{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T03:36:24Z","timestamp":1774064184896,"version":"3.50.1"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"23-24","license":[{"start":{"date-parts":[[2019,1,12]],"date-time":"2019-01-12T00:00:00Z","timestamp":1547251200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,1,12]],"date-time":"2019-01-12T00:00:00Z","timestamp":1547251200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s11042-018-7074-2","type":"journal-article","created":{"date-parts":[[2019,1,12]],"date-time":"2019-01-12T12:57:45Z","timestamp":1547297865000},"page":"16051-16075","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Watermarking as a service (WaaS) with anonymity"],"prefix":"10.1007","volume":"79","author":[{"given":"Farah","family":"Naz","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2712-1956","authenticated-orcid":false,"given":"Abid","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Mansoor","family":"Ahmed","sequence":"additional","affiliation":[]},{"given":"Majid Iqbal","family":"Khan","sequence":"additional","affiliation":[]},{"given":"Sadia","family":"Din","sequence":"additional","affiliation":[]},{"given":"Awais","family":"Ahmad","sequence":"additional","affiliation":[]},{"given":"Gwanggil","family":"Jeon","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,12]]},"reference":[{"issue":"2","key":"7074_CR1","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s00778-003-0097-x","volume":"12","author":"R Agrawal","year":"2003","unstructured":"Agrawal R, Haas PJ, Kiernan J (2003) Watermarking Relational Data: Framework, Algorithms and Analysis. The VLDB J 12(2):157\u2013169","journal-title":"The VLDB J"},{"key":"7074_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal R, Kiernan J (2002) Watermarking relational databases. Proceedings of the 28th international conference on Very Large Data Bases, pp. 155\u2013166, Hong Kong","DOI":"10.1016\/B978-155860869-6\/50022-6"},{"key":"7074_CR3","unstructured":"Aihab K, Hussain S (2013) A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations. Article ID 796726, pp. 16"},{"issue":"8","key":"7074_CR4","first-page":"0975","volume":"21","author":"K Ashwani","year":"2011","unstructured":"Ashwani K, Vipin T (2011) A practical Buyer-Seller watermarking protocol based on discrete wavelet transform. Int J Comput Appl 21(8):0975\u20138887","journal-title":"Int J Comput Appl"},{"issue":"2","key":"7074_CR5","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1016\/j.cose.2009.08.008","volume":"29","author":"C-C Chang","year":"2010","unstructured":"Chang C-C, Tsai H-C, Hsieh Y-P (2010) An efficient and fair buyer-seller fingerprinting scheme for large scale networks. Comput Secur 29(2):269\u2013277","journal-title":"Comput Secur"},{"key":"7074_CR6","first-page":"265","volume":"2846","author":"JG Choi","year":"2003","unstructured":"Choi JG, Sakurai K, Park JH (2003) Does it need trusted third party? design of buyer-seller watermarking protocol without trusted third party. Proc ACNS 2846:265\u2013279","journal-title":"Proc ACNS"},{"key":"7074_CR7","doi-asserted-by":"crossref","unstructured":"Cox I, Bloom J, Miller M (2001) \u201cDigital Watermarking,\u201d Digital Watermarking, Morgan Kaufmann","DOI":"10.1016\/B978-155860714-9\/50009-2"},{"issue":"12","key":"7074_CR8","doi-asserted-by":"publisher","first-page":"1673","DOI":"10.1109\/83.650120","volume":"6","author":"I Cox","year":"1997","unstructured":"Cox I, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673\u20131687","journal-title":"IEEE Trans Image Process"},{"key":"7074_CR9","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/49.668980","volume":"16","author":"IJ Cox","year":"1998","unstructured":"Cox IJ, Linnartz JP (1998) Some general methods for tampering with watermarks. IEEE Transactions on Selected Areas of Communications 16:587\u2013593","journal-title":"IEEE Transactions on Selected Areas of Communications"},{"issue":"2","key":"7074_CR10","doi-asserted-by":"publisher","first-page":"587","DOI":"10.1109\/49.668980","volume":"16","author":"IJ Cox","year":"1998","unstructured":"Cox IJ, Linnartz JP (1998) Some general methods for tampering with watermarks. IEEE Transactions on Selected Areas of Communications 16(2):587\u2013593","journal-title":"IEEE