{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:40:33Z","timestamp":1742913633557,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":30,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819615445"},{"type":"electronic","value":"9789819615452"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-1545-2_16","type":"book-chapter","created":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T16:55:11Z","timestamp":1739379311000},"page":"270-289","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Data Watermark Scheme Base on\u00a0Data Converted Bitmap for\u00a0Data Trading"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0003-9506-9587","authenticated-orcid":false,"given":"Xinyu","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8590-1737","authenticated-orcid":false,"given":"Wei","family":"Ren","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2046-5305","authenticated-orcid":false,"given":"Wenmao","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8047-3059","authenticated-orcid":false,"given":"Xianghan","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,13]]},"reference":[{"key":"16_CR1","doi-asserted-by":"publisher","unstructured":"Alvar, S.R., Akbari, M., Yue, D.M.X., Zhang, Y.: Nft-based data marketplace with digital watermarking. In: Singh, A.K., et al. (eds.) Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, KDD 2023, Long Beach, CA, USA, August 6\u201310, 2023, pp. 4756\u20134767. ACM (2023). https:\/\/doi.org\/10.1145\/3580305.3599876","DOI":"10.1145\/3580305.3599876"},{"key":"16_CR2","doi-asserted-by":"publisher","first-page":"8933","DOI":"10.1109\/TMM.2023.3243665","volume":"25","author":"C Chen","year":"2023","unstructured":"Chen, C., Wang, D., Song, B., Tan, H.: Inter-intra modal representation augmentation with DCT-transformer adversarial network for image-text matching. IEEE Trans. Multim. 25, 8933\u20138945 (2023). https:\/\/doi.org\/10.1109\/TMM.2023.3243665","journal-title":"IEEE Trans. Multim."},{"issue":"9","key":"16_CR3","doi-asserted-by":"publisher","first-page":"1939","DOI":"10.1109\/TIFS.2015.2439962","volume":"10","author":"J Franco-Contreras","year":"2015","unstructured":"Franco-Contreras, J., Coatrieux, G.: Robust watermarking of relational databases with ontology-guided distortion control. IEEE Trans. Inf. Forensics Secur. 10(9), 1939\u20131952 (2015). https:\/\/doi.org\/10.1109\/TIFS.2015.2439962","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"3","key":"16_CR4","doi-asserted-by":"publisher","first-page":"397","DOI":"10.1109\/TIFS.2013.2294240","volume":"9","author":"J Franco-Contreras","year":"2014","unstructured":"Franco-Contreras, J., Coatrieux, G., Cuppens, F., Cuppens-Boulahia, N., Roux, C.: Robust lossless watermarking of relational databases based on circular histogram modulation. IEEE Trans. Inf. Forensics Secur. 9(3), 397\u2013410 (2014). https:\/\/doi.org\/10.1109\/TIFS.2013.2294240","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"16_CR5","doi-asserted-by":"publisher","first-page":"4767","DOI":"10.1109\/TIFS.2024.3383770","volume":"19","author":"D Gilkarov","year":"2024","unstructured":"Gilkarov, D., Dubin, R.: Steganalysis of AI models LSB attacks. IEEE Trans. Inf. Forensics Secur. 19, 4767\u20134779 (2024). https:\/\/doi.org\/10.1109\/TIFS.2024.3383770","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"16_CR6","doi-asserted-by":"publisher","first-page":"5435","DOI":"10.1109\/TMM.2023.3333659","volume":"26","author":"M He","year":"2024","unstructured":"He, M., Wang, H., Zhang, F., Xiang, Y.: Exploring accurate invariants on polar harmonic fourier moments in polar coordinates for robust image watermarking. IEEE Trans. Multim. 26, 5435\u20135449 (2024). https:\/\/doi.org\/10.1109\/TMM.2023.3333659","journal-title":"IEEE Trans. Multim."