{"id":"https://openalex.org/W2652531797","doi":"https://doi.org/10.1109/rcis.2017.7956526","title":"The dbMark: A benchmarking system for watermarking methods for relational databases","display_name":"The dbMark: A benchmarking system for watermarking methods for relational databases","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2652531797","doi":"https://doi.org/10.1109/rcis.2017.7956526","mag":"2652531797"},"language":"en","primary_location":{"id":"doi:10.1109/rcis.2017.7956526","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rcis.2017.7956526","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010130643","display_name":"Stavros Kyriakopoulos","orcid":null},"institutions":[{"id":"https://openalex.org/I98805295","display_name":"University of the Aegean","ror":"https://ror.org/03zsp3p94","country_code":"GR","type":"education","lineage":["https://openalex.org/I98805295"]}],"countries":["GR"],"is_corresponding":true,"raw_author_name":"Stavros Kyriakopoulos","raw_affiliation_strings":["Department of Information and Communication Systems Engineering, University of the Aegean, Samos, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Systems Engineering, University of the Aegean, Samos, Greece","institution_ids":["https://openalex.org/I98805295"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5032211480","display_name":"Theodoros Tzouramanis","orcid":null},"institutions":[{"id":"https://openalex.org/I98805295","display_name":"University of the Aegean","ror":"https://ror.org/03zsp3p94","country_code":"GR","type":"education","lineage":["https://openalex.org/I98805295"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Theodoros Tzouramanis","raw_affiliation_strings":["Department of Information and Communication Systems Engineering, University of the Aegean, Samos, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Information and Communication Systems Engineering, University of the Aegean, Samos, Greece","institution_ids":["https://openalex.org/I98805295"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010058559","display_name":"Yannis Manolopoulos","orcid":"https://orcid.org/0000-0003-4026-4329"},"institutions":[{"id":"https://openalex.org/I21370196","display_name":"Aristotle University of Thessaloniki","ror":"https://ror.org/02j61yw88","country_code":"GR","type":"education","lineage":["https://openalex.org/I21370196"]}],"countries":["GR"],"is_corresponding":false,"raw_author_name":"Yannis Manolopoulos","raw_affiliation_strings":["Department of Informatics, Aristotle University of Thessaloniki, Thessaloniki, Greece"],"affiliations":[{"raw_affiliation_string":"Department of Informatics, Aristotle University of Thessaloniki, Thessaloniki, Greece","institution_ids":["https://openalex.org/I21370196"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5010130643"],"corresponding_institution_ids":["https://openalex.org/I98805295"],"apc_list":null,"apc_paid":null,"fwci":0.091,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.44216963,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"2","issue":null,"first_page":"110","last_page":"119"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-watermarking","display_name":"Digital watermarking","score":0.8983030319213867},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8090378046035767},{"id":"https://openalex.org/keywords/benchmarking","display_name":"Benchmarking","score":0.7438352704048157},{"id":"https://openalex.org/keywords/relational-database","display_name":"Relational database","score":0.6346105337142944},{"id":"https://openalex.org/keywords/watermark","display_name":"Watermark","score":0.5472138524055481},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.5354245901107788},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.45320063829421997},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.41785526275634766},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36735183000564575},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10179415345191956},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.09688699245452881},{"id":"https://openalex.org/keywords/image","display_name":"Image (mathematics)","score":0.07893919944763184}],"concepts":[{"id":"https://openalex.org/C150817343","wikidata":"https://www.wikidata.org/wiki/Q875932","display_name":"Digital watermarking","level":3,"score":0.8983030319213867},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8090378046035767},{"id":"https://openalex.org/C86251818","wikidata":"https://www.wikidata.org/wiki/Q816754","display_name":"Benchmarking","level":2,"score":0.7438352704048157},{"id":"https://openalex.org/C5655090","wikidata":"https://www.wikidata.org/wiki/Q192588","display_name":"Relational