Skip to main content

Verify a Valid Message in Single Tuple: A Watermarking Technique for Relational Database

  • Conference paper
  • First Online:
Database Systems for Advanced Applications (DASFAA 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12112))

Included in the following conference series:

Abstract

The leakage of sensitive digital assets is a major problem which causes huge legal risk and economic loss. Service providers need to ensure data security for owners. Robust watermarking techniques play a critical role in ownership protection of relational databases. In this paper, we proposed a new Double-layer Ellipse Model called DEM that embeds a valid message in each candidates tuples. Each watermark can independently prove ownership. The main idea of DEM is to use watermarks itself to locate and make the most of contextual information to verify validity of watermarks. Under the framework of DEM, we propose a robust and semi-blind reversible watermarking scheme. Our scheme handles non-significant data for locating and embedding. The scheme generates watermark by exchanging data groups extracted from scattered attributes using Computation and Sort-Exchange step. Key information such as primary key, most significant bit (MSB) become a assistant feature for verifying the validity of embedded watermark. Our scheme can be applied on all type of numerical attributes (e.g. Integer, float, double, boolean). In robust experiments, the scheme is proved to be extremely resilient to insertion/detection/alteration attacks in both normal and hard situations. From a practical point of view, our solution is easy to implement and has good performance in statistics, incremental updates, adaptation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    kdd.ics.uci.edu/databases/covertype/covertype.html.

References

  1. Agrawal, R., Kiernan, J.: Watermarking relational databases. In: Very Large Data Bases, pp. 155–166 (2002)

    Google Scholar 

  2. Fei, G., Wang, J., Li, D.: Fingerprinting relational databases. In: ACM Symposium on Applied Computing (2006)

    Google Scholar 

  3. Franco-Contreras, J., Coatrieux, G.: Robust watermarking of relational databases with ontology-guided distortion control. IEEE Trans. Inf. Forensics Secur. 10(9), 1939–1952 (2015)

    Article  Google Scholar 

  4. Guo, H., Li, Y., Liu, A., Jajodia, S.: A fragile watermarking scheme for detecting malicious modifications of database relations. Inf. Sci. Int. J. 176(10), 1350–1378 (2006)

    MathSciNet  MATH  Google Scholar 

  5. Gupta, G., Pieprzyk, J.: Reversible and blind database watermarking using difference expansion. Int. J. Digit. Crime Forensics 1(2), 42–54 (2009)

    Article  Google Scholar 

  6. Hartung, F., Kutter, M.: Multimedia watermarking techniques. Proc. IEEE 87(7), 1079–1107 (1999)

    Article  Google Scholar 

  7. Iftikhar, S., Kamran, M., Anwar, Z.: RRW a robust and reversible watermarking technique for relational data. IEEE Trans. Knowl. Data Eng. 27(4), 1132–1145 (2015)

    Article  Google Scholar 

  8. Kamel, I.: A schema for protecting the integrity of databases. Comput. Secur. 28(7), 698–709 (2009)

    Article  Google Scholar 

  9. Kamran, M., Farooq, M.: A comprehensive survey of watermarking relational databases research. arXiv preprint arXiv:1801.08271 (2018)

  10. Khan, A., Husain, S.A.: A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations. Sci. World J. 2013, 796726 (2013)

    Google Scholar 

  11. Kim, Y.W., Moon, K.A., Oh, I.S.: A text watermarking algorithm based on word classification and inter-word space statistics. In: International Conference on Document Analysis & Recognition (2003)

    Google Scholar 

  12. Li, Y., Deng, R.H.: Publicly verifiable ownership protection for relational databases. In: ACM Symposium on Information (2006)

    Google Scholar 

  13. Li, Y., Guo, H., Jajodia, S.: Tamper detection and localization for categorical data using fragile watermarks. In: ACM Workshop on Digital Rights Management (2004)

    Google Scholar 

  14. Podilchuk, C.I., Zeng, W.: Image-adaptive watermarking using visual models. IEEE J. Sel. A. Commun. 16(4), 525–539 (2006). https://doi.org/10.1109/49.668975

    Article  Google Scholar 

  15. Rakesh, A., Peter, H., Jerry, K.: Watermarking relational data: framework, algorithms and analysis. VLDB 12, 157–169 (2003). https://doi.org/10.1007/s00778-003-0097-x

    Article  Google Scholar 

  16. Shehab, M., Bertino, E., Ghafoor, A.: watermarking relational databases using optimization-based techniques. IEEE Trans. Knowl. Data Eng. 20(1), 116–129 (2007)

    Article  Google Scholar 

  17. Sion, R., Atallah, M., Prabhakar, S.: Rights protection for categorical data. IEEE Trans. Knowl. Data Eng. 17(7), 912–926 (2005)

    Article  Google Scholar 

  18. Sion, R., Atallah, M., Prabhakar, S.: Rights protection for relational data. IEEE Trans. Knowl. Data Eng. 16(12), 1509–1525 (2004)

    Article  Google Scholar 

  19. Sion, R.: Proving ownership over categorical data (2004)

    Google Scholar 

  20. Stern, J.P., Hachez, G., Koeune, F., Quisquater, J.-J.: Robust object watermarking: application to code. In: Pfitzmann, A. (ed.) IH 1999. LNCS, vol. 1768, pp. 368–378. Springer, Heidelberg (2000). https://doi.org/10.1007/10719724_25

    Chapter  Google Scholar 

  21. Wang, H., Cui, X., Cao, Z.: A speech based algorithm for watermarking relational databases. In: International Symposiums on Information Processing (2008)

    Google Scholar 

  22. Cui, X., Qin, X., Sheng, G.: A weighted algorithm for watermarking relational databases. Wuhan Univ. J. Nat. Sci. 12(1), 79–82 (2007). https://doi.org/10.1007/s11859-006-0204-0

    Article  MATH  Google Scholar 

  23. Zhou, X., Huang, M., Peng, Z.: An additive-attack-proof watermarking mechanism for databases’ copyrights protection using image. In: ACM Symposium on Applied Computing (2007)

    Google Scholar 

Download references

Acknowledgments

This work has been supported by National Key R&D Program of China (No.2017YFC0820700), National Science and Technology Major Project (No.2016ZX05047003), the Beijing Municipal Science & Technology Commission Funds for Cyberspace Security Defense Theory and Key Technology Project (No.Z191100007119003).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jing Yu .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yuan, S., Yu, J., Shen, P., Chen, C. (2020). Verify a Valid Message in Single Tuple: A Watermarking Technique for Relational Database. In: Nah, Y., Cui, B., Lee, SW., Yu, J.X., Moon, YS., Whang, S.E. (eds) Database Systems for Advanced Applications. DASFAA 2020. Lecture Notes in Computer Science(), vol 12112. Springer, Cham. https://doi.org/10.1007/978-3-030-59410-7_4

Download citation

Publish with us

Policies and ethics