Skip to main content
Log in

Two Zero-Watermark methods for XML documents

  • Special Issue Paper
  • Published:
Journal of Real-Time Image Processing Aims and scope Submit manuscript

Abstract

As XML files are less redundant and readily reorganized, it is really difficult to design a XML watermarking scheme which can get a trade-off between robust and invisible. However, this trade-off can be achieved by the Zero-Watermark method. In this paper, two Zero-Watermark methods are designed and tested for XML documents. One is XSLT-related method which is designed with embedding extra codes in XSLT file to serve as sort of copyright function. Another uses the functional dependency of XML file as feature for Zero-Watermark. Experiment results show that both methods have good real-time performances. Experiment results show that Zero-Watermark algorithm with functional dependency can resist selection attacks, alteration attacks, reorganization attacks and compression attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10

Similar content being viewed by others

References

  1. Wu, J.: A framework for learning comprehensible theories in XML document classification. IEEE Trans. Knowl. Data Eng. 24(1), 1–14 (2012)

    Article  Google Scholar 

  2. Franco-Contreras, J., Coatrieux, G.: Robust watermarking of relational databases with ontology-guided distortion control. IEEE Trans. Inf. Forensics Secur. 10(9), 1939–1952 (2015)

    Article  Google Scholar 

  3. Petiteolas, F.A.R., Anderson, R.J., Kuhn, M.G., Information hiding—a survey. In: Proceedings of IEEE, pp. 1062–1078 (1999)

  4. Wen, Q., Sun, T.-F., Wang, S.-X.: Concept and application of zero-watermark. Tien Tzu Hsueh Pao/Acta Electron. Sin. 31(2), 214–216 (2003)

    Google Scholar 

  5. Sion, R., Atallah, M., Prabhakar, S.: Rights protection for relational data. IEEE Trans. Knowl. Data Eng. 16(6), 1–17 (2004)

    Article  Google Scholar 

  6. Kamran, M., Suhail, S., Farooq, M.: A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints. IEEE Trans. Knowl. Data Eng. 25(12), 2694–2707 (2013)

    Article  Google Scholar 

  7. Ng, W., Lau, H. L.: Effective approaches for watermarking XML data. In: DASFAA, International symposium on database systems for advanced applications, pp. 68–80 (2005)

  8. Li, Y., Deng, R.H.: Publicly verifiable ownership protection for relational databases. In: ASIACCS ‘06 proceedings of the 2006 ACM symposium on information, computer and communications security, pp. 78–89 (2006)

  9. Bhattacharya, S., Cortesi, A.: A distortion free watermark framework for relational databases. In:Proceedings 4th international conference on software and data technology, ICSOFT 2009, Sofia, Bulgaria, pp. 229–234 (2009)

  10. Camara, L., Li, J., Li, R., Xie, W.: Distortion-free watermarking approach for relational database integrity checking. Mathematical problems in engineering, pp. 1–10. Hindawi Publishing Corporation, Cairo (2014)

    Google Scholar 

  11. Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking relational data: framework, algorithms and analysis. VLDB J. 12(2), 157–169 (2003)

    Article  Google Scholar 

  12. Inoue, S., et al.: A proposal on steganography method using XML. In: Proceedings 2002 Symposium cryptography and information security (SCIS2002), pp. 301–306 (2002)

  13. Shehab, M., Bertino, E., Ghafoor, A.: Watermarking relational databases using optimization-based techniques. Trans. Knowl. Data Eng. 20(1), 116–129 (2008)

    Article  Google Scholar 

  14. Lafaye, J., Gross-Amblard, D., Constantin, C., Guerrouani, M.: Watermill: an optimized fingerprinting system for databases under constraints. Trans. Knowl. Data Eng. 20(4), 532–546 (2008)

    Article  Google Scholar 

  15. Gross-Amblad, D., Saclay, I.: Query-preserving watermarking of relational database and XML documents. ACM Trans. Database Syst. 36(1), 1–24 (2011)

    Article  Google Scholar 

  16. Zhou, X., Pang, H., Tan, K.L.: Query-based watermarking for XML data. In: Proceedings of the 2nd ACM symposium on information, computer and communications security, pp. 253–264 (2007)

  17. Yu, C., Jagadish, H.V.: Efficient discovery of XML data redundancies.In: VLDB ‘06 Proceedings of the 32nd international conference on very large data bases, pp.103–114 (2006)

Download references

Acknowledgments

Funding was provided by Youth Science Foundation of JiLin Province (Grant No. 20100183).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Quan Wen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Wen, Q., Wang, Y. & Li, P. Two Zero-Watermark methods for XML documents. J Real-Time Image Proc 14, 183–192 (2018). https://doi.org/10.1007/s11554-016-0647-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11554-016-0647-2

Keywords

Navigation