Fragile database watermarking for malicious tamper detection using support vector regression

被引:0
作者
Tsai, Meng-Hsiun [1 ]
Hsu, Fang-Yu [2 ]
Chang, Jun-Dong [4 ]
Wu, Hsien-Chu [3 ]
机构
[1] Natl Chung Hsing Univ, Dept Management Informat Syst, 250 Kuokang Rd, Taichung 402, Taiwan
[2] Natl Taichung Inst Tech, Graduate Sch Comp Sci & Inform, Taichung, Taiwan
[3] Natl Taichung Inst Tech, Dept Comp Sci & Informat Engn, Taichung, Taiwan
[4] Natl Chung Cheng Univ, Dept Comp Sci, Chiayi 621, Taiwan
来源
2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS | 2007年
关键词
database watermarking; fragile watermarking; tamper detection; ownership verification; support vector regression; machine learning;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
This paper presents a digital watermarking technology for guaranteeing the database integrity. The proposed scheme based on the fragile watermarking technique, exploits trained support vector regression (SVR) predicting function to distribute the digital watermark over the particular numeric attributes to achieve embedding and detecting watermark by the same SVR predicting function. If the absolute value of the difference between predicted value and attribute value is more than the designed fixed value, like one, then the database content will be tampered with.
引用
收藏
页码:493 / +
页数:2
相关论文
共 15 条
  • [1] Agrawal R., 2002, Proceedings of the Twenty-eighth International Conference on Very Large Data Bases, P155
  • [2] LIBSVM: A Library for Support Vector Machines
    Chang, Chih-Chung
    Lin, Chih-Jen
    [J]. ACM TRANSACTIONS ON INTELLIGENT SYSTEMS AND TECHNOLOGY, 2011, 2 (03)
  • [3] Cherkassky V, 1997, IEEE Trans Neural Netw, V8, P1564, DOI 10.1109/TNN.1997.641482
  • [4] A DATABASE ENCRYPTION SYSTEM WITH SUBKEYS
    DAVIDA, GI
    WELLS, DL
    KAM, JB
    [J]. ACM TRANSACTIONS ON DATABASE SYSTEMS, 1981, 6 (02): : 312 - 328
  • [5] The use of multiple measurements in taxonomic problems
    Fisher, RA
    [J]. ANNALS OF EUGENICS, 1936, 7 : 179 - 188
  • [6] A fragile watermarking scheme for detecting malicious modifications of database relations
    Guo, HP
    Li, YJ
    Liu, AY
    Jajodia, S
    [J]. INFORMATION SCIENCES, 2006, 176 (10) : 1350 - 1378
  • [7] Multilevel secure database encryption with subkeys
    Hwang, MS
    Yang, WP
    [J]. DATA & KNOWLEDGE ENGINEERING, 1997, 22 (02) : 117 - 131
  • [8] LI H, 2004, P 4 ACM WORKSH DIG R, P73
  • [9] A novel image watermarking scheme based on support vector regression
    Shen, RM
    Fu, YG
    Lu, HT
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2005, 78 (01) : 1 - 8
  • [10] Rights protection for categorical data
    Sion, R
    Atallah, M
    Prabhakar, S
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2005, 17 (07) : 912 - 926