DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING
Sukriti Bhattacharya, Agostino Cortesi
2010
Abstract
In this paper we introduce a distortion free watermarking technique that strengthen the verification of integrity of the relational databases by using a public zero distortion authentication mechanism based on the Abstract Interpretation framework. The watermarking technique is partition based. The partitioning can be seen as a virtual grouping, which does not change neither the value of the table’s elements nor their physical positions. Instead of inserting the watermark directly to the database partition, we treat it as an abstract representation of that concrete partition, such that any change in the concrete domain reflects in its abstract counterpart. The main idea is to generate a gray scale image of the partition as a watermark of that partition, that serves as tamper detection procedure, followed by employing a public zero distortion authentication mechanism to verify the ownership.
References
- Agrawal, R., Haas, P. J., and Kiernan, J. (2003). Watermarking relational data: framework, algorithms and analysis. The VLDB Journal, 12(2):157-169.
- Bhattacharya, S. and Cortesi, A. (2009a). A distortion free watermark framework for relational databases. In ICSOFT (2), pages 229-234.
- Bhattacharya, S. and Cortesi, A. (2009b). A generic distortion free watermarking technique for relational databases. In ICISS, pages 252-264.
- Collberg, C. S. and Thomborson, C. (2002). Watermarking, tamper-proofing, and obfuscation - tools for software protection. Software Engineering, IEEE Transactions on, 28:735-746.
- Cousot, P. (2001). Abstract interpretation based formal methods and future challenges. In Informatics - 10 Years Back. 10 Years Ahead., pages 138-156. Springer-Verlag.
- Cousot, P. and Cousot, R. (1977). Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In POPL 7877: Proceedings of the 4th ACM SIGACT-SIGPLAN symposium on Principles of programming languages, pages 238-252. ACM.
- Cousot, P. and Cousot, R. (1992). Abstract interpretation frameworks. Journal of Logic and Computation, 2:511-547.
- Cousot, P. and Cousot, R. (2004). An abstract interpretation-based framework for software watermarking. In POPL 7804: Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pages 173-185. ACM.
- Cousot, P. and Cousot, R. (2007). Abstract interpretation and application to static analysis. In 1st IEEE and IFIP International Symposium on Theoretical Aspects of Software Engineering.
- Cox, I. J., Miller, M. L., and Bloom, J. A. (2001). Digital Watermarking: Principles and Practice. Morgan Kaufmann Publishers.
- Gross-Amblard, D. (2003). Query-preserving watermarking of relational databases and xml documents. In PODS 7803: Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, pages 191-201. ACM.
- Haan, L. D. and Koppelaars, T. (2007). Applied Mathematics for database Professionals. Apress.
- HMAC (2002). The keyed-hash message authentication code. Federal Information Process Standards Publication.
- Johnson, Duric, and Jajodia (2000). Information Hiding: Steganography and WatermarkingAttacks and Countermeasures. Kluwer Publishers.
- Myrvold, W. and Ruskey, F. (2000). Ranking and unranking permutations in linear time. Information Processing Letters, 79:281-284.
- Schneier., B. (1996). Applied Cryptography. John Wiley and Sons.
- Sion, R. (2004). Proving ownership over categorical data. In In Proceedings of the IEEE International Conference on Data Engineering ICDE, pages 584-596.
- Sion, R., Atallah, M., and Prabhakar, S. (2004). Rights protection for relational data. In In Proceedings of ACM SIGMOD, pages 98-109. ACM Press.
- Wu, Y. (2003). Zero-distortion authentication watermarking. In Proc. International Conference on Information Security, LNCS 2851, pages 325-337.
Paper Citation
in Harvard Style
Bhattacharya S. and Cortesi A. (2010). DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING . In Proceedings of the 5th International Conference on Software and Data Technologies - Volume 1: ICSOFT, ISBN 978-989-8425-22-5, pages 219-226. DOI: 10.5220/0002929302190226
in Bibtex Style
@conference{icsoft10,
author={Sukriti Bhattacharya and Agostino Cortesi},
title={DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING},
booktitle={Proceedings of the 5th International Conference on Software and Data Technologies - Volume 1: ICSOFT,},
year={2010},
pages={219-226},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002929302190226},
isbn={978-989-8425-22-5},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 5th International Conference on Software and Data Technologies - Volume 1: ICSOFT,
TI - DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING
SN - 978-989-8425-22-5
AU - Bhattacharya S.
AU - Cortesi A.
PY - 2010
SP - 219
EP - 226
DO - 10.5220/0002929302190226