{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T00:47:37Z","timestamp":1773449257415,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T00:00:00Z","timestamp":1691107200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,8,6]]},"DOI":"10.1145\/3580305.3599876","type":"proceedings-article","created":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T18:10:58Z","timestamp":1691172658000},"page":"4756-4767","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["NFT-Based Data Marketplace with Digital Watermarking"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8772-5770","authenticated-orcid":false,"given":"Saeed","family":"Ranjbar Alvar","sequence":"first","affiliation":[{"name":"Huawei Technologies Canada Co., Ltd., Vancouver, BC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5663-3101","authenticated-orcid":false,"given":"Mohammad","family":"Akbari","sequence":"additional","affiliation":[{"name":"Huawei Technologies Canada Co., Ltd., Vancouver, BC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8271-348X","authenticated-orcid":false,"given":"David (Ming Xuan)","family":"Yue","sequence":"additional","affiliation":[{"name":"Huawei Technologies Canada Co., Ltd., Vancouver, BC, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0238-0719","authenticated-orcid":false,"given":"Yong","family":"Zhang","sequence":"additional","affiliation":[{"name":"Huawei Technologies Canada Co., Ltd., Vancouver, BC, Canada"}]}],"member":"320","published-online":{"date-parts":[[2023,8,4]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SAPIENCE.2016.7684124"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSVT.2017.2712162"},{"key":"e_1_3_2_2_3_1","unstructured":"AWS. 2023. What is AWS Data Exchange? https:\/\/docs.aws.amazon.com\/data-exchange\/latest\/userguide\/what-is.html Access on 30\/01\/23.  AWS. 2023. What is AWS Data Exchange? https:\/\/docs.aws.amazon.com\/data-exchange\/latest\/userguide\/what-is.html Access on 30\/01\/23."},{"key":"e_1_3_2_2_4_1","unstructured":"Azuki.com. 2022. ERC721A. https:\/\/www.erc721a.org\/  Azuki.com. 2022. ERC721A. https:\/\/www.erc721a.org\/"},{"key":"e_1_3_2_2_5_1","first-page":"2","volume-title":"Ipfs-content addressed, versioned","author":"Benet Juan","year":"2014","unstructured":"Juan Benet . 2014. Ipfs-content addressed, versioned , p 2 p file system. arXiv preprint arXiv:1407.3561, Vol. abs\/ 1407 .3561 ( 2014 ), 1--14. Juan Benet. 2014. Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561, Vol. abs\/1407.3561 (2014), 1--14."},{"key":"e_1_3_2_2_6_1","unstructured":"Huawei Cloud. 2023. Huawei AI Gallery. https:\/\/developer.huaweicloud.com\/develop\/aigallery\/dataset\/list Access on 30\/01\/23.  Huawei Cloud. 2023. Huawei AI Gallery. https:\/\/developer.huaweicloud.com\/develop\/aigallery\/dataset\/list Access on 30\/01\/23."},{"key":"#cr-split#-e_1_3_2_2_7_1.1","doi-asserted-by":"crossref","unstructured":"Quynh Dang. 2015. Secure Hash Standard. https:\/\/doi.org\/10.6028\/NIST.FIPS.180--4 10.6028\/NIST.FIPS.180--4","DOI":"10.6028\/NIST.FIPS.180-4"},{"key":"#cr-split#-e_1_3_2_2_7_1.2","doi-asserted-by":"crossref","unstructured":"Quynh Dang. 2015. Secure Hash Standard. https:\/\/doi.org\/10.6028\/NIST.FIPS.180--4","DOI":"10.6028\/NIST.FIPS.180-4"},{"key":"e_1_3_2_2_8_1","volume-title":"Introduction to cryptography","author":"Delfs Hans","unstructured":"Hans Delfs , Helmut Knebl , and Helmut Knebl . 2002. Introduction to cryptography . Vol. 2 . Springer . Hans Delfs, Helmut Knebl, and Helmut Knebl. 2002. Introduction to cryptography. Vol. 2. Springer."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2009.5206848"},{"key":"e_1_3_2_2_10_1","unstructured":"ethereum.org. 2022. A python interface for interacting with the Ethereum blockchain and ecosystem. https:\/\/github.com\/ethereum\/web3.py  ethereum.org. 2022. A python interface for interacting with the Ethereum blockchain and ecosystem. https:\/\/github.com\/ethereum\/web3.py"},{"key":"e_1_3_2_2_11_1","volume-title":"Watermarking Images in Self-Supervised Latent Spaces. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE","author":"Fernandez Pierre","year":"2022","unstructured":"Pierre Fernandez , Alexandre Sablayrolles , Teddy Furon , Herv\u00e9 J\u00e9gou , and Matthijs Douze . 2022 . Watermarking Images in Self-Supervised Latent Spaces. