Digital Watermarking Scheme for Securing Textual Database Using Histogram Shifting Model

被引:1
作者
El Drandaly, Khalid A. [1 ]
Khedr, Walid [1 ]
Mohamed, Islam S. [1 ]
Mostafa, Ayman Mohamed [2 ]
机构
[1] Zagazig Univ, Fac Comp & Informat, Zagazig 44519, Egypt
[2] Jouf Univ, Coll Comp & Informat Sci, Sakaka 72314, Saudi Arabia
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2022年 / 71卷 / 03期
关键词
Information security; digital watermarking; information hiding; histogram shifting technique; REVERSIBLE IMAGE WATERMARKING; ROBUST;
D O I
10.32604/cmc.2022.023684
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Information security is one of the most important methods of protecting the confidentiality and privacy of internet users. The greater the volume of data, the more the need to increase the security methods for protecting data from intruders. This task can be challenging for researchers in terms of managing enormous data and maintaining their safety and effectiveness. Protection of digital content is a major issue in maintaining the privacy and secrecy of data. Toward this end, digital watermarking is based on the concept of information security through the insertion and detection of an embedded watermark in an efficient manner. Recent methodologies in the research on digital watermarking result in data distortion after embedding the watermark. This scenario can reduce the efficiency of detecting watermarks as well as violate data confidentiality. This study adapts a robust reversible histogram shifting (HS) technique for textual data in relational databases. Furthermore, the study presents a digital watermarking scheme intended for document copyright protection and proof of ownership. The major advantage of the proposed watermarking scheme is that it can protect digital data and preserve data quality. To the best of our knowledge, this research methodology is promising for use in the HS expansion model for watermarking data on nonnumeric databases. In addition, the results showed that despite exposing the database to an insertion attacks at 50% and 75% of the watermark, the proposed algorithm can recover more than half of the embedded watermark in all addition and alteration attacks cases. As a result, the watermark information can be retained and restored completely.
引用
收藏
页码:5253 / 5270
页数:18
相关论文
共 36 条
  • [1] Agrawal R., 2002, Proceedings of the Twenty-eighth International Conference on Very Large Data Bases, P155
  • [2] Ahmed R. A., 2015, 5 INT C COMM SYST NE
  • [3] Al-Haj Ali, 2008, Journal of Computer Sciences, V4, P1024, DOI 10.3844/jcssp.2008.1024.1029
  • [4] A Novel Database Watermarking Technique Using Blockchain as Trusted Third Party
    Alghamdi, Ahmed S.
    Naz, Surayya
    Saeed, Ammar
    Al Solami, Eesa
    Kamran, Muhammad
    Alkatheiri, Mohammed Saeed
    [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (01): : 1585 - 1601
  • [5] [Anonymous], 2011, INT J COMPUTER APPL
  • [6] Bhattacharya S, 2009, ICSOFT 2009: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE AND DATA TECHNOLOGIES, VOL 2, P229
  • [7] Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud
    Deng, Hua
    Qin, Zheng
    Wu, Qianhong
    Guan, Zhenyu
    Deng, Robert H.
    Wang, Yujue
    Zhou, Yunya
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3168 - 3180
  • [8] Drandaly K. E., 2020, Int. J. Adv. Sci. Tech., V29, P870
  • [9] Databases Traceability by Means of Watermarking with Optimized Detection
    Franco-Contreras, Javier
    Coatrieux, Gouenou
    [J]. DIGITAL FORENSICS AND WATERMARKING, IWDW 2016, 2017, 10082 : 343 - 357
  • [10] Lossless Data Embedding Using Generalized Statistical Quantity Histogram
    Gao, Xinbo
    An, Lingling
    Yuan, Yuan
    Tao, Dacheng
    Li, Xuelong
    [J]. IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, 2011, 21 (08) : 1061 - 1070