},{"key":"16_CR7","doi-asserted-by":"publisher","unstructured":"Hsu, C., Lu, C.: Joint image halftoning and watermarking in high-resolution digital form. In: Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, ICME 2005, July 6\u20139, 2005, Amsterdam, The Netherlands, pp. 534\u2013537. IEEE Computer Society (2005). https:\/\/doi.org\/10.1109\/ICME.2005.1521478","DOI":"10.1109\/ICME.2005.1521478"},{"key":"16_CR8","doi-asserted-by":"publisher","unstructured":"Hu, D., Wang, Q., Yan, S., Liu, X., Li, M., Zheng, S.: Reversible database watermarking based on order-preserving encryption for data sharing. ACM Trans. Database Syst. 48(2), 1\u201325 (2023). https:\/\/doi.org\/10.1145\/3589761","DOI":"10.1145\/3589761"},{"issue":"6","key":"16_CR9","doi-asserted-by":"publisher","first-page":"1024","DOI":"10.1109\/TKDE.2018.2851517","volume":"31","author":"D Hu","year":"2019","unstructured":"Hu, D., Zhao, D., Zheng, S.: A new robust approach for reversible database watermarking with distortion control. IEEE Trans. Knowl. Data Eng. 31(6), 1024\u20131037 (2019). https:\/\/doi.org\/10.1109\/TKDE.2018.2851517","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"16_CR10","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/TIP.2020.3036727","volume":"30","author":"R Hu","year":"2021","unstructured":"Hu, R., Xiang, S.: Cover-lossless robust image watermarking against geometric deformations. IEEE Trans. Image Process. 30, 318\u2013331 (2021). https:\/\/doi.org\/10.1109\/TIP.2020.3036727","journal-title":"IEEE Trans. Image Process."},{"key":"16_CR11","doi-asserted-by":"publisher","first-page":"102228","DOI":"10.1016\/j.datak.2023.102228","volume":"148","author":"D Li","year":"2023","unstructured":"Li, D., Ma, C., Gao, H., Jin, X.: LBP feature and hash function based dual watermarking algorithm for database. Data Knowl. Eng. 148, 102228 (2023)","journal-title":"Data Knowl. Eng."},{"key":"16_CR12","doi-asserted-by":"publisher","unstructured":"Li, H., Sun, Z., Sun, J.: Invert-and-project (IVP): a lossless compression method of multi-scale JPEG images via DCT coefficients prediction. In: Bilgin, A., Marcellin, M.W., Serra-Sagrist\u00e0, J., Storer, J.A. (eds.) Data Compression Conference, DCC 2023, Snowbird, UT, USA, March 21\u201324, 2023, p.\u00a0349. IEEE (2023). https:\/\/doi.org\/10.1109\/DCC55655.2023.00089","DOI":"10.1109\/DCC55655.2023.00089"},{"issue":"7","key":"16_CR13","doi-asserted-by":"publisher","first-page":"7440","DOI":"10.1109\/TKDE.2022.3194191","volume":"35","author":"W Li","year":"2023","unstructured":"Li, W., Li, N., Yan, J., Zhang, Z., Yu, P., Long, G.: Secure and high-quality watermarking algorithms for relational database based on semantic. IEEE Trans. Knowl. Data Eng. 35(7), 7440\u20137456 (2023). https:\/\/doi.org\/10.1109\/TKDE.2022.3194191","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"9","key":"16_CR14","doi-asserted-by":"publisher","first-page":"5676","DOI":"10.1109\/TIT.2023.3277454","volume":"69","author":"C Liu","year":"2023","unstructured":"Liu, C., Zheng, D., Wang, X.: Generalized hamming weights of linear codes from quadratic forms over finite fields of even characteristic. IEEE Trans. Inf. Theory 69(9), 5676\u20135686 (2023). https:\/\/doi.org\/10.1109\/TIT.2023.3277454","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"16_CR15","doi-asserted-by":"publisher","first-page":"103122","DOI":"10.1016\/J.IPM.2022.103122","volume":"60","author":"G Liu","year":"2023","unstructured":"Liu, G., Wang, H., Miao, C.: A three-dimensional text image watermarking model based on multilayer overlapping of extracted two-dimensional information. Inf. Process. Manag. 60(1), 103122 (2023). https:\/\/doi.org\/10.1016\/J.IPM.2022.103122","journal-title":"Inf. Process. Manag."