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE , Singapore, 3054--3058. Pierre Fernandez, Alexandre Sablayrolles, Teddy Furon, Herv\u00e9 J\u00e9gou, and Matthijs Douze. 2022. Watermarking Images in Self-Supervised Latent Spaces. In IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, Singapore, 3054--3058."},{"key":"e_1_3_2_2_12_1","volume-title":"Ocean Protocol: Tools for the Web3 Data Economy. https:\/\/oceanprotocol.com\/tech-whitepaper.pdf, Access on 30\/01\/23.","author":"Foundation Ocean Protocol","year":"2022","unstructured":"Ocean Protocol Foundation . 2022 . Ocean Protocol: Tools for the Web3 Data Economy. https:\/\/oceanprotocol.com\/tech-whitepaper.pdf, Access on 30\/01\/23. Ocean Protocol Foundation. 2022. Ocean Protocol: Tools for the Web3 Data Economy. https:\/\/oceanprotocol.com\/tech-whitepaper.pdf, Access on 30\/01\/23."},{"key":"e_1_3_2_2_13_1","first-page":"454","article-title":"Denial of service attacks. Handbook of Computer Networks: Distributed Networks, Network Planning","volume":"3","author":"Gu Qijun","year":"2007","unstructured":"Qijun Gu and Peng Liu . 2007 . Denial of service attacks. Handbook of Computer Networks: Distributed Networks, Network Planning , Control, Management, and New Trends and Applications , Vol. 3 (2007), 454 -- 468 . Qijun Gu and Peng Liu. 2007. Denial of service attacks. Handbook of Computer Networks: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications, Vol. 3 (2007), 454--468.","journal-title":"Control, Management, and New Trends and Applications"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103389"},{"key":"e_1_3_2_2_15_1","first-page":"3164","article-title":"Watermarking Techniques for Relational Databases: Survey, Classification and Comparison","volume":"16","author":"Halder Raju","year":"2010","unstructured":"Raju Halder , Shantanu Pal , and Agostino Cortesi . 2010 . Watermarking Techniques for Relational Databases: Survey, Classification and Comparison . J. Univers. Comput. Sci. , Vol. 16 , 21 (2010), 3164 -- 3190 . Raju Halder, Shantanu Pal, and Agostino Cortesi. 2010. Watermarking Techniques for Relational Databases: Survey, Classification and Comparison. J. Univers. Comput. Sci., Vol. 16, 21 (2010), 3164--3190.","journal-title":"J. Univers. Comput. Sci."},{"key":"e_1_3_2_2_16_1","volume-title":"Error detecting and error correcting codes. The Bell system technical journal","author":"Hamming Richard W","year":"1950","unstructured":"Richard W Hamming . 1950. Error detecting and error correcting codes. The Bell system technical journal , Vol. 29 , 2 ( 1950 ), 147--160. Richard W Hamming. 1950. Error detecting and error correcting codes. The Bell system technical journal, Vol. 29, 2 (1950), 147--160."},{"key":"e_1_3_2_2_17_1","unstructured":"Hardhat.org. 2022. Ethereum development environment for professionals by Nomic Foundation. https:\/\/hardhat.org\/  Hardhat.org. 2022. Ethereum development environment for professionals by Nomic Foundation. https:\/\/hardhat.org\/"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_2_19_1","unstructured":"Charles Hoskinson. 2017. Why we are building Cardano. https:\/\/iohk.io\/en\/blog\/posts\/2017\/07\/10\/why-we-are-building-cardano\/  Charles Hoskinson. 2017. Why we are building Cardano. https:\/\/iohk.io\/en\/blog\/posts\/2017\/07\/10\/why-we-are-building-cardano\/"},{"key":"e_1_3_2_2_20_1","unstructured":"Itheum.io. 2022. Itheum WhitePaper. https:\/\/dev.to\/itheum\/itheum-data-dex-whitepaper-ooo  Itheum.io. 2022. Itheum WhitePaper. https:\/\/dev.to\/itheum\/itheum-data-dex-whitepaper-ooo"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2796585"},{"key":"e_1_3_2_2_23_1","unstructured":"Jaynti Kanani Sandeep Nailwal and Anurag Arjun. 2021. Matic whitepaper. https:\/\/github.com\/maticnetwork\/whitepaper  Jaynti Kanani Sandeep Nailwal and Anurag Arjun. 2021. Matic whitepaper. https:\/\/github.com\/maticnetwork\/whitepaper"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICT.2015.7045676"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCNT.2018.8494045"},{"key":"e_1_3_2_2_27_1","unstructured":"OpenZeppelin.com. 2022. Access Control. https:\/\/docs.openzeppelin.com\/contracts\/2.x\/access-control  OpenZeppelin.com. 2022. Access Control. https:\/\/docs.openzeppelin.com\/contracts\/2.x\/access-control"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12599-020-00677-6"},{"key":"e_1_3_2_2_29_1","volume-title":"Mehmet Doug an, and Arda Yurdakul","author":"\u00d6zyilmaz Kazim Rifat","year":"2018","unstructured":"Kazim Rifat \u00d6zyilmaz , Mehmet Doug an, and Arda Yurdakul . 