{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T12:34:49Z","timestamp":1761395689447},"publisher-location":"Singapore","reference-count":17,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811533792"},{"type":"electronic","value":"9789811533808"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-3380-8_7","type":"book-chapter","created":{"date-parts":[[2020,3,2]],"date-time":"2020-03-02T19:04:40Z","timestamp":1583175880000},"page":"71-84","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["BDmark: A Blockchain-Driven Approach to Big Data Watermarking"],"prefix":"10.1007","author":[{"given":"Swagatika","family":"Sahoo","sequence":"first","affiliation":[]},{"given":"Rishu","family":"Roshan","sequence":"additional","affiliation":[]},{"given":"Vikash","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Raju","family":"Halder","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,3,3]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Bhowmik, D., Feng, T.: The multimedia blockchain: a distributed and tamper-proof media transaction framework. In: Proceedings of 22nd International Conference on Digital Signal Processing (DSP), London, UK, pp. 1\u20135. IEEE, August 2017","DOI":"10.1109\/ICDSP.2017.8096051"},{"key":"7_CR2","unstructured":"Billstr\u00f6m, A., Huss, F.: Video Integrity through Blockchain Technology. KTH Vetenskap Och Konst, Stockholm, Sweden, August 2017"},{"issue":"2","key":"7_CR3","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/s11036-013-0489-0","volume":"19","author":"M Chen","year":"2014","unstructured":"Chen, M., Mao, S., Liu, Y.: Big data: a survey. Mob. Netw. Appl. 19(2), 171\u2013209 (2014)","journal-title":"Mob. Netw. Appl."},{"issue":"21","key":"7_CR4","first-page":"3164","volume":"16","author":"R Halder","year":"2010","unstructured":"Halder, R., Pal, S., Cortesi, A.: Watermarking techniques for relational databases: survey, classification and comparison. J. Univers. Comput. Sci. 16(21), 3164\u20133190 (2010)","journal-title":"J. Univers. Comput. Sci."},{"issue":"3","key":"7_CR5","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/S0165-1684(98)00011-5","volume":"66","author":"F Hartung","year":"1998","unstructured":"Hartung, F., Girod, B.: Watermarking of uncompressed and compressed video. Signal Process. 66(3), 283\u2013301 (1998)","journal-title":"Signal Process."},{"key":"7_CR6","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1109\/JSYST.2015.2416131","volume":"11","author":"S Iftikhar","year":"2017","unstructured":"Iftikhar, S., Kamran, M., Munir, E.U., Khan, S.U.: A reversible watermarking technique for social network data sets for enabling data trust in cyber, physical, and social computing. IEEE Syst. J. 11, 197\u2013206 (2017)","journal-title":"IEEE Syst. J."},{"key":"7_CR7","doi-asserted-by":"publisher","first-page":"8011","DOI":"10.1109\/ACCESS.2018.2796585","volume":"6","author":"NS Kamaruddin","year":"2018","unstructured":"Kamaruddin, N.S., Kamsin, A., Por, L.Y., Rahman, H.: A review of text watermarking: theory, methods, and applications. IEEE Access 6, 8011\u20138028 (2018)","journal-title":"IEEE Access"},{"key":"7_CR8","doi-asserted-by":"publisher","first-page":"3667","DOI":"10.1007\/s10586-017-1251-3","volume":"20","author":"Y Liu","year":"2017","unstructured":"Liu, Y., Yang, F., Gao, K., Dong, W., Song, J.: A zero-watermarking scheme with embedding timestamp in vector maps for big data computing. Clust. Comput. 20, 3667\u20133675 (2017)","journal-title":"Clust. Comput."},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Meng, Z., Morizumi, T., Miyata, S., Kinoshita, H.: Design scheme of copyright management system based on digital watermarking and blockchain. In: Proceedings of IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC), Tokyo, Japan, pp. 359\u2013364. IEEE, July 2018","DOI":"10.1109\/COMPSAC.2018.10258"},{"key":"7_CR10","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system, March 2009. http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1016\/j.ins.2017.10.009","volume":"424","author":"J Parra-Arnau","year":"2018","unstructured":"Parra-Arnau, J.: Optimized, direct sale of privacy in personal data marketplaces. Inf. Sci. 424, 354\u2013384 (2018)","journal-title":"Inf. Sci."},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Pilkington, M.: Blockchain technology: principles and applications. In: Handbook of Research on Digital Transformations. Edward Elgar (2016)","DOI":"10.4337\/9781784717766.00019"},{"issue":"11","key":"7_CR13","doi-asserted-by":"publisher","first-page":"2343","DOI":"10.3390\/app9112343","volume":"9","author":"S Sahoo","year":"2019","unstructured":"Sahoo, S., Fajge, A.M., Halder, R., Cortesi, A.: A hierarchical andabstraction-based blockchain model. Appl. Sci. 9(11), 2343 (2019)","journal-title":"Appl. Sci."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Terzo, O., Ruiu, P., Bucci, E., Xhafa, F.: Data as a service (DaaS) for sharing and processing of large data collections in the cloud. In: Proceedings of Seventh International Conference on Complex, Intelligent, and Software Intensive Systems, Taichung, Taiwan, pp. 475\u2013480. IEEE, July 2013","DOI":"10.1109\/CISIS.2013.87"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Wangming, Y.: The digital watermarking algorithm based on the big data algebra graoh. In: Proceedings of International Conference on Robots & Intelligent System, Huaian, China, pp. 342\u2013345. IEEE, November 2017","DOI":"10.1109\/ICRIS.2017.92"},{"key":"7_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-030-05345-1_30","volume-title":"Security, Privacy, and Anonymity in Computation, Communication, and Storage","author":"J Yang","year":"2018","unstructured":"Yang, J., Wang, H., Wang, Z., Long, J., Du, B.: BDCP: a framework for big data copyright protection based on digital watermarking. In: Wang, G., Chen, J., Yang, L.T. (eds.) SpaCCS 2018. LNCS, vol. 11342, pp. 351\u2013360. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-05345-1_30"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Zhao, S., O\u2019Mahony, D.: BMCProtector: a blockchain and smart contract based application for music copyright protection. In: Proceedings of International Conference on Blockchain Technology and Application, USA, pp. 1\u20135. ACM, December 2018","DOI":"10.1145\/3301403.3301404"}],"container-title":["Communications in Computer and Information Science","Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-3380-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,27]],"date-time":"2023-09-27T20:16:09Z","timestamp":1695845769000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-15-3380-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811533792","9789811533808"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-3380-8_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"3 March 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACIIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Intelligent Information and Database Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Phuket","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 March 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 March 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aciids2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aciids.pwr.edu.pl\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}