{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:48:04Z","timestamp":1729612084694,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/rcis.2017.7956526","type":"proceedings-article","created":{"date-parts":[[2017,6,26]],"date-time":"2017-06-26T20:35:56Z","timestamp":1498509356000},"page":"110-119","source":"Crossref","is-referenced-by-count":1,"title":["The dbMark: A benchmarking system for watermarking methods for relational databases"],"prefix":"10.1109","author":[{"given":"Stavros","family":"Kyriakopoulos","sequence":"first","affiliation":[]},{"given":"Theodoros","family":"Tzouramanis","sequence":"additional","affiliation":[]},{"given":"Yannis","family":"Manolopoulos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128832"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2005.06.003"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/947380.947398"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/TDSC.2005.12","article-title":"Fingerprinting Relational Databases: Schemes and Specialties","volume":"2","author":"li","year":"2005","journal-title":"IEEE Trans Dependable and Secure Computing"},{"key":"ref14","first-page":"783","article-title":"A Robust Watermarking Scheme for Relational Databases","author":"tzouramanis","year":"2011","journal-title":"Proceedings of the 6th IEEE International Conference on Internet Technology & Secured Transactions (ICITST)"},{"key":"ref15","first-page":"3164","article-title":"Watermarking Techniques for Relational Databases: Survey, Classification and Comparison","volume":"16","author":"halder","year":"2010","journal-title":"Journal of Universal Computer Science"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2001.958300"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45496-9_25"},{"key":"ref19","first-page":"4","article-title":"Benchmarking image watermarking algorithms with Open Watermark","author":"michiels","year":"2006","journal-title":"Proceedings of the 14th European Signal Processing Conference (EUSIPCO)"},{"journal-title":"University of California Irvine KDD Archive The Forest Cover Type Dataset","year":"2017","key":"ref28"},{"key":"ref4","first-page":"596","article-title":"Watermarking Maps: Hiding Information in Structured Data","author":"khanna","year":"2000","journal-title":"Proceedings of the ACM-SIAM Symposium on Discrete Algorithms (SODA)"},{"key":"ref27","first-page":"707","article-title":"Binary codes capable of correcting deletions, insertions, and reversals","volume":"10","author":"levenshtein","year":"1966","journal-title":"Soviet Physics Doklady"},{"key":"ref3","first-page":"93","article-title":"Non-invertible watermarking methods for MPEG video and audio","author":"nahrstedt","year":"1998","journal-title":"Proc ACM Workshop on Multimedia Security"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2004.1320029"},{"journal-title":"University of california machine learning repository","year":"2017","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50022-6"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/11681960_24"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.94"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1049\/cp:19950674","article-title":"watermarking digital images for copyright protection","author":"boland","year":"1995","journal-title":"Fifth International Conference on Image Processing and its Applications (Conf Publ No 410)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1029146.1029159"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2002.994695"},{"key":"ref20","first-page":"236","article-title":"The Watermark Evaluation Testbed (WET)","author":"cook kim","year":"2004","journal-title":"Proceedings Security Steganography and Watermarking of Multimedia Contents"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1117\/12.538691"},{"key":"ref21","volume":"243","author":"wang","year":"2015","journal-title":"OR-Benchmark An Open and Reconfigurable Digital Watermarking Benchmarking Framework"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MWSCAS.2010.5548906"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1117\/12.586797"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SMI.2010.33"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2557642.2557644"}],"event":{"name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","start":{"date-parts":[[2017,5,10]]},"location":"Brighton, United Kingdom","end":{"date-parts":[[2017,5,12]]}},"container-title":["2017 11th International Conference on Research Challenges in Information Science (RCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7951529\/7956506\/07956526.pdf?arnumber=7956526","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,27]],"date-time":"2019-09-27T03:48:41Z","timestamp":1569556121000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7956526\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/rcis.2017.7956526","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}