{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T11:29:19Z","timestamp":1740137359793,"version":"3.37.3"},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T00:00:00Z","timestamp":1694649600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1846316"],"award-info":[{"award-number":["CNS-1846316"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s10207-023-00744-5","type":"journal-article","created":{"date-parts":[[2023,9,14]],"date-time":"2023-09-14T15:28:55Z","timestamp":1694705335000},"page":"447-465","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Pepal: Penalizing multimedia breaches and partial leakages"],"prefix":"10.1007","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8617-7605","authenticated-orcid":false,"given":"Easwar Vivek","family":"Mangipudi","sequence":"first","affiliation":[]},{"given":"Krutarth","family":"Rao","sequence":"additional","affiliation":[]},{"given":"Jeremy","family":"Clark","sequence":"additional","affiliation":[]},{"given":"Aniket","family":"Kate","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,9,14]]},"reference":[{"key":"744_CR1","unstructured":"(2015) Data protection and breach. https:\/\/otalliance.org\/system\/files\/files\/resource\/documents\/dpd_2015_guide.pdf"},{"key":"744_CR2","unstructured":"(2015) Man in the cloud (mitc) attacks. https:\/\/www.imperva.com\/docs\/HII_Man_In_The_Cloud_Attacks.pdf"},{"key":"744_CR3","unstructured":"(n.d.) Data breaches. https:\/\/www.privacyrights.org\/data-breaches?title= &breach_type%5B%5D=267"},{"key":"744_CR4","unstructured":"(n.d.) Digital watermarking alliance. http:\/\/digitalwatermarkingalliance.org\/"},{"key":"744_CR5","unstructured":"(n.d.) Ethereum website. https:\/\/www.ethereum.org\/"},{"key":"744_CR6","unstructured":"(n.d.) Friendmts. https:\/\/www.friendmts.com\/nab-2017-showcase\/"},{"key":"744_CR7","unstructured":"(n.d.) Nsw data and information custodianship policy. https:\/\/www.finance.nsw.gov.au\/ict\/sites\/default\/files\/NSW%20Data%20and%20Information%20Custodianship%20Polic%20v1-0.pdf"},{"key":"744_CR8","unstructured":"(n.d.) Relic: efficient library for cryptography. https:\/\/github.com\/relic-toolkit"},{"key":"744_CR9","doi-asserted-by":"crossref","unstructured":"Adelsbach, A., Sadeghi, A.R.: Zero-knowledge watermark detection and proof of ownership. In: Information Hiding (2001a)","DOI":"10.1007\/3-540-45496-9_20"},{"key":"744_CR10","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/3-540-45496-9_20","volume-title":"Information Hiding","author":"A Adelsbach","year":"2001","unstructured":"Adelsbach, A., Sadeghi, A.R.: Zero-knowledge watermark detection and proof of ownership. In: Moskowitz, I.S. (ed.) Information Hiding, pp. 273\u2013288. Springer, Berlin Heidelberg, Berlin, Heidelberg (2001)"},{"key":"744_CR11","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/978-90-481-3660-5_11","volume-title":"Advanced Techniques in Computing Sciences and Software Engineering","author":"I Amer","year":"2010","unstructured":"Amer, I., Sheha, T., Badawy, W., Jullien, G.: A tool for robustness evaluation of image watermarking algorithms. In: Elleithy, K. (ed.) Advanced Techniques in Computing Sciences and Software Engineering, pp. 59\u201363. Springer, Netherlands, Dordrecht (2010)"},{"key":"744_CR12","doi-asserted-by":"crossref","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, L.: Secure multiparty computations on bitcoin. In: IEEE Symposium on Security and Privacy (2014)","DOI":"10.1109\/SP.2014.35"},{"key":"744_CR13","doi-asserted-by":"crossref","unstructured":"Arun, V., Kate, A., Garg, D., Druschel, P., Bhattacharjee, B.: Finding safety in numbers with secure allegation escrows arXiv preprint arXiv:1810.10123 (2020)","DOI":"10.14722\/ndss.2020.24331"},{"issue":"2","key":"744_CR14","first-page":"627","volume":"25","author":"CM Bast","year":"1999","unstructured":"Bast, C.M.: At what price silence: are confidentiality agreements enforceable? William Mitchell Law Rev. 25(2), 627 (1999)","journal-title":"William Mitchell Law Rev."