Transactions on Selected Areas of Communications"},{"key":"7074_CR11","volume-title":"Digital Watermarking and fundamentals","author":"IJ Cox","year":"2002","unstructured":"Cox IJ, Miller ML, Bloom JA (2002) Digital Watermarking and fundamentals. Morgan Kaufmann, San Francisco"},{"key":"7074_CR12","doi-asserted-by":"crossref","unstructured":"Eslami Z, Kazemnasabhaji M, Mirehi N (2013) Proxy signatures and buyer-seller watermarking protocols for the protection of multimedia content. Multimedia Tools and Applications","DOI":"10.1007\/s11042-013-1555-0"},{"key":"7074_CR13","unstructured":"Fan C-I, Juang W-S, Chen M-T (2010) Efficient fair content exchange in cloud computing,\" Computer Symposium (ICS), 2010 International, 16\u201318, pp. 294\u2013299"},{"key":"7074_CR14","doi-asserted-by":"crossref","unstructured":"Guo J, Li Y, Deng RH, Chen K (2006) Rights protection for data cubes. Proceedings of Information Security Conference (ISC), pp. 359\u2013372","DOI":"10.1007\/11836810_26"},{"issue":"2","key":"7074_CR15","doi-asserted-by":"publisher","first-page":"89","DOI":"10.4156\/jdcta.vol4.issue2.10","volume":"4","author":"D Hang","year":"2010","unstructured":"Hang D, Liang S, Pan Z, Li H, Liu X (2010) An Image Authentication Scheme Based on Correlation. JDCTA 4(2):89\u201394","journal-title":"JDCTA"},{"issue":"7","key":"7074_CR16","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1109\/5.771066","volume":"87","author":"F Hartung","year":"1999","unstructured":"Hartung F, Kutter M (1999) Multimedia watermarking techniques. Proc IEEE 87(7):1079\u20131107","journal-title":"Proc IEEE"},{"key":"7074_CR17","doi-asserted-by":"crossref","unstructured":"Jonathan KS, Girod B (2002) Power spectrum conditions for energy efficient watermarking. IEEE Trans. on Multimedia 4(4)","DOI":"10.1109\/TMM.2002.806535"},{"key":"7074_CR18","doi-asserted-by":"publisher","first-page":"698","DOI":"10.1016\/j.cose.2009.04.001","volume":"28","author":"I Kamel","year":"2009","unstructured":"Kamel I (2009) A schema for protecting the integrity of databases. Computers and Security 28:698\u2013709","journal-title":"Computers and Security"},{"issue":"2","key":"7074_CR19","first-page":"143","volume":"1","author":"SS Katariya","year":"2012","unstructured":"Katariya SS (2012) Digital Watermarking: Review. International Journal of Engineering and Innovative Technology 1(2):143\u2013153","journal-title":"International Journal of Engineering and Innovative Technology"},{"key":"7074_CR20","first-page":"5","volume":"9","author":"A Kerckhoffs","year":"1883","unstructured":"Kerckhoffs A (1883) La cryptographie militaire. Journal des Sciences Militaires 9:5\u201338","journal-title":"Journal des Sciences Militaires"},{"key":"7074_CR21","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1016\/j.jnca.2016.08.026","volume":"75","author":"A Khan","year":"2016","unstructured":"Khan A, Jabeen F, Naz F, Suhail S, Ahmed M, Nawaz S (2016) Buyer Seller Watermarking Protocols Issues and Challenges - A Survey. J Netw Comput Appl 75:317\u2013334 Elsevier","journal-title":"J Netw Comput Appl"},{"issue":"12","key":"7074_CR22","doi-asserted-by":"publisher","first-page":"1618","DOI":"10.1109\/TIP.2004.837553","volume":"13","author":"C-L Lei","year":"2004","unstructured":"Lei C-L, Yu P-L, Tsai P-L, Chan M-H (2004) An efficient and anonymous buyer-seller watermarking protocol. IEEE Transaction Image Process 13(12):1618\u20131626","journal-title":"IEEE Transaction Image Process"},{"issue":"3","key":"7074_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/jdm.2008070101","volume":"19","author":"Y Li","year":"2008","unstructured":"Li Y, Guo H, Wang S (2008) A Multiple-Bits Watermark for relational Data. J Database Manag 19(3):1\u201321","journal-title":"J Database Manag"},{"key":"7074_CR24","unstructured":"Li Y, Swarup V, Jajodia S (2003) A robust watermarking scheme for relational data. In Proc. The 13th workshop on information technology and engineering, pp. 195\u2013200"},{"issue":"1","key":"7074_CR25","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/TDSC.2005.12","volume":"2","author":"Y Li","year":"2005","unstructured":"Li Y, Swarup V, Jajodia S (2005) Fingerprinting Relational Databases: Schemes and Specialties. IEEE Trans Dependable and