Abstract
As XML files are less redundant and readily reorganized, it is really difficult to design a XML watermarking scheme which can get a trade-off between robust and invisible. However, this trade-off can be achieved by the Zero-Watermark method. In this paper, two Zero-Watermark methods are designed and tested for XML documents. One is XSLT-related method which is designed with embedding extra codes in XSLT file to serve as sort of copyright function. Another uses the functional dependency of XML file as feature for Zero-Watermark. Experiment results show that both methods have good real-time performances. Experiment results show that Zero-Watermark algorithm with functional dependency can resist selection attacks, alteration attacks, reorganization attacks and compression attacks.
Similar content being viewed by others
References
Wu, J.: A framework for learning comprehensible theories in XML document classification. IEEE Trans. Knowl. Data Eng. 24(1), 1–14 (2012)
Franco-Contreras, J., Coatrieux, G.: Robust watermarking of relational databases with ontology-guided distortion control. IEEE Trans. Inf. Forensics Secur. 10(9), 1939–1952 (2015)
Petiteolas, F.A.R., Anderson, R.J., Kuhn, M.G., Information hiding—a survey. In: Proceedings of IEEE, pp. 1062–1078 (1999)
Wen, Q., Sun, T.-F., Wang, S.-X.: Concept and application of zero-watermark. Tien Tzu Hsueh Pao/Acta Electron. Sin. 31(2), 214–216 (2003)
Sion, R., Atallah, M., Prabhakar, S.: Rights protection for relational data. IEEE Trans. Knowl. Data Eng. 16(6), 1–17 (2004)
Kamran, M., Suhail, S., Farooq, M.: A robust, distortion minimizing technique for watermarking relational databases using once-for-all usability constraints. IEEE Trans. Knowl. Data Eng. 25(12), 2694–2707 (2013)
Ng, W., Lau, H. L.: Effective approaches for watermarking XML data. In: DASFAA, International symposium on database systems for advanced applications, pp. 68–80 (2005)
Li, Y., Deng, R.H.: Publicly verifiable ownership protection for relational databases. In: ASIACCS ‘06 proceedings of the 2006 ACM symposium on information, computer and communications security, pp. 78–89 (2006)
Bhattacharya, S., Cortesi, A.: A distortion free watermark framework for relational databases. In:Proceedings 4th international conference on software and data technology, ICSOFT 2009, Sofia, Bulgaria, pp. 229–234 (2009)
Camara, L., Li, J., Li, R., Xie, W.: Distortion-free watermarking approach for relational database integrity checking. Mathematical problems in engineering, pp. 1–10. Hindawi Publishing Corporation, Cairo (2014)
Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking relational data: framework, algorithms and analysis. VLDB J. 12(2), 157–169 (2003)
Inoue, S., et al.: A proposal on steganography method using XML. In: Proceedings 2002 Symposium cryptography and information security (SCIS2002), pp. 301–306 (2002)
Shehab, M., Bertino, E., Ghafoor, A.: Watermarking relational databases using optimization-based techniques. Trans. Knowl. Data Eng. 20(1), 116–129 (2008)
Lafaye, J., Gross-Amblard, D., Constantin, C., Guerrouani, M.: Watermill: an optimized fingerprinting system for databases under constraints. Trans. Knowl. Data Eng. 20(4), 532–546 (2008)
Gross-Amblad, D., Saclay, I.: Query-preserving watermarking of relational database and XML documents. ACM Trans. Database Syst. 36(1), 1–24 (2011)
Zhou, X., Pang, H., Tan, K.L.: Query-based watermarking for XML data. In: Proceedings of the 2nd ACM symposium on information, computer and communications security, pp. 253–264 (2007)
Yu, C., Jagadish, H.V.: Efficient discovery of XML data redundancies.In: VLDB ‘06 Proceedings of the 32nd international conference on very large data bases, pp.103–114 (2006)
Acknowledgments
Funding was provided by Youth Science Foundation of JiLin Province (Grant No. 20100183).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Wen, Q., Wang, Y. & Li, P. Two Zero-Watermark methods for XML documents. J Real-Time Image Proc 14, 183–192 (2018). https://doi.org/10.1007/s11554-016-0647-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11554-016-0647-2