REVERSIBLE AND SEMI-BLIND RELATIONAL DATABASE WATERMARKING

Gaurav Gupta, Josef Pieprzyk

2007

Abstract

In 2002, Agrawal and Kiernan proposed a relational database watermarking scheme that modifies least significant bits (LSBs) of numerical attributes selected using a secret key. The scheme does not address query preservation (some queries give different results when executed on the original and watermarked relation). Additive and secondary watermarking attacks on the watermarked relation are also possible. Such attacks can render the original watermark undetectable. Hence, an attacker who embeds his watermark in a previously watermarked relation can claim ownership of that relation. However, if the scheme is reversible, then a previous watermark, if any, can be detected in the reversed relation. In this paper, we propose an enhanced reversible, semi-blind and query-preserving watermarking scheme. Using this scheme, the correct owner of a relation can be identified even if the relation has been watermarked by multiple parties. If required, the database can be restored to it’s original state too. This finds applications in high-precision settings such as military operations or scientific experiments.

References

  1. Agrawal, R., Haas, P. J., and Kiernan, J. (2003). Watermarking relational data: framework, algorithms and analysis. The VLDB Journal, 12(2):157-169.
  2. Agrawal, R. and Kiernan, J. (2002). Watermarking relational databases. In Proceedings of the 28th International Conference on Very Large Databases VLDB.
  3. Alattar, A. (2004). Reversible watermark using the difference expansion of a generalized integer transform. IEEE Transactions on Image Processing, 13(8):1147- 1156.
  4. Bors, A. and Pitas, I. (1996). Image watermarking using dct domain constraints. In Proceedings of IEEE International Conference on Image Processing (ICIP'96), volume III, pages 231-234.
  5. Braudaway, G. W. (1997). Protecting publicly-available images with an invisible image watermark. In Proceedings of IEEE International Conference on Image Processing (ICIP'97), Santa Barbara, California.
  6. Celik, M. U., Sharma, G., Tekalp, M. A., and Saber, E. (2002). Reversible data hiding. In Proceedings of International Conference on Image Processing, volume 2, pages 157-160.
  7. Cox, I., Kilian, J., Leighton, T., and Shamoon, T. (1995). Secure spread spectrum watermarking for multimedia. Technical Report 128, NEC Research Institute.
  8. Cox, I., Kilian, J., Leighton, T., and Shamoon, T. (1997). Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12):1673- 1687.
  9. Cox, I. J., Killian, J., Leighton, T., and Shamoon, T. (1996). Secure spread spectrum watermarking for images, audio, and video. In IEEE International Conference on Image Processing (ICIP'96), volume III, pages 243- 246.
  10. Gross-Amblard, D. (2003). Query-preserving watermarking of relational databases and xml documents. In Proceedings of the 20th ACM Symposium on Principles of Database Systems, pages 191-201.
  11. Guo, F., Wang, J., and Li, D. (2006). Fingerprinting relational databases. In SAC 7806: Proceedings of the 2006 ACM symposium on Applied computing, pages 487- 492, New York, NY, USA. ACM Press.
  12. Jen-Bang Feng, Iuon-Chang Lin, C.-S. T. and Chu, Y.-P. (2006). Reversible watermarking: Current status and key issues. International Journal of Network Security, 2(3):161-171.
  13. Li, Y. and Deng, R. H. (2006). Publicly verifiable ownership protection for relational databases. In Proceedings of the ACM Symposium on Information, computer and communications security, pages 78-89, New York, NY, USA. ACM Press.
  14. Li, Y., Guo, H., and Jajodia, S. (2004). Tamper detection and localization for categorical data using fragile watermarks. In DRM 7804: Proceedings of the 4th ACM workshop on Digital rights management, pages 73- 82, New York, NY, USA. ACM Press.
  15. Schneier, B. (1996). Applied Cryptography. John Wiley, second edition.
  16. Sion, R., Atallah, M., and Prabhakar, S. (2004). Rights protection for relational data. IEEE Transactions on Knowledge and Data Engineering, 16(12):1509- 1525.
  17. Tian, J. (2003). Reversible data embedding using a difference expansion. IEEE Transactions on Circuits and Systems for Video Technology, 13(8):890-896.
  18. Zhang, Y., Niu, X.-M., and Zhao, D. (2004a). A method of protecting relational databases copyright with cloud watermark. Transactions of Engineering, Computing and Technology, 3:170-174.
  19. Zhang, Y., Yang, B., and Niu, X.-M. (2006). Reversible watermarking for relational database authentication. Journal of Computers, 17(2):59-66.
  20. Zhang, Z. H., Jin, X. M., Wang, J. M., and Li, D. Y. (2004b). Watermarking relational database using image. In Proceedings of 3rd International Conference on Machine Learning and Cybernetics, volume 3, pages 1739-1744.
Download


Paper Citation


in Harvard Style

Gupta G. and Pieprzyk J. (2007). REVERSIBLE AND SEMI-BLIND RELATIONAL DATABASE WATERMARKING . In Proceedings of the Second International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2007) ISBN 978-989-8111-13-5, pages 279-286. DOI: 10.5220/0002136902790286


in Bibtex Style

@conference{sigmap07,
author={Gaurav Gupta and Josef Pieprzyk},
title={REVERSIBLE AND SEMI-BLIND RELATIONAL DATABASE WATERMARKING},
booktitle={Proceedings of the Second International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2007)},
year={2007},
pages={279-286},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002136902790286},
isbn={978-989-8111-13-5},
}


in EndNote Style

TY - CONF
JO - Proceedings of the Second International Conference on Signal Processing and Multimedia Applications - Volume 1: SIGMAP, (ICETE 2007)
TI - REVERSIBLE AND SEMI-BLIND RELATIONAL DATABASE WATERMARKING
SN - 978-989-8111-13-5
AU - Gupta G.
AU - Pieprzyk J.
PY - 2007
SP - 279
EP - 286
DO - 10.5220/0002136902790286