Advertisement

Watermarking as a service (WaaS) with anonymity

  • Farah Naz
  • Abid Khan
  • Mansoor Ahmed
  • Majid Iqbal Khan
  • Sadia Din
  • Awais Ahmad
  • Gwanggil Jeon
Article
  • 16 Downloads

Abstract

With rapid increase in Internet usage, it has become quite easy to produce illegal digital contents. As a result, copyright protection and authentication problems have risen. Besides audio, video and image, protection of database integrity is now a very active research in digital watermarking. Watermarking for databases has been introduced, however, most of the existing schemes produce distortion in the original content during watermark insertion phase. As a result of distortion to underlying data, the quality of watermarked content reduces. Moreover, most of the existing schemes provide watermarking techniques to protect specific data types, such as categorical or numeric. Furthermore, anonymity is also a critical challenge in prior watermarking techniques. In the said perspective, we propose watermarking as a service with anonymity for database integrity using zero watermarking schemes. Our proposed technique does not add any extra information, and neither any physical change is made to the database content. We also performed the security and performance analysis of our proposed scheme. For security analysis, we have evaluated against tuple insertion, tuple deletion, and attribute value tempering attacks. We can extract watermark with high probability, which shows resilience against the said attacks. Experiments are conducted to yield the satisfactory performance.

Keywords

Buyer seller watermarking protocol Zero-watermarking Content integrity Tamper detection Database watermarking 

