11_CR27","unstructured":"Zhang, Y., Niu, X., Zhao, D., Li, J., Liu, S.: Relational databases watermark technique based on content characteristic. In: First International Conference on Innovative Computing, Information and Control (ICICIC 2006). IEEE CS, Beijing (2006)"},{"key":"11_CR28","doi-asserted-by":"crossref","unstructured":"Zhou, X., Huang, M., Peng, Z.: An additive-attack-proof watermarking mechanism for databases\u2019 copyrights protection using image. In: SAC\u201907: Proceedings of the 2007 ACM Symposium on Applied Computing. pp. 254\u2013258. Seoul, Korea (2007)","DOI":"10.1145\/1244002.1244066"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Computing and Systems for Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-81-322-2653-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T12:45:41Z","timestamp":1748695541000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-81-322-2653-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,19]]},"ISBN":["9788132226512","9788132226536"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-81-322-2653-6_11","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,11,19]]},"assertion":[{"value":"19 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}