database","level":2,"score":0.6346105337142944},{"id":"https://openalex.org/C164112704","wikidata":"https://www.wikidata.org/wiki/Q7974348","display_name":"Watermark","level":3,"score":0.5472138524055481},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.5354245901107788},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.45320063829421997},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.41785526275634766},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36735183000564575},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10179415345191956},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.09688699245452881},{"id":"https://openalex.org/C115961682","wikidata":"https://www.wikidata.org/wiki/Q860623","display_name":"Image (mathematics)","level":2,"score":0.07893919944763184},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/rcis.2017.7956526","is_oa":false,"landing_page_url":"https://doi.org/10.1109/rcis.2017.7956526","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 11th International Conference on Research Challenges in Information Science (RCIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W1493698890","https://openalex.org/W1514337436","https://openalex.org/W1564479696","https://openalex.org/W1572630860","https://openalex.org/W1647671624","https://openalex.org/W1973369466","https://openalex.org/W1985322801","https://openalex.org/W1991875530","https://openalex.org/W2023892388","https://openalex.org/W2030779361","https://openalex.org/W2036999337","https://openalex.org/W2047158547","https://openalex.org/W2058000805","https://openalex.org/W2071994286","https://openalex.org/W2085767783","https://openalex.org/W2086383013","https://openalex.org/W2100913369","https://openalex.org/W2101303723","https://openalex.org/W2104476234","https://openalex.org/W2112839225","https://openalex.org/W2130329420","https://openalex.org/W2133531446","https://openalex.org/W2140774414","https://openalex.org/W2145419924","https://openalex.org/W2171027248","https://openalex.org/W2207000068","https://openalex.org/W3142177419","https://openalex.org/W4292143323","https://openalex.org/W6633935349","https://openalex.org/W6636915900","https://openalex.org/W6648295914","https://openalex.org/W6671708705","https://openalex.org/W6841830626"],"related_works":["https://openalex.org/W2137394636","https://openalex.org/W2358993821","https://openalex.org/W1516446231","https://openalex.org/W2098152888","https://openalex.org/W1559740347","https://openalex.org/W2040356834","https://openalex.org/W2080353903","https://openalex.org/W2385289568","https://openalex.org/W2381486749","https://openalex.org/W1514507288"],"abstract_inverted_index":{"Digital":[0,38],"technology":[1],"keeps":[2],"falling":[3],"prey":[4],"to":[5,100],"the":[6,10,30,41,62,72,75,89,95,106,132,154,161,181,188,192,205,209,215],"ease":[7],"with":[8],"which":[9,66],"unauthorized":[11],"reproduction":[12],"and":[13,46,86,109,125,151,173,204],"distribution":[14],"of":[15,25,32,43,64,78,83,91,112,134,138,144,156,163,175,195,208],"digital":[16,26,36],"objects":[17],"can":[18,183],"be":[19,184],"achieved.":[20],"Research":[21],"on":[22,51,61,214],"copyright":[23],"protection":[24],"data":[27,57],"must":[28],"counterbalance":[29],"failures":[31],"legal":[33],"measures":[34],"against":[35],"piracy.":[37],"watermarking":[39,53,93,113,146,166,196],"tops":[40],"list":[42],"technical":[44],"countermeasures":[45],"recent":[47],"research":[48,79],"has":[49,98,128],"focused":[50],"proposing":[52],"methods":[54,167,197],"for":[55,88,105,115,191,198],"relational":[56,116,199],"as":[58,60,187],"well":[59],"types":[63,174],"attacks":[65],"aim":[67],"at":[68],"removing":[69],"or":[70],"destroying":[71],"watermark.":[73],"With":[74],"database":[76,145],"field":[77],"in":[80],"urgent":[81],"need":[82],"developing":[84],"tools":[85],"platforms":[87],"benchmarking":[90,103],"these":[92],"methods,":[94],"present":[96],"work":[97],"undertaken":[99],"construct":[101],"a":[102,135,141],"system":[104],"automatic":[107],"evaluation":[108,194],"fair":[110],"comparison":[111],"schemes":[114],"data.":[117,200],"The":[118,201],"new":[119],"software":[120],"tool":[121],"is":[122],"called":[123],"dbMark":[124,182,210],"its":[126],"construction":[127],"taken":[129],"into":[130,169],"consideration":[131,170],"characteristics":[133],"large":[136],"set":[137],"parameters":[139,172],"across":[140],"wide":[142],"range":[143],"applications.":[147],"This":[148],"article":[149],"presents":[150],"comments":[152],"upon":[153],"results":[155],"several":[157,171],"experiments":[158],"that":[159,180],"evaluate":[160],"performance":[162],"three":[164],"different":[165],"taking":[168],"attacks.":[176],"There":[177],"are":[178,211],"indications":[179],"used":[185],"effectively":[186],"primary":[189],"platform":[190],"experimental":[193],"source":[202],"code":[203],"executable":[206],"file":[207],"provided":[212],"free-of-charge":[213],"Web.":[216]},"counts_by_year":[{"year":2020,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
