{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,2,9]],"date-time":"2024-02-09T18:03:49Z","timestamp":1707501829044},"reference-count":27,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T00:00:00Z","timestamp":1513728000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Open Funding of Guizhou Provincial Key Laboratory of Public Big Data","award":["No. 2017BDKFJJ006"],"award-info":[{"award-number":["No. 2017BDKFJJ006"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s12652-017-0657-3","type":"journal-article","created":{"date-parts":[[2017,12,20]],"date-time":"2017-12-20T09:00:57Z","timestamp":1513760457000},"page":"295-304","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["LMDGW: a novel matrix based dynamic graph watermark"],"prefix":"10.1007","volume":"10","author":[{"given":"Lingling","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Wei","family":"Ren","sequence":"additional","affiliation":[]},{"given":"Yuling","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Min","family":"Lei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,12,20]]},"reference":[{"key":"657_CR1","doi-asserted-by":"crossref","unstructured":"Chasaki D, Mansour C (2015) Security challenges in the internet of things. In: Journal International (ed) of. Services and Data Management, Space Based and Situated Computing, Special Issue on Future Internet","DOI":"10.1504\/IJSSC.2015.070945"},{"key":"657_CR2","unstructured":"Chen M, Lin Z, Ma Y, Wu L (2010). The augmented lagrange multiplier method for exact recovery of corrupted low-rank matrices. Eprint Arxiv, 9"},{"issue":"7","key":"657_CR3","doi-asserted-by":"publisher","first-page":"4324","DOI":"10.1109\/TIT.2013.2249572","volume":"59","author":"Y Chen","year":"2013","unstructured":"Chen Y, Jalali A, Sanghavi S, Caramanis C (2013) Low-rank matrix recovery from errors and erasures. IEEE Trans Inf Theory 59(7):4324\u20134337","journal-title":"IEEE Trans Inf Theory"},{"key":"657_CR4","doi-asserted-by":"crossref","unstructured":"Cheng C, Zeng R (2016). An improved watermarking scheme based on ppct coding. Comput Knowl Technol","DOI":"10.1109\/ISCID.2016.1085"},{"key":"657_CR5","unstructured":"Cheng J, Song Y (2012). Dynamic map based on ppct structure software watermark protection. In: World automation congress, pp 133\u2013136"},{"issue":"4","key":"657_CR6","doi-asserted-by":"publisher","first-page":"40","DOI":"10.1109\/MSECP.2003.1219058","volume":"1","author":"C Collberg","year":"2003","unstructured":"Collberg C, Myles G, Huntwork A (2003) Sandmark-a tool for software protection research. Secur Priv IEEE 1(4):40\u201349","journal-title":"Secur Priv IEEE"},{"key":"657_CR7","doi-asserted-by":"crossref","unstructured":"Collberg C, Thomborson C (1999). Software watermarking: models and dynamic embeddings. In: ACM Sigplan-Sigact Symposium on Principles of Programming Languages, pp 311\u2013324","DOI":"10.1145\/292540.292569"},{"issue":"8","key":"657_CR8","doi-asserted-by":"publisher","first-page":"735","DOI":"10.1109\/TSE.2002.1027797","volume":"28","author":"CS Collberg","year":"2000","unstructured":"Collberg CS, Thomborson C (2000) Watermarking, tamper-proofing, and obfuscation\u2014tools for software protection. Softw Eng IEEE Trans 28(8):735\u2013746","journal-title":"Softw Eng IEEE Trans"},{"issue":"6","key":"657_CR9","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/1286821.1286826","volume":"29","author":"CS Collberg","year":"2007","unstructured":"Collberg CS, Thomborson C, Townsend GM (2007) Dynamic graph-based software fingerprinting. ACM Trans Program Lang Syst 29(6):35","journal-title":"ACM Trans Program Lang Syst"},{"key":"657_CR10","doi-asserted-by":"crossref","unstructured":"Hamilton J, Danicic S (2011). A survey of static software watermarking. In: Internet security, pp 100\u2013107","DOI":"10.1109\/WorldCIS17046.2011.5749891"},{"key":"657_CR21","unstructured":"In: Proc of CIHW (2013) A software watermark database scheme based on ppct. 2004:1\u201312"},{"issue":"2\/3","key":"657_CR11","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1504\/IJGUC.2013.056253","volume":"4","author":"SKA Khalid","year":"2013","unstructured":"Khalid SKA, Deris MM, Mohamad KM (2013) Anti-cropping digital image watermarking using sudoku. Int J Grid Util Comput 4(2\/3):169\u2013177","journal-title":"Int J Grid Util Comput"},{"issue":"2","key":"657_CR12","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1504\/IJSSC.2016.077971","volume":"6","author":"H Kuzuno","year":"2016","unstructured":"Kuzuno H, Magata K (2016) Detecting and characterising of mobile advertisement network traffic using graph modelling: Comput Int J Space Based Situat 6(2):90","journal-title":"Comput Int J Space Based Situat"},{"key":"657_CR13","doi-asserted-by":"crossref","unstructured":"Kuzuno