database watermarking model by working around
these two limitations.
6 CONCLUSION
The watermarking scheme proposed by Agrawal and
Kiernan is irreversible, resulting in problems during
owner identification in case of additive or secondary
watermarking attacks. Our modified scheme is re-
versible and thus the rightful owner can be identified
from n candidates. The major advantages of our pro-
posed scheme are 1)It provides query preservation, 2)
It identifies rightful owner if relation is watermarked
by multiple parties, and 3) It facilitates reversibility.
The current model requires modified bits to be
stored at a secondary location (
E T ). Our future re-
search is directed towards eliminating this require-
ment and formulate a reversible blind watermarking
scheme. The second enhancement is watermarking
relations that do not contain a primary key. Concate-
nated attributes in a tuple can act as a primary key
in such cases. However, the possibility of duplicate
attributes makes identification of marked tuples diffi-
cult. One possibility is to treat tuples with duplicate
attributes as a single tuple.
REFERENCES
Agrawal, R., Haas, P. J., and Kiernan, J. (2003). Water-
marking relational data: framework, algorithms and
analysis. The VLDB Journal, 12(2):157–169.
Agrawal, R. and Kiernan, J. (2002). Watermarking rela-
tional databases. In Proceedings of the 28th Interna-
tional Conference on Very Large Databases VLDB.
Alattar, A. (2004). Reversible watermark using the dif-
ference expansion of a generalized integer transform.
IEEE Transactions on Image Processing, 13(8):1147–
1156.
Bors, A. and Pitas, I. (1996). Image watermarking using
dct domain constraints. In Proceedings of IEEE Inter-
national Conference on Image Processing (ICIP’96),
volume III, pages 231–234.
Braudaway, G. W. (1997). Protecting publicly-available im-
ages with an invisible image watermark. In Proceed-
ings of IEEE International Conference on Image Pro-
cessing (ICIP’97), Santa Barbara, California.
Celik, M. U., Sharma, G., Tekalp, M. A., and Saber, E.
(2002). Reversible data hiding. In Proceedings of
International Conference on Image Processing, vol-
ume 2, pages 157–160.
Cox, I., Kilian, J., Leighton, T., and Shamoon, T. (1995).
Secure spread spectrum watermarking for multimedia.
Technical Report 128, NEC Research Institute.
Cox, I., Kilian, J., Leighton, T., and Shamoon, T. (1997).
Secure spread spectrum watermarking for multimedia.
IEEE Transactions on Image Processing, 6(12):1673–
1687.
Cox, I. J., Killian, J., Leighton, T., and Shamoon, T. (1996).
Secure spread spectrum watermarking for images, au-
dio, and video. In IEEE International Conference on
Image Processing (ICIP’96), volume III, pages 243–
246.
Gross-Amblard, D. (2003). Query-preserving watermark-
ing of relational databases and xml documents. In
Proceedings of the 20th ACM Symposium on Princi-
ples of Database Systems, pages 191–201.
Guo, F., Wang, J., and Li, D. (2006). Fingerprinting rela-
tional databases. In SAC ’06: Proceedings of the 2006
ACM symposium on Applied computing, pages 487–
492, New York, NY, USA. ACM Press.
Jen-Bang Feng, Iuon-Chang Lin, C.-S. T. and Chu, Y.-P.
(2006). Reversible watermarking: Current status and
key issues. International Journal of Network Security,
2(3):161–171.
Li, Y. and Deng, R. H. (2006). Publicly verifiable ownership
protection for relational databases. In Proceedings of
the ACM Symposium on Information, computer and
communications security, pages 78–89, New York,
NY, USA. ACM Press.
Li, Y., Guo, H., and Jajodia, S. (2004). Tamper detection
and localization for categorical data using fragile wa-
termarks. In DRM ’04: Proceedings of the 4th ACM
workshop on Digital rights management, pages 73–
82, New York, NY, USA. ACM Press.
Schneier, B. (1996). Applied Cryptography. John Wiley,
second edition.
Sion, R., Atallah, M., and Prabhakar, S. (2004). Rights
protection for relational data. IEEE Transactions
on Knowledge and Data Engineering, 16(12):1509–
1525.
Tian, J. (2003). Reversible data embedding using a differ-
ence expansion. IEEE Transactions on Circuits and
Systems for Video Technology, 13(8):890–896.
Zhang, Y., Niu, X.-M., and Zhao, D. (2004a). A method
of protecting relational databases copyright with cloud
watermark. Transactions of Engineering, Computing
and Technology, 3:170–174.
Zhang, Y., Yang, B., and Niu, X.-M. (2006). Reversible
watermarking for relational database authentication.
Journal of Computers, 17(2):59–66.
Zhang, Z. H., Jin, X. M., Wang, J. M., and Li, D. Y. (2004b).
Watermarking relational database using image. In
Proceedings of 3rd International Conference on Ma-
chine Learning and Cybernetics, volume 3, pages
1739–1744.
SIGMAP 2007 - International Conference on Signal Processing and Multimedia Applications
290