Secure Computing 2(1):34\u201345","journal-title":"IEEE Trans Dependable and Secure Computing"},{"issue":"4","key":"7074_CR26","doi-asserted-by":"publisher","first-page":"643","DOI":"10.1109\/83.913598","volume":"10","author":"N Memon","year":"2001","unstructured":"Memon N, Wong PW (2001) A buyer-seller watermarking protocol. IEEE Transaction Image Process 10(4):643\u2013649","journal-title":"IEEE Transaction Image Process"},{"issue":"3","key":"7074_CR27","doi-asserted-by":"publisher","first-page":"18","DOI":"10.4156\/aiss.vol2.issue3.3","volume":"2","author":"S Meng","year":"2010","unstructured":"Meng S, Cao W, Yan Y, Li S (2010) Bit Replacement Audio Watermarking Using Stereo Signals. AISS 2(3):18\u201324","journal-title":"AISS"},{"issue":"7","key":"7074_CR28","doi-asserted-by":"publisher","first-page":"1062","DOI":"10.1109\/5.771065","volume":"87","author":"FAP Petitcolas","year":"1999","unstructured":"Petitcolas FAP, Anderson R, Kuhn MG (1999) Information hiding A survey. Proc IEEE 87(7):1062\u20131077","journal-title":"Proc IEEE"},{"key":"7074_CR29","unstructured":"Raju H, Shantanu P (2010) Watermarking techniques for relational databases: survey, classification and comparison. Journal of Universal Computer Science 16(21)"},{"key":"7074_CR30","doi-asserted-by":"crossref","unstructured":"Rial A, Balasch J, Preneel B (2011) A privacy preserving buyer seller watermarking protocol based on priced oblivious transfer. Information forensics and security, IEEE Transactions 6(1)","DOI":"10.1109\/TIFS.2010.2095844"},{"issue":"2","key":"7074_CR31","first-page":"223","volume":"1","author":"L Robert","year":"2009","unstructured":"Robert L, Shanmugapriya T (2009) A Study on Digital Watermarking Techniques. International Journal of Recent Trends in Engineering 1(2):223\u2013225","journal-title":"International Journal of Recent Trends in Engineering"},{"key":"7074_CR32","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/s11042-016-4247-8","volume":"77","author":"C Song","year":"2018","unstructured":"Song C, Sang J, Sudirman S (2018) A buyer-seller watermarking protocol for digital secondary market. Multimedia Tools Appl 77:225. \nhttps:\/\/doi.org\/10.1007\/s11042-016-4247-8","journal-title":"Multimedia Tools Appl"},{"issue":"7","key":"7074_CR33","doi-asserted-by":"publisher","first-page":"1108","DOI":"10.1109\/5.771067","volume":"87","author":"RB Wolfgang","year":"1999","unstructured":"Wolfgang RB, Podilchuk CI, Delp EJ (1999) Perceptual watermarks for digital images and video. Proc IEEE 87(7):1108\u20131126","journal-title":"Proc IEEE"},{"key":"7074_CR34","doi-asserted-by":"crossref","unstructured":"Yu Z, Wang C, Thomborson C, Wang J, Lian S, Vasilakos AV (2011) A novel watermarking method for software protection in the cloud. Software. Practice and Experience","DOI":"10.1002\/spe.1088"},{"key":"7074_CR35","doi-asserted-by":"crossref","unstructured":"Zhang LY, Zheng Y, Weng J, Wang C, Shan Z, Ren K (2018) You can access but you cannot leak: defending against illegal content redistribution in encrypted cloud media center. IEEE TraTDSC, in press","DOI":"10.1109\/TDSC.2018.2864748"},{"key":"7074_CR36","doi-asserted-by":"crossref","unstructured":"Zhu W, Thomborson C, Wang F-Y (2005) A survey of software watermarking, Proceedings of the 2005 IEEE international conference on intelligence and security informatics","DOI":"10.1007\/11427995_42"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-7074-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-7074-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-7074-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T17:03:30Z","timestamp":1593623010000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-7074-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,12]]},"references-count":36,"journal-issue":{"issue":"23-24","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["7074"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-7074-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,1,12]]},"assertion":[{"value":"5 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 September 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 December 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2019","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}