},{"key":"16_CR16","doi-asserted-by":"publisher","unstructured":"Liu, S., Zhuang, Y., Huang, L., Zhou, X.: Exploiting LSB self-quantization for plaintext-related image encryption in the zero-trust cloud. J. Inf. Secur. Appl. 66, 103138 (2022). https:\/\/doi.org\/10.1016\/J.JISA.2022.103138","DOI":"10.1016\/J.JISA.2022.103138"},{"issue":"6","key":"16_CR17","doi-asserted-by":"publisher","first-page":"176815","DOI":"10.1007\/S11704-023-2372-X","volume":"17","author":"X Liu","year":"2023","unstructured":"Liu, X., Ren, W., Choo, K.R.: BSKCN and BSAML: blind signatures from the module lattice and the asymmetric module lattice. Frontiers Comput. Sci. 17(6), 176815 (2023). https:\/\/doi.org\/10.1007\/S11704-023-2372-X","journal-title":"Frontiers Comput. Sci."},{"key":"16_CR18","doi-asserted-by":"publisher","unstructured":"Luo, Y., Zhou, T., Liu, F., Cai, Z.: Irwart: levering watermarking performance for protecting high-quality artwork images. In: Ding, Y., Tang, J., Sequeda, J.F., Aroyo, L., Castillo, C., Houben, G. (eds.) Proceedings of the ACM Web Conference 2023, WWW 2023, Austin, TX, USA, 30 April 2023\u20134 May 2023, pp. 2340\u20132348. ACM (2023). https:\/\/doi.org\/10.1145\/3543507.3583489","DOI":"10.1145\/3543507.3583489"},{"key":"16_CR19","doi-asserted-by":"publisher","first-page":"1935","DOI":"10.1109\/TIFS.2023.3342612","volume":"19","author":"J Mao","year":"2024","unstructured":"Mao, J., Tang, H., Lyu, S., Zhou, Z., Cao, X.: Content-aware quantization index modulation: Leveraging data statistics for enhanced image watermarking. IEEE Trans. Inf. Forensics Secur. 19, 1935\u20131947 (2024). https:\/\/doi.org\/10.1109\/TIFS.2023.3342612","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"16_CR20","doi-asserted-by":"publisher","unstructured":"Mei, Z., Wang, Y., Pan, H.: TEA-Z: A tiny and efficient architecture based on Z channel for image watermarking and its versatile hardware implementation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(12), 5275\u20135287 (2022). https:\/\/doi.org\/10.1109\/TCAD.2022.3164634","DOI":"10.1109\/TCAD.2022.3164634"},{"key":"16_CR21","doi-asserted-by":"publisher","first-page":"119810","DOI":"10.1016\/J.INS.2023.119810","volume":"653","author":"SA Nawaz","year":"2024","unstructured":"Nawaz, S.A., Li, J., Bhatti, U.A., Shoukat, M.U., Li, D., Ahmad, R.M.: Hybrid watermarking algorithm for medical images based on digital transformation and mobilenetv2. Inf. Sci. 653, 119810 (2024). https:\/\/doi.org\/10.1016\/J.INS.2023.119810","journal-title":"Inf. Sci."},{"key":"16_CR22","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1016\/J.INS.2022.05.046","volume":"606","author":"Q Su","year":"2022","unstructured":"Su, Q., Liu, D., Sun, Y.: A robust adaptive blind color image watermarking for resisting geometric attacks. Inf. Sci. 606, 194\u2013212 (2022). https:\/\/doi.org\/10.1016\/J.INS.2022.05.046","journal-title":"Inf. Sci."},{"key":"16_CR23","doi-asserted-by":"publisher","unstructured":"Wang, G., et al.: Must: Robust image watermarking for multi-source tracing. In: Wooldridge, M.J., Dy, J.G., Natarajan, S. (eds.) Thirty-Eighth AAAI Conference on Artificial Intelligence, AAAI 2024, Thirty-Sixth Conference on Innovative Applications of Artificial Intelligence, IAAI 2024, Fourteenth Symposium on Educational Advances in Artificial Intelligence, EAAI 2014, February 20\u201327, 2024, Vancouver, Canada, pp. 5364\u20135371. AAAI Press (2024).https:\/\/doi.org\/10.1609\/AAAI.V38I6.28344","DOI":"10.1609\/AAAI.V38I6.28344"},{"issue":"10","key":"16_CR24","doi-asserted-by":"publisher","first-page":"5345","DOI":"10.1109\/TCSVT.2023.3252042","volume":"33","author":"X Wang","year":"2023","unstructured":"Wang, X., Lin, Y., Shen, Y., Niu, P.: UDTCWT-PHFMS domain statistical image watermarking using vector BW-type R distribution. IEEE Trans. Circuits Syst. Video Technol. 33(10), 5345\u20135359 (2023). https:\/\/doi.org\/10.1109\/TCSVT.2023.3252042","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"16_CR25","unstructured":"Wen, Y., Kirchenbauer, J., Geiping, J., Goldstein, T.: Tree-rings watermarks: invisible fingerprints for diffusion images. In: Oh, A., Naumann, T., Globerson, A., Saenko, K., Hardt, M., Levine, S. (eds.) Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, NeurIPS 2023, New Orleans, LA, USA, December 10\u201316, 2023 (2023). http:\/\/papers.nips.cc\/paper_files\/paper\/2023\/hash\/b54d1757c190ba20dbc4f9e4a2f54149-Abstract-Conference.html"},{"key":"16_CR26","doi-asserted-by":"publisher","unstructured":"Xia, J., Wang, H., Abdullahi, S.M., Wang, H., Zhang, F., Luo, B.: Adaptive and robust fourier-mellin-based image watermarking for social networking platforms. In: IEEE International Conference on Multimedia and Expo, ICME 2023, Brisbane, Australia, July 10\u201314, 2023, pp. 2843\u20132848. IEEE (2023). https:\/\/doi.org\/10.1109\/ICME55011.2023.00483","DOI":"10.1109\/ICME55011.2023.00483"},{"issue":"2","key":"16_CR27","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11704-020-0112-z","volume":"16","author":"S Xiang","year":"2022","unstructured":"Xiang, S., Ruan, G., Li, H., He, J.: Robust watermarking of databases in order-preserving encrypted domain. Front. Comp. Sci. 16(2), 1\u20139 (2022). https:\/\/doi.org\/10.1007\/s11704-020-0112-z","journal-title":"Front. Comp. Sci."},{"issue":"12","key":"16_CR28","doi-asserted-by":"publisher","first-page":"12497","DOI":"10.1109\/TKDE.2023.3277839","volume":"35","author":"S Xu","year":"2023","unstructured":"Xu, S., Zhang, L., Tang, Y., Han, C., Wu, H., Song, A.: Channel attention for sensor-based activity recognition: embedding features into all frequencies in DCT domain. IEEE Trans. Knowl. Data Eng. 35(12), 12497\u201312512 (2023). https:\/\/doi.org\/10.1109\/TKDE.2023.3277839","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"16_CR29","doi-asserted-by":"publisher","unstructured":"Yang, J., Liao, X.: Exploiting fine-grained DCT representations for hiding image-level messages within JPEG images. In: El-Saddik, A., Mei, T., Cucchiara, R., Bertini, M., Vallejo, D.P.T., Atrey, P.K., Hossain, M.S. (eds.) Proceedings of the 31st ACM International Conference on Multimedia, MM 2023, Ottawa, ON, Canada, 29 October 2023\u20133 November 2023, pp. 7373\u20137382. ACM (2023). https:\/\/doi.org\/10.1145\/3581783.3612473","DOI":"10.1145\/3581783.3612473"},{"key":"16_CR30","doi-asserted-by":"publisher","unstructured":"Yuan, S., Yu, J., Shen, P., Chen, C.: Verify a valid message in single tuple: a watermarking technique for relational database. In: Nah, Y., Cui, B., Lee, S., Yu, J.X., Moon, Y., Whang, S.E. (eds.) Database Systems for Advanced Applications - 25th International Conference, DASFAA 2020, Jeju, South Korea, September 24\u201327, 2020, Proceedings, Part I. Lecture Notes in Computer Science, vol. 12112, pp. 54\u201371. Springer (2020).https:\/\/doi.org\/10.1007\/978-3-030-59410-7_4","DOI":"10.1007\/978-3-030-59410-7_4"}],"container-title":["Lecture Notes in Computer Science","Algorithms and Architectures for Parallel Processing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-1545-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T16:55:17Z","timestamp":1739379317000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-1545-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819615445","9789819615452"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-1545-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"13 February 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"The authors have no competing interests to declare that are relevant to the content of this article.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclosure of Interests"}},{"value":"ICA3PP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Algorithms and Architectures for Parallel Processing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Macau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ica3pp2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ica3pp2024.scimeeting.cn\/en\/web\/index\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}