A blind reversible method for watermarking relational databases based on a time-stamping protocol

被引:49
作者
Farfoura, Mahmoud E. [1 ]
Horng, Shi-Jinn [1 ]
Lai, Jui-Lin [2 ]
Run, Ray-Shine [2 ]
Chen, Rong-Jian [2 ]
Khan, Muhammad Khurram [3 ]
机构
[1] Natl Taiwan Univ Sci & Technol, Dept Comp Sci & Informat Engn, Taipei 106, Taiwan
[2] Natl United Univ, Dept Elect Engn, Miaoli 36003, Taiwan
[3] King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11451, Saudi Arabia
关键词
Relational database; Digital watermarking; Copyrights; Blindness; Robustness; Database attacks; Reversible; Cryptography; PROTECTION; OWNERSHIP;
D O I
10.1016/j.eswa.2011.09.005
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Digital watermarking technology has been adopted lately as an effective solution to protecting the copyright of digital assets from illicit copying. Reversible watermark, which is also called invertible watermark, or erasable watermark, helps to recover back the original data after the content has been authenticated. Such reversibility is highly desired in some sensitive database applications, e.g. in military and medical data. Permanent distortion is one of the main drawbacks of the entire irreversible relational database watermarking schemes. In this paper, we design an authentication protocol based on an efficient time-stamp protocol, and we propose a blind reversible watermarking method that ensures ownership protection in the field of relational database watermarking. Whereas previous techniques have been mainly concerned with introducing permanent errors into the original data, our approach ensures one hundred percent recovery of the original database relation after the owner-specific watermark has been detected and authenticated. In the proposed watermarking method, we utilize a reversible data-embedding technique called prediction-error expansion on integers to achieve reversibility. The detection of the watermark can be completed successfully even when 95% of a watermarked relation tuples are deleted. Our extensive analysis shows that the proposed scheme is robust against various forms of database attacks, including adding, deleting, shuffling or modifying tuples or attributes. (C) 2011 Elsevier Ltd. All rights reserved.
引用
收藏
页码:3185 / 3196
页数:12
相关论文
共 30 条
[21]  
Li Yingjiu., 2003, P 3 ACM WORKSHOP DIG, P133
[22]   Information hiding - A survey [J].
Petitcolas, FAP ;
Anderson, RJ ;
Kuhn, MG .
PROCEEDINGS OF THE IEEE, 1999, 87 (07) :1062-1078
[23]  
Schneier B., 2015, APPL CRYPTOGRAPHY, VSecond
[24]   Watermarking relational Databases using optimization-based techniques [J].
Shehab, Mohamed ;
Bertino, Elisa ;
Ghafoor, Arif .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2008, 20 (01) :116-129
[25]   Proving ownership over categorical data [J].
Sion, R .
20TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING, PROCEEDINGS, 2004, :584-595
[26]   Rights protection for relational data [J].
Sion, R ;
Atallah, M ;
Prabhakar, S .
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (12) :1509-1525
[27]  
Sion R., 2004, VLDB, P732
[28]  
Thodi DM, 2004, IEEE IMAGE PROC, P1549
[29]   Reversible data embedding using a difference expansion [J].
Tian, J .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2003, 13 (08) :890-896
[30]  
Wong PW, 2001, IEEE T IMAGE PROCESS, V10, P1593, DOI 10.1109/83.951543