
(1) Security. The scheme of database
watermarking shoul
d be secure, the search space of
pri
d not be perceived,
an
mmon attacks towards it, such as subset
ex
rmark detection, and the copyright is
ju
watermarking scheme,
si
, which is applied to protect
th
surveys the related research of
w
vacy key should be large enough, and the
management mechanism for privacy keys should be
reliable. Generally, the watermarking algorithm is
public, and the security of the system mainly
depends on the privacy key.
(2) Imperceptibility. As for the legal users of the
database, the watermark shoul
d should not influence the availability of the
database.
(3) Robustness. The watermark of database should
tolerate co
tracting attack, subset modification attack, subset
addition attack, and so on. The watermark should be
hard to be erased or be forged, and the probability of
false positive and false negative decision should be
small enough.
(4) Blind detection. No original database is needed
during the wate
dged only requiring the privacy key of the
watermarking algorithm.
In practice, both the imperceptibility and the
robustness are the rubs of
nce they are usually contradictory, and need to be
reasonably traded off.
In this paper, we propose a scheme for relational
database watermarking
e copyright of numeric data. The chaos binary
sequences are generated under the control of the
privacy key, and are utilized as the watermark signal
and the control signal for watermark embedding.
The watermark is embedded into the numeric data
by changing the parity of their low order digits, thus
avoids the syndrome phenomena caused by the usual
Least Significant Bit (LSB) watermarking scheme.
The embedding watermark meets the requirement of
the synchronous dynamic updating for the database,
and the detection of the watermark needs no original
database.
The rest of the paper is organized as follows:
Section 2
atermarking database. Section 3 circumstantiates
the algorithms of the proposed scheme for
watermarking database based on chaos-sequence,
including generating watermark signal, embedding
and detecting watermark. Section 4 analyses the
proposed scheme in respects of security, robustness,
imperceptibility, and overhead. Section 5 provides
an experimental evaluation. Section 6 concludes this
paper with summaries and suggestions for future
work.
2 RELATED WORK
Agrawal and Kiernan are the pioneers in the field of
watermarking database (2002), and they firstly
proposed the scheme of embedding watermark into
relational database and implemented it. This scheme
assumes that numeric attributes can tolerate
modifications of some LSB. Tuples are firstly
selected for watermark embedding. Then certain bits
of some attributes of the selected tuples are modified
to embed watermark bits. Therefore, this scheme is
also referred as LSB scheme, and it is the most
frequently used scheme in watermarking database.
However, due to the different precision and word
length between different databases, the same
algorithm operated in different databases may
modify different bits of the same data, thus may
result in syndrome phenomena. This becomes an
unavoidable drawback of the LSB scheme.
Niu Xiamu et al. precisely defined the constraints
of the availability of the database based on the LSB
scheme, indexed the tuples which can be marked and
divided them into groups, thus embedded multi-bits
watermark into the database (2003). This scheme is
the extending of the LSB scheme, so it inherits the
same drawback of the LSB scheme that may lead to
syndrome phenomena.
Sion et al. embedded watermark into database by
secretly sorting tuples and dividing subsets (2004).
All tuples are divided into non-intersecting subsets,
and a single watermark bit is embedded into tuples
of a subset by modifying the distribution of tuples
values. The same watermark bit is embedded
repeatedly across several subsets and the majority-
voting algorithm is employed to detect the
embedded bits. This scheme involves expensive
operation, and the capacity of the watermark is
rather limited.
Francesc et al. embedded a watermark into each
attribute of a multivariate continuous numerical
dataset based on the theory of statistics (2006). Data
quality is assured to the extent that the watermarked
data nearly preserve the attribute means and the co-
variance matrix from the original dataset. The
scheme is claimed to be robust against random noise
addition attacks. However, due to each watermark
embedding based on the statistic value of completely
static dataset, this scheme is not suitable for database
that needs frequent updating.
3 ALGORITHM
There is redundancy of precision among the low
order digits of numeric data in database. For
example, 0.1 degree is enough for the precision of
ICSOFT 2007 - International Conference on Software and Data Technologies
98