2018 . IDMoB: Io T data marketplace on blockchain. In 2018 crypto valley conference on blockchain technology (CVCBT). IEEE, Zug, Switzerland , 11--19. Kazim Rifat \u00d6zyilmaz, Mehmet Doug an, and Arda Yurdakul. 2018. IDMoB: IoT data marketplace on blockchain. In 2018 crypto valley conference on blockchain technology (CVCBT). IEEE, Zug, Switzerland, 11--19."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISC2.2018.8656952"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2022.118085"},{"key":"e_1_3_2_2_32_1","first-page":"1","article-title":"General data protection regulation","volume":"25","author":"Regulation Protection","year":"2018","unstructured":"Protection Regulation . 2018 . General data protection regulation . Intouch , Vol. 25 (2018), 1 -- 5 . Protection Regulation. 2018. General data protection regulation. Intouch, Vol. 25 (2018), 1--5.","journal-title":"Intouch"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1080\/24751839.2020.1819634"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-3380-8_7"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.apacoust.2020.107652"},{"key":"e_1_3_2_2_36_1","volume-title":"Easton Wong, and Abbas Yazdinejad.","author":"Sheridan Dan","year":"2022","unstructured":"Dan Sheridan , James Harris , Frank Wear , Jerry Cowell Jr , Easton Wong, and Abbas Yazdinejad. 2022 . Web3 Challenges and Opportunities for the Market . arXiv preprint arXiv:2209.02446, Vol. abs\/ 2209 .02446 (2022), 1--7. Dan Sheridan, James Harris, Frank Wear, Jerry Cowell Jr, Easton Wong, and Abbas Yazdinejad. 2022. Web3 Challenges and Opportunities for the Market. arXiv preprint arXiv:2209.02446, Vol. abs\/2209.02446 (2022), 1--7."},{"key":"e_1_3_2_2_37_1","unstructured":"Snowflake. 2023. Snowflake Marketplace. https:\/\/www.snowflake.com\/en\/data-cloud\/marketplace\/ Access on 30\/01\/23.  Snowflake. 2023. Snowflake Marketplace. https:\/\/www.snowflake.com\/en\/data-cloud\/marketplace\/ Access on 30\/01\/23."},{"key":"e_1_3_2_2_38_1","unstructured":"Viktor Tr\u00f3n Aron Fischer D\u00e1niel A Nagy Zsolt Felf\u00f6ldi and Nick Johnson. 2016. Swap swear and swindle: incentive system for swarm.  Viktor Tr\u00f3n Aron Fischer D\u00e1niel A Nagy Zsolt Felf\u00f6ldi and Nick Johnson. 2016. Swap swear and swindle: incentive system for swarm."},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2022.02.083"},{"key":"e_1_3_2_2_40_1","volume-title":"Non-fungible token (NFT): Overview, evaluation, opportunities and challenges. CoRR","author":"Wang Qin","year":"2021","unstructured":"Qin Wang , Rujia Li , Qi Wang , and Shiping Chen . 2021. Non-fungible token (NFT): Overview, evaluation, opportunities and challenges. CoRR , Vol. abs\/ 2105 .07447 ( 2021 ), 1--22. Qin Wang, Rujia Li, Qi Wang, and Shiping Chen. 2021. Non-fungible token (NFT): Overview, evaluation, opportunities and challenges. CoRR, Vol. abs\/2105.07447 (2021), 1--22."},{"key":"e_1_3_2_2_41_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger.","author":"Wood Gavin","year":"2014","unstructured":"Gavin Wood . 2014 . Ethereum: A secure decentralised generalised transaction ledger. Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger."},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2018.2864748"}],"event":{"name":"KDD '23: The 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Long Beach CA USA","acronym":"KDD '23","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599876","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3580305.3599876","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:24Z","timestamp":1750182564000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3580305.3599876"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,4]]},"references-count":42,"alternative-id":["10.1145\/3580305.3599876","10.1145\/3580305"],"URL":"https:\/\/doi.org\/10.1145\/3580305.3599876","relation":{},"subject":[],"published":{"date-parts":[[2023,8,4]]},"assertion":[{"value":"2023-08-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}