{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T14:55:35Z","timestamp":1743087335797,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":12,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819932993"},{"type":"electronic","value":"9789819933006"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-3300-6_43","type":"book-chapter","created":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:04:01Z","timestamp":1685459041000},"page":"597-608","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Design of an Active Data Watermark Detection System"],"prefix":"10.1007","author":[{"given":"Lan","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiangyang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Tiejun","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,31]]},"reference":[{"issue":"3","key":"43_CR1","doi-asserted-by":"publisher","first-page":"613","DOI":"10.1109\/TETCI.2021.3055520","volume":"6","author":"W Ding","year":"2022","unstructured":"Ding, W., Ming, Y., Cao, Z., Lin, C.-T.: A generalized deep neural network approach for digital watermarking analysis. IEEE Trans. Emerg. Top. Comput. Intell. 6(3), 613\u2013627 (2022)","journal-title":"IEEE Trans. Emerg. Top. Comput. Intell."},{"key":"43_CR2","doi-asserted-by":"crossref","unstructured":"Shankar, A., Kannammal, A.: A hybrid of watermark scheme with encryption to improve security of medical images. In: 2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks (ICICV), pp. 226\u2013233 (2021)","DOI":"10.1109\/ICICV50876.2021.9388616"},{"key":"43_CR3","doi-asserted-by":"crossref","unstructured":"Chen, W., Zeng, B., Zheng, P.: A robust watermarking scheme for encrypted JPEG bitstreams with format-compliant encryption. In: 2019 18th IEEE International Conference on Trust, Security And Privacy In Computing And Communications\/13th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE), pp. 397\u2013403 (2019)","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00060"},{"key":"43_CR4","doi-asserted-by":"crossref","unstructured":"Shen, X., Zhang, Y., Wang, T., Sun, Y.: Relational database watermarking for data tracing. In: 2020 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC), pp. 224\u2013231 (2020)","DOI":"10.1109\/CyberC49757.2020.00043"},{"key":"43_CR5","doi-asserted-by":"crossref","unstructured":"Gavilanes, G.B.: Persons counter through Wi-Fi\u2019s passive sniffing for IoT. In: 2018 IEEE Third Ecuador Technical Chapters Meeting (ETCM), pp. 1\u20136 (2018)","DOI":"10.1109\/ETCM.2018.8580283"},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Kim, W., Lee, K.: Digital watermarking for protecting audio classification datasets. In: ICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), pp. 2842\u20132846 (2020)","DOI":"10.1109\/ICASSP40776.2020.9053869"},{"key":"43_CR7","doi-asserted-by":"crossref","unstructured":"Kim, J., Ko, W.-H., Kumar, P.R.: Cyber-security through dynamic watermarking for 2-rotor aerial vehicle flight control systems. In: 2021 International Conference on Unmanned Aircraft Systems (ICUAS), pp. 1277\u20131283 (2021)","DOI":"10.1109\/ICUAS51884.2021.9476684"},{"issue":"12","key":"43_CR8","doi-asserted-by":"publisher","first-page":"4826","DOI":"10.1109\/TCSVT.2021.3055255","volume":"31","author":"Z Ma","year":"2021","unstructured":"Ma, Z., Zhang, W., Fang, H., Dong, X., Geng, L., Yu, N.: Local geometric distortions resilient watermarking scheme based on symmetry. IEEE Trans. Circuits Syst. Video Technol. 31(12), 4826\u20134839 (2021)","journal-title":"IEEE Trans. Circuits Syst. Video Technol."},{"key":"43_CR9","doi-asserted-by":"publisher","first-page":"2556","DOI":"10.1109\/TIFS.2020.2972159","volume":"15","author":"S Haddad","year":"2020","unstructured":"Haddad, S., Coatrieux, G., Moreau-Gaudry, A., Cozic, M.: Joint watermarking-encryption-JPEG-LS for medical image reliability control in encrypted and compressed domains. IEEE Trans. Inf. Forensics Secur. 15, 2556\u20132569 (2020)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"issue":"4","key":"43_CR10","doi-asserted-by":"publisher","first-page":"1232","DOI":"10.1109\/TNET.2013.2272740","volume":"22","author":"A Houmansadr","year":"2014","unstructured":"Houmansadr, A., Kiyavash, N., Borisov, N.: Non-blind watermarking of network flows. IEEE\/ACM Trans. Netw. 22(4), 1232\u20131244 (2014)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"43_CR11","doi-asserted-by":"crossref","unstructured":"Azizian, B., Ghaemmaghami, S.: Tampering detection and restoration of compressed video. In: 2018 15th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC), pp. 1\u20135 (2018)","DOI":"10.1109\/ISCISC.2018.8546848"},{"key":"43_CR12","doi-asserted-by":"crossref","unstructured":"Rakhmawati, L., Wirawan, Suwadi: Image fragile watermarking with two authentication components for tamper detection and recovery. In: 2018 International Conference on Intelligent Autonomous Systems (ICoIAS), pp. 35\u201338 (2018)","DOI":"10.1109\/ICoIAS.2018.8494080"}],"container-title":["Communications in Computer and Information Science","Big Data and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-3300-6_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,30]],"date-time":"2023-05-30T15:12:40Z","timestamp":1685459560000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-3300-6_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819932993","9789819933006"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-3300-6_43","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"31 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Big Data and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xiamen","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 December 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbds2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icbds.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}