
 
(1) Security. The scheme of database 
watermarking shoul
d be secure, the search space of 
pri
d not be perceived, 
an
mmon attacks towards it, such as subset 
ex
rmark detection, and the copyright is 
ju
watermarking scheme, 
si
, which is applied to protect 
th
 surveys the related research of 
w
vacy key should be large enough, and the 
management mechanism for privacy keys should be 
reliable. Generally, the watermarking algorithm is 
public, and the security of the system mainly 
depends on the privacy key. 
(2) Imperceptibility. As for the legal users of the 
database, the watermark shoul
d should not influence the availability of the 
database. 
(3) Robustness. The watermark of database should 
tolerate co
tracting attack, subset modification attack, subset 
addition attack, and so on. The watermark should be 
hard to be erased or be forged, and the probability of 
false positive and false negative decision should be 
small enough. 
(4) Blind detection. No original database is needed 
during the wate
dged only requiring the privacy key of the 
watermarking algorithm. 
In practice, both the imperceptibility and the 
robustness are the rubs of 
nce they are usually contradictory, and need to be 
reasonably traded off. 
In this paper, we propose a scheme for relational 
database watermarking
e copyright of numeric data. The chaos binary 
sequences are generated under the control of the 
privacy key, and are utilized as the watermark signal 
and the control signal for watermark embedding. 
The watermark is embedded into the numeric data 
by changing the parity of their low order digits, thus 
avoids the syndrome phenomena caused by the usual 
Least Significant Bit (LSB) watermarking scheme. 
The embedding watermark meets the requirement of 
the synchronous dynamic updating for the database, 
and the detection of the watermark needs no original 
database.  
The rest of the paper is organized as follows: 
Section 2
atermarking database. Section 3 circumstantiates 
the algorithms of the proposed scheme for 
watermarking database based on chaos-sequence, 
including generating watermark signal, embedding 
and detecting watermark. Section 4 analyses the 
proposed scheme in respects of security, robustness, 
imperceptibility, and overhead. Section 5 provides 
an experimental evaluation. Section 6 concludes this 
paper with summaries and suggestions for future 
work. 
2 RELATED WORK 
Agrawal and Kiernan are the pioneers in the field of 
watermarking database (2002), and they firstly 
proposed the scheme of embedding watermark into 
relational database and implemented it. This scheme 
assumes that numeric attributes can tolerate 
modifications of some LSB. Tuples are firstly 
selected for watermark embedding. Then certain bits 
of some attributes of the selected tuples are modified 
to embed watermark bits. Therefore, this scheme is 
also referred as LSB scheme, and it is the most 
frequently used scheme in watermarking database. 
However, due to the different precision and word 
length between different databases, the same 
algorithm operated in different databases may 
modify different bits of the same data, thus may 
result in syndrome phenomena. This becomes an 
unavoidable drawback of the LSB scheme. 
Niu Xiamu et al. precisely defined the constraints 
of the availability of the database based on the LSB 
scheme, indexed the tuples which can be marked and 
divided them into groups, thus embedded multi-bits 
watermark into the database (2003). This scheme is 
the extending of the LSB scheme, so it inherits the 
same drawback of the LSB scheme that may lead to 
syndrome phenomena. 
Sion et al. embedded watermark into database by 
secretly sorting tuples and dividing subsets (2004). 
All tuples are divided into non-intersecting subsets, 
and a single watermark bit is embedded into tuples 
of a subset by modifying the distribution of tuples 
values. The same watermark bit is embedded 
repeatedly across several subsets and the majority-
voting algorithm is employed to detect the 
embedded bits. This scheme involves expensive 
operation, and the capacity of the watermark is 
rather limited. 
Francesc et al. embedded a watermark into each 
attribute of a multivariate continuous numerical 
dataset based on the theory of statistics (2006). Data 
quality is assured to the extent that the watermarked 
data nearly preserve the attribute means and the co-
variance matrix from the original dataset. The 
scheme is claimed to be robust against random noise 
addition attacks. However, due to each watermark 
embedding based on the statistic value of completely 
static dataset, this scheme is not suitable for database 
that needs frequent updating. 
3 ALGORITHM 
There is redundancy of precision among the low 
order digits of numeric data in database. For 
example, 0.1 degree is enough for the precision of 
ICSOFT 2007 - International Conference on Software and Data Technologies
98