{"id":"https://openalex.org/W4401751453","doi":"https://doi.org/10.1109/icccn61486.2024.10637516","title":"A Distortion Free Watermark Scheme for Relational Databases","display_name":"A Distortion Free Watermark Scheme for Relational Databases","publication_year":2024,"publication_date":"2024-07-29","ids":{"openalex":"https://openalex.org/W4401751453","doi":"https://doi.org/10.1109/icccn61486.2024.10637516"},"language":"en","primary_location":{"id":"doi:10.1109/icccn61486.2024.10637516","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccn61486.2024.10637516","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 33rd International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5029522691","display_name":"Han Jiang","orcid":"https://orcid.org/0000-0002-4278-6617"},"institutions":[{"id":"https://openalex.org/I4210165038","display_name":"University of Chinese Academy of Sciences","ror":"https://ror.org/05qbk4x57","country_code":"CN","type":"education","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210165038"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jiang Han","raw_affiliation_strings":["University of Chinese Academy of Sciences,Beijing,China"],"affiliations":[{"raw_affiliation_string":"University of Chinese Academy of Sciences,Beijing,China","institution_ids":["https://openalex.org/I4210165038"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069202427","display_name":"Xiaowei Peng","orcid":"https://orcid.org/0009-0000-2234-4435"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaowei Peng","raw_affiliation_strings":["Cryptography and Cyberspace Security (Whampoa) Academy,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Cryptography and Cyberspace Security (Whampoa) Academy,Guangzhou,China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5074238461","display_name":"Hequn Xian","orcid":"https://orcid.org/0000-0002-7538-338X"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hequn Xian","raw_affiliation_strings":["Cryptography and Cyberspace Security (Whampoa) Academy,Guangzhou,China"],"affiliations":[{"raw_affiliation_string":"Cryptography and Cyberspace Security (Whampoa) Academy,Guangzhou,China","institution_ids":["https://openalex.org/I4210132990"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5028668157","display_name":"Dalin Yang","orcid":"https://orcid.org/0000-0002-5730-0173"},"institutions":[{"id":"https://openalex.org/I204465549","display_name":"Washington University in St. Louis","ror":"https://ror.org/01yc7t268","country_code":"US","type":"education","lineage":["https://openalex.org/I204465549"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dalin Yang","raw_affiliation_strings":["Washington University,School of Medicine,Missouri,USA"],"affiliations":[{"raw_affiliation_string":"Washington University,School of Medicine,Missouri,USA","institution_ids":["https://openalex.org/I204465549"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5029522691"],"corresponding_institution_ids":["https://openalex.org/I4210165038"],"apc_list":null,"apc_paid":null,"fwci":0.5002,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.64279861,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11017","display_name":"Chaos-based Image/Signal Encryption","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.8007309436798096},{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.7354394197463989},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7290910482406616},{"id":"https://openalex.org/keywords/distortion","display_name":"Distortion (music)","score":0.7069925665855408},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.695749044418335},{"id":"https://openalex.org/keywords/relational-database","display_name":"Relational database","score":0.627623438835144},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.4584723114967346},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.37402409315109253},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.2809320390224457},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.15681591629981995},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.11559262871742249},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.07245957851409912}],"concepts":[{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.8007309436798096},{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.7354394197463989},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7290910482406616},{"id":"https://openalex.org/C126780896","wikidata":"https://www.wikidata.org/wiki/Q899871","display_name":"Distortion (music)","level":4,"score":0.7069925665855408},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.695749044418335},{"id":"https://openalex.org/C5655090","wikidata":"https://www.wikidata.org/wiki/Q192588","display_name":"Relational database","level":2,"score":0.627623438835144},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4584723114967346},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.37402409315109253},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.2809320390224457},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.15681591629981995},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.11559262871742249},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.07245957851409912},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C194257627","wikidata":"https://www.wikidata.org/wiki/Q211554","display_name":"Amplifier","level":3,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icccn61486.2024.10637516","is_oa":false,"landing_page_url":"http://dx.doi.org/10.1109/icccn61486.2024.10637516","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2024 33rd International Conference on Computer Communications and Networks (ICCCN)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Clean water and sanitation","score":0.5099999904632568,"id":"https://metadata.un.org/sdg/6"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W116060691","https://openalex.org/W1984366684","https://openalex.org/W1997993208","https://openalex.org/W2118375353","https://openalex.org/W2122014146","https://openalex.org/W2132843320","https://openalex.org/W2133531446","https://openalex.org/W2136078037","https://openalex.org/W2363201481","https://openalex.org/W2630691128","https://openalex.org/W2811275528","https://openalex.org/W2888578066","https://openalex.org/W2944611130","https://openalex.org/W3027885840","https://openalex.org/W4206236643","https://openalex.org/W4376623164","https://openalex.org/W6604723073"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288"],"abstract_inverted_index":{"Database":[0],"watermark":[1,28,51,61,74,86,90,95,102,150],"is":[2,14,36,53,64,81,104,144],"an":[3],"effective":[4],"solution":[5],"to":[6,38,66,76],"the":[7,17,26,70,73,85,89,94,98,120,128,141],"piracy":[8],"and":[9,126],"data":[10,43,50,57,71,122,129],"leakage":[11],"problems.":[12],"It":[13],"recognized":[15],"as":[16],"final":[18],"defense":[19],"line":[20],"in":[21,69,123],"zero-trust":[22],"architecture.":[23],"Most":[24],"of":[25,113],"traditional":[27,134,148],"schemes":[29],"are":[30],"based":[31],"on":[32],"carrier":[33],"modification,":[34],"which":[35,55,80],"difficult":[37],"achieve":[39],"robustness":[40],"while":[41],"maintaining":[42],"quality.":[44,58],"A":[45],"new":[46],"distortion":[47,130],"free":[48],"relational":[49],"scheme":[52,143],"proposed,":[54],"guarantees":[56],"Firstly,":[59],"a":[60],"encoding":[62,108],"algorithm":[63,92],"applied":[65],"combine":[67],"bits":[68],"with":[72,133],"information":[75,96],"generate":[77],"auxiliary":[78,99],"data,":[79],"then":[82],"stored.":[83],"In":[84],"extraction":[87],"stage,":[88],"decoding":[91],"extracts":[93],"from":[97],"data.":[100],"The":[101,136],"capacity":[103],"greatly":[105],"increased":[106],"by":[107],"at":[109],"least":[110],"one":[111],"attribute":[112],"each":[114],"tuple.":[115],"This":[116],"does":[117],"not":[118],"modify":[119],"original":[121],"any":[124],"way":[125],"avoids":[127],"problems":[131],"associated":[132],"schemes.":[135,151],"experimental":[137],"results":[138],"show":[139],"that":[140],"proposed":[142],"more":[145],"robust":[146,149],"than":[147]},"counts_by_year":[{"year":2026,"cited_by_count":2}],"updated_date":"2026-03-25T13:04:00.132906","created_date":"2025-10-10T00:00:00"}