H, Tonami S (2013). Signature generation for sensitive information leakage in android applications. In: IEEE international conference on data engineering workshops, pp 112\u2013119","DOI":"10.1109\/ICDEW.2013.6547438"},{"issue":"4","key":"657_CR14","doi-asserted-by":"publisher","first-page":"294","DOI":"10.1504\/IJGUC.2016.081015","volume":"7","author":"Y Liu","year":"2016","unstructured":"Liu Y, Liu C, Zou H (2016) A new structure tensor based image inpainting algorithm. Int J Grid Util Comput 7(4):294\u2013303","journal-title":"Int J Grid Util Comput"},{"key":"657_CR15","unstructured":"Luo YX, Cheng JH, Fang DY (2008). Dynamic graph watermark algorithm based on the threshold scheme. In: International symposium on information science and engineering, pp 689\u2013693"},{"key":"657_CR16","doi-asserted-by":"crossref","unstructured":"Palsberg J, Krishnaswamy S, Kwon M, Ma D, Shao Q, Zhang Y (2000). Experience with software watermarking. In: Computer security applications, 2000. ACSAC \u201900. Conference, pp 308\u2013316","DOI":"10.1109\/ACSAC.2000.898885"},{"issue":"6","key":"657_CR17","doi-asserted-by":"publisher","first-page":"e0157752","DOI":"10.1371\/journal.pone.0157752","volume":"11","author":"W Ren","year":"2016","unstructured":"Ren W, Huang S, Ren Y, Raymond KK (2016a) Lipisc: a lightweight and flexible method for privacy-aware intersection set computation. Plos One 11(6):e0157752","journal-title":"Plos One"},{"key":"657_CR18","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.csi.2016.09.001","volume":"54","author":"W Ren","year":"2016","unstructured":"Ren W, Liu R, Lei M, Choo KKR (2016b) Segoac: a tree-based model for self-defined, proxy-enabled and group-oriented access control in mobile cloud computing. Comput Stand Interfaces 54:29\u201335","journal-title":"Comput Stand Interfaces"},{"issue":"2","key":"657_CR19","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1504\/IJGUC.2016.077491","volume":"7","author":"M Steinbauer","year":"2016","unstructured":"Steinbauer M, Kotsis GA (2016) Dynamograph: extending the pregel paradigm for large-scale temporal graph processing. Int J Grid Util Comput 7(2):141","journal-title":"Int J Grid Util Comput"},{"key":"657_CR20","unstructured":"Wang Y (2012). Improved ppct hybrid coding scheme. Computer Engineering & Applications"},{"key":"657_CR22","unstructured":"Xiong L, Xu Z, Shi Y.\u00a0Q (2017). An integer wavelet transform based scheme for reversible data hiding in encrypted images. Multidimens Syst Signal Process, pp 1\u201312"},{"key":"657_CR23","doi-asserted-by":"crossref","unstructured":"Zhang H, Chen D (2012). An improved dynamic graph watermark algorithm. In: Multimedia information networking and security, pp 568\u2013571","DOI":"10.1109\/MINES.2012.65"},{"key":"657_CR24","doi-asserted-by":"crossref","unstructured":"Zhang Y, Chen K (2014). Appmark: A picture-based watermark for android apps. In: Eighth international conference on software security and reliability, pp 58\u201367","DOI":"10.1109\/SERE.2014.19"},{"issue":"8","key":"657_CR25","doi-asserted-by":"publisher","first-page":"1417","DOI":"10.1134\/S000511791508007X","volume":"76","author":"LY Zhilyakova","year":"2015","unstructured":"Zhilyakova LY (2015) Dynamic graph models and their properties. Autom Remote Control 76(8):1417\u20131435","journal-title":"Autom Remote Control"},{"key":"657_CR26","unstructured":"Zhou W, Zhang X, Jiang X (2013). Appink:watermarking android apps for repackaging deterrence. pages 1\u201312"},{"issue":"1","key":"657_CR27","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/TIFS.2016.2601065","volume":"12","author":"Z Zhou","year":"2016","unstructured":"Zhou Z, Wang Y, Wu QMJ, Yang CN, Sun X (2016) Effective and efficient global context verification for image copy detection. IEEE Trans Inf Forensics Secur 12(1):48\u201363","journal-title":"IEEE Trans Inf Forensics Secur"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-017-0657-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-017-0657-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-017-0657-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,24]],"date-time":"2020-10-24T15:25:30Z","timestamp":1603553130000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-017-0657-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12,20]]},"references-count":27,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["657"],"URL":"https:\/\/doi.org\/10.1007\/s12652-017-0657-3","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,12,20]]},"assertion":[{"value":"9 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 December 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2017","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}