},{"key":"744_CR15","doi-asserted-by":"crossref","unstructured":"Bentov, I., Kumaresan, R.: How to use bitcoin to design fair protocols. In: ICC (2014)","DOI":"10.1007\/978-3-662-44381-1_24"},{"key":"744_CR16","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: An efficient public key traitor tracing scheme. In: CRYPTO (1999)","DOI":"10.1007\/3-540-48405-1_22"},{"key":"744_CR17","first-page":"260","volume-title":"Proof Systems for General Statements About Discrete Logarithms","author":"J Camenisch","year":"1997","unstructured":"Camenisch, J., Stadler, M.: Proof Systems for General Statements About Discrete Logarithms, p. 260. Technical report\/Dept of Computer Science, ETH Z\u00fcrich (1997)"},{"key":"744_CR18","doi-asserted-by":"crossref","unstructured":"Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: CRYPTO (1994)","DOI":"10.1007\/3-540-48658-5_25"},{"key":"744_CR19","doi-asserted-by":"crossref","unstructured":"Chou, T., Orlandi, C.: The simplest protocol for oblivious transfer. In: LATINCRYPT (2015)","DOI":"10.1007\/978-3-319-22174-8_3"},{"issue":"12","key":"744_CR20","first-page":"1673","volume":"6","author":"IJ Cox","year":"1997","unstructured":"Cox, I.J., Kilian, J., Leighton, F.T., Shamoon, T.: Secure spread spectrum watermarking for multimedia. IEEE TIP 6(12), 1673\u20131687 (1997)","journal-title":"IEEE TIP"},{"key":"744_CR21","unstructured":"Cunningham, T.J., Huffman, B., Salmon, C.M.: Settlement trends in data breach litigation (2014). https:\/\/www.financierworldwide.com\/settlement-trends-in-data-breach-litigation"},{"key":"744_CR22","doi-asserted-by":"publisher","unstructured":"Doerner, J., Kondi, Y., Lee, E., a\u00a0shelat.: Secure two-party threshold ecdsa from ecdsa assumptions. In: 2018 IEEE Symposium on Security and Privacy (SP), pp 595\u2013612, (2018) https:\/\/doi.org\/10.1109\/SP.2018.00036","DOI":"10.1109\/SP.2018.00036"},{"key":"744_CR23","doi-asserted-by":"crossref","unstructured":"Dwork, C., Lotspiech, J., Naor, M.: Digital signets: Self-enforcing protection of digital information (preliminary version). In: Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, pp 489\u2013498 (1996)","DOI":"10.1145\/237814.237997"},{"issue":"5","key":"744_CR24","doi-asserted-by":"publisher","first-page":"809","DOI":"10.1016\/j.dsp.2009.04.003","volume":"19","author":"Y Erfani","year":"2009","unstructured":"Erfani, Y., Siahpoush, S.: Robust audio watermarking using improved TS echo hiding. Digital Signal Process. 19(5), 809\u2013814 (2009). https:\/\/doi.org\/10.1016\/j.dsp.2009.04.003","journal-title":"Digital Signal Process."},{"key":"744_CR25","doi-asserted-by":"crossref","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: Practical solutions to identification and signature problems. In: Proceedings on Advances in cryptology\u2014CRYPTO \u201986, pp 186\u2013194 (1987)","DOI":"10.1007\/3-540-47721-7_12"},{"key":"744_CR26","doi-asserted-by":"crossref","unstructured":"Floyd, T., Grieco, M., Reid, E.F.: Mining hospital data breach records: Cyber threats to u.s. hospitals. In: 2016 IEEE Conference on Intelligence and Security Informatics (ISI), pp 43\u201348 (2016)","DOI":"10.1109\/ISI.2016.7745441"},{"key":"744_CR27","unstructured":"Genc, Z.A., Iovino, V., Rial, A.: The simplest protocol for oblivious transfer revisited (2017). https:\/\/eprint.iacr.org\/2017\/370.pdf"},{"key":"744_CR28","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-540-30204-9_15","volume-title":"Advances in Databases and Information Systems","author":"T H\u00e4rder","year":"2004","unstructured":"H\u00e4rder, T., B\u00fchmann, A.: Database caching-towards a cost model for populating cache groups. In: Bencz\u00far, A., Demetrovics, J., Gottlob, G. (eds.) Advances in Databases and Information Systems, pp. 215\u2013229. Springer, Heidelberg (2004)"},{"key":"744_CR29","unstructured":"Hourihan, C., Cline, B.: A look back: U.s. healthcare data breach trends\". (2008) https:\/\/hitrustalliance.net\/content\/uploads\/2014\/05\/HITRUST-Report-U.S.-Healthcare-Data-Breach-Trends.pdf"},{"key":"744_CR30","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Tang, Q.: How to keep a secret: leakage deterring public-key cryptosystems. In: Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pp 943\u2013954 (2013)","DOI":"10.1145\/2508859.2516691"},{"key":"744_CR31","doi-asserted-by":"crossref","unstructured":"Kiayias, A., Tang, Q.: Traitor deterring schemes: using bitcoin as collateral for digital content. In: ACM CCS (2015)","DOI":"10.1145\/2810103.2813698"},{"key":"744_CR32","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1007\/978-3-319-16715-2_25","volume-title":"Topics in Cryptology \u2013 CT-RSA 2015","author":"A Kiayias","year":"2015","unstructured":"Kiayias, A., Leonardos, N., Lipmaa, H., Pavlyk, K., Tang, Q.: Communication optimal tardos-based asymmetric fingerprinting. In: Nyberg, K. (ed.) Topics in Cryptology \u2013 CT-RSA 2015, pp. 469\u2013486. Springer International Publishing, Cham (2015)"},{"key":"744_CR33","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1007\/978-3-319-63688-7_17","volume-title":"Advances in Cryptology - CRYPTO 2017","author":"S Kim","year":"2017","unstructured":"Kim, S., Wu, D.J.: Watermarking cryptographic functionalities from standard lattice assumptions. In: Katz, J., Shacham, H. (eds.) Advances in Cryptology - CRYPTO 2017, pp. 503\u2013536. Springer International Publishing, Cham (2017)"},{"key":"744_CR34","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In: IEEE Symposium on Security and Privacy (2016)","DOI":"10.1109\/SP.2016.55"},{"key":"744_CR35","doi-asserted-by":"publisher","unstructured":"Lancini, R., Mapelli, F., Tubaro, S.: A robust video watermarking technique in the spatial domain. In: International Symposium on VIPromCom Video\/Image Processing and Multimedia Communications, pp 251\u2013256, (2002) https:\/\/doi.org\/10.1109\/VIPROM.2002.1026664","DOI":"10.1109\/VIPROM.2002.1026664"},{"issue":"8","key":"744_CR36","doi-asserted-by":"publisher","first-page":"1973","DOI":"10.1016\/j.sigpro.2011.03.001","volume":"91","author":"BY Lei","year":"2011","unstructured":"Lei, B.Y., Soon, I.Y., Li, Z.: Blind and robust audio watermarking scheme based on svd-dct. Signal Process. 91(8), 1973\u20131984 (2011). https:\/\/doi.org\/10.1016\/j.sigpro.2011.03.001","journal-title":"Signal Process."},{"issue":"1","key":"744_CR37","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/TMM.2005.861292","volume":"8","author":"WN Lie","year":"2006","unstructured":"Lie, W.N., Chang, L.C.: Robust and high-quality time-domain audio watermarking based on low-frequency amplitude modification. IEEE Trans. Multimed. 8(1), 46\u201359 (2006). https:\/\/doi.org\/10.1109\/TMM.2005.861292","journal-title":"IEEE Trans. Multimed."},{"key":"744_CR38","unstructured":"Meerwald, P.: Watermarking source code. Online, (2005) http:\/\/www.cosy.sbg.ac.at\/~pmeerw\/Watermarking"},{"issue":"4","key":"744_CR39","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/83.913598","volume":"10","author":"N Memon","year":"2001","unstructured":"Memon, N., Wong, P.W.: A buyer-seller watermarking protocol. IEEE Trans. Image Process. 10(4), 643\u2013649 (2001). https:\/\/doi.org\/10.1109\/83.913598","journal-title":"IEEE Trans. Image Process."},{"key":"744_CR40","unstructured":"Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008)"},{"key":"744_CR41","doi-asserted-by":"crossref","unstructured":"Rahulamathavan, Y., Rajarajan, M., Rana, O.F., Awan, M.S., Burnap, P., Das, S.K.: Assessing data breach risk in cloud systems. In: 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom), pp 363\u2013370 (2015)","DOI":"10.1109\/CloudCom.2015.58"},{"key":"744_CR42","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/11958239_14","volume-title":"Progress in Cryptology - VIETCRYPT 2006","author":"P Rogaway","year":"2006","unstructured":"Rogaway, P.: Formalizing human ignorance. In: Nguyen, P.Q. (ed.) Progress in Cryptology - VIETCRYPT 2006, pp. 211\u2013228. Springer, Heidelberg (2006)"},{"key":"744_CR43","doi-asserted-by":"crossref","unstructured":"Ruffing, T., Kate, A., Schr\u00f6der, D.: Liar, liar, coins on fire!: penalizing equivocation by loss of bitcoins. In: ACM CCS (2015)","DOI":"10.1145\/2810103.2813686"},{"key":"744_CR44","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/3-540-45496-9_12","volume-title":"Information Hiding","author":"R Venkatesan","year":"2001","unstructured":"Venkatesan, R., Vazirani, V., Sinha, S.: A graph theoretic approach to software watermarking. In: Moskowitz, I.S. (ed.) Information Hiding, pp. 157\u2013168. Springer, Berlin Heidelberg, Berlin, Heidelberg (2001)"},{"issue":"1","key":"744_CR45","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/320521.320535","volume":"2","author":"SB Yao","year":"1977","unstructured":"Yao, S.B.: An attribute based model for database access cost analysis. ACM Trans. Database Syst. 2(1), 45\u201367 (1977). https:\/\/doi.org\/10.1145\/320521.320535","journal-title":"ACM Trans. Database Syst."},{"key":"744_CR46","doi-asserted-by":"publisher","unstructured":"Zhang, J., Ho, A.T.S., Qiu, G., Marziliano, P.: Robust video watermarking of h.264\/avc. In: IEEE Transactions on Circuits and Systems II: Express Briefs 54(2):205\u2013209, (2007) https:\/\/doi.org\/10.1109\/TCSII.2006.886247","DOI":"10.1109\/TCSII.2006.886247"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00744-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-023-00744-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-023-00744-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,23]],"date-time":"2024-01-23T01:10:18Z","timestamp":1705972218000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-023-00744-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,14]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["744"],"URL":"https:\/\/doi.org\/10.1007\/s10207-023-00744-5","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2023,9,14]]},"assertion":[{"value":"14 September 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors of this article declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}