A blind reversible method for watermarking relational databases based on a time-stamping protocol

被引:49
作者
Farfoura, Mahmoud E. [1 ]
Horng, Shi-Jinn [1 ]
Lai, Jui-Lin [2 ]
Run, Ray-Shine [2 ]
Chen, Rong-Jian [2 ]
Khan, Muhammad Khurram [3 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei 106, Taiwan
[2] Natl United Univ, Dept Elect Engn, Miaoli 36003, Taiwan
[3] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11451, Saudi Arabia
关键词
Relational database; Digital watermarking; Copyrights; Blindness; Robustness; Database attacks; Reversible; Cryptography; PROTECTION; OWNERSHIP;
D O I
10.1016/j.eswa.2011.09.005
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Digital watermarking technology has been adopted lately as an effective solution to protecting the copyright of digital assets from illicit copying. Reversible watermark, which is also called invertible watermark, or erasable watermark, helps to recover back the original data after the content has been authenticated. Such reversibility is highly desired in some sensitive database applications, e.g. in military and medical data. Permanent distortion is one of the main drawbacks of the entire irreversible relational database watermarking schemes. In this paper, we design an authentication protocol based on an efficient time-stamp protocol, and we propose a blind reversible watermarking method that ensures ownership protection in the field of relational database watermarking. Whereas previous techniques have been mainly concerned with introducing permanent errors into the original data, our approach ensures one hundred percent recovery of the original database relation after the owner-specific watermark has been detected and authenticated. In the proposed watermarking method, we utilize a reversible data-embedding technique called prediction-error expansion on integers to achieve reversibility. The detection of the watermark can be completed successfully even when 95% of a watermarked relation tuples are deleted. Our extensive analysis shows that the proposed scheme is robust against various forms of database attacks, including adding, deleting, shuffling or modifying tuples or attributes. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:3185 / 3196
页数:12
相关论文
共 30 条
[1]  
Agrawal R., 2002, Proceedings of the Twenty-eighth International Conference on Very Large Data Bases, P155
[2]   Reversible watermark using the difference expansion of a generalized integer transform [J].
Alattar, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2004, 13 (08) :1147-1156
[3]  
[Anonymous], 2000, IEEE 1363 2000
[4]  
[Anonymous], 2459 RFC
[5]  
Arnold M, 2000, 2000 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO, PROCEEDINGS VOLS I-III, P1013, DOI 10.1109/ICME.2000.871531
[6]  
Atallah MJ, 2003, LECT NOTES COMPUT SC, V2578, P196
[7]   Copyright protection for the electronic distribution of text documents [J].
Brassil, JT ;
Low, S ;
Maxemchuk, NF .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1181-1196
[8]   Lossless generalized-LSB data embedding [J].
Celik, MU ;
Sharma, G ;
Tekalp, AM ;
Saber, E .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (02) :253-266
[9]  
CHOU JS, 2007, CRYPTANALYSIS HWANGC
[10]   Watermarking, tamper-proofing, and obfuscation - Tools for software protection [J].
Collberg, CS ;
Thomborson, C .
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING, 2002, 28 (08) :735-746