Notes

References

  1. 1.
    Agrawal R, Haas PJ, Kiernan J (2003) Watermarking Relational Data: Framework, Algorithms and Analysis. The VLDB J 12(2):157–169CrossRefGoogle Scholar
  2. 2.
    Agrawal R, Kiernan J (2002) Watermarking relational databases. Proceedings of the 28th international conference on Very Large Data Bases, pp. 155–166, Hong KongGoogle Scholar
  3. 3.
    Aihab K, Hussain S (2013) A fragile zero watermarking scheme to detect and characterize malicious modifications in database relations. Article ID 796726, pp. 16Google Scholar
  4. 4.
    Ashwani K, Vipin T (2011) A practical Buyer-Seller watermarking protocol based on discrete wavelet transform. Int J Comput Appl 21(8):0975–8887Google Scholar
  5. 5.
    Chang C-C, Tsai H-C, Hsieh Y-P (2010) An efficient and fair buyer-seller fingerprinting scheme for large scale networks. Comput Secur 29(2):269–277CrossRefGoogle Scholar
  6. 6.
    Choi JG, Sakurai K, Park JH (2003) Does it need trusted third party? design of buyer-seller watermarking protocol without trusted third party. Proc ACNS 2846:265–279zbMATHGoogle Scholar
  7. 7.
    Cox I, Bloom J, Miller M (2001) “Digital Watermarking,” Digital Watermarking, Morgan KaufmannGoogle Scholar
  8. 8.
    Cox I, Kilian J, Leighton FT, Shamoon T (1997) Secure spread spectrum watermarking for multimedia. IEEE Trans Image Process 6(12):1673–1687CrossRefGoogle Scholar
  9. 9.
    Cox IJ, Linnartz JP (1998) Some general methods for tampering with watermarks. IEEE Transactions on Selected Areas of Communications 16:587–593CrossRefGoogle Scholar
  10. 10.
    Cox IJ, Linnartz JP (1998) Some general methods for tampering with watermarks. IEEE Transactions on Selected Areas of Communications 16(2):587–593CrossRefGoogle Scholar
  11. 11.
    Cox IJ, Miller ML, Bloom JA (2002) Digital Watermarking and fundamentals. Morgan Kaufmann, San FranciscoGoogle Scholar
  12. 12.
    Eslami Z, Kazemnasabhaji M, Mirehi N (2013) Proxy signatures and buyer-seller watermarking protocols for the protection of multimedia content. Multimedia Tools and ApplicationsGoogle Scholar
  13. 13.
    Fan C-I, Juang W-S, Chen M-T (2010) Efficient fair content exchange in cloud computing," Computer Symposium (ICS), 2010 International, 16–18, pp. 294–299Google Scholar
  14. 14.
    Guo J, Li Y, Deng RH, Chen K (2006) Rights protection for data cubes. Proceedings of Information Security Conference (ISC), pp. 359–372Google Scholar
  15. 15.
    Hang D, Liang S, Pan Z, Li H, Liu X (2010) An Image Authentication Scheme Based on Correlation. JDCTA 4(2):89–94CrossRefGoogle Scholar
  16. 16.
    Hartung F, Kutter M (1999) Multimedia watermarking techniques. Proc IEEE 87(7):1079–1107CrossRefGoogle Scholar
  17. 17.
    Jonathan KS, Girod B (2002) Power spectrum conditions for energy efficient watermarking. IEEE Trans. on Multimedia 4(4)Google Scholar
  18. 18.
    Kamel I (2009) A schema for protecting the integrity of databases. Computers and Security 28:698–709CrossRefGoogle Scholar
  19. 19.
    Katariya SS (2012) Digital Watermarking: Review. International Journal of Engineering and Innovative Technology 1(2):143–153Google Scholar
  20. 20.
    Kerckhoffs A (1883) La cryptographie militaire. Journal des Sciences Militaires 9:5–38Google Scholar
  21. 21.
    Khan A, Jabeen F, Naz F, Suhail S, Ahmed M, Nawaz S (2016) Buyer Seller Watermarking Protocols Issues and Challenges - A Survey. J Netw Comput Appl 75:317–334 ElsevierCrossRefGoogle Scholar
  22. 22.
    Lei C-L, Yu P-L, Tsai P-L, Chan M-H (2004) An efficient and anonymous buyer-seller watermarking protocol. IEEE Transaction Image Process 13(12):1618–1626CrossRefGoogle Scholar
  23. 23.
    Li Y, Guo H, Wang S (2008) A Multiple-Bits Watermark for relational Data. J Database Manag 19(3):1–21CrossRefGoogle Scholar
  24. 24.
    Li Y, Swarup V, Jajodia S (2003) A robust watermarking scheme for relational data. In Proc. The 13th workshop on information technology and engineering, pp. 195–200Google Scholar
  25. 25.
    Li Y, Swarup V, Jajodia S (2005) Fingerprinting Relational Databases: Schemes and Specialties. IEEE Trans Dependable and Secure Computing 2(1):34–45CrossRefGoogle Scholar
  26. 26.
    Memon N, Wong PW (2001) A buyer-seller watermarking protocol. IEEE Transaction Image Process 10(4):643–649CrossRefGoogle Scholar
  27. 27.
    Meng S, Cao W, Yan Y, Li S (2010) Bit Replacement Audio Watermarking Using Stereo Signals. AISS 2(3):18–24CrossRefGoogle Scholar
  28. 28.
    Petitcolas FAP, Anderson R, Kuhn MG (1999) Information hiding A survey. Proc IEEE 87(7):1062–1077CrossRefGoogle Scholar
  29. 29.
    Raju H, Shantanu P (2010) Watermarking techniques for relational databases: survey, classification and comparison. Journal of Universal Computer Science 16(21)Google Scholar
  30. 30.
    Rial A, Balasch J, Preneel B (2011) A privacy preserving buyer seller watermarking protocol based on priced oblivious transfer. Information forensics and security, IEEE Transactions 6(1)Google Scholar
  31. 31.
    Robert L, Shanmugapriya T (2009) A Study on Digital Watermarking Techniques. International Journal of Recent Trends in Engineering 1(2):223–225Google Scholar
  32. 32.
    Song C, Sang J, Sudirman S (2018) A buyer-seller watermarking protocol for digital secondary market. Multimedia Tools Appl 77:225.  https://doi.org/10.1007/s11042-016-4247-8 CrossRefGoogle Scholar
  33. 33.
    Wolfgang RB, Podilchuk CI, Delp EJ (1999) Perceptual watermarks for digital images and video. Proc IEEE 87(7):1108–1126CrossRefGoogle Scholar
  34. 34.
    Yu Z, Wang C, Thomborson C, Wang J, Lian S, Vasilakos AV (2011) A novel watermarking method for software protection in the cloud. Software. Practice and ExperienceGoogle Scholar
  35. 35.
    Zhang LY, Zheng Y, Weng J, Wang C, Shan Z, Ren K (2018) You can access but you cannot leak: defending against illegal content redistribution in encrypted cloud media center. IEEE TraTDSC, in pressGoogle Scholar
  36. 36.
    Zhu W, Thomborson C, Wang F-Y (2005) A survey of software watermarking, Proceedings of the 2005 IEEE international conference on intelligence and security informaticsGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2019

Authors and Affiliations

  1. 1.Department of Computer ScienceCOMSATS University IslamabadIslamabadPakistan
  2. 2.School of Computer Science and EngineeringKyungpook National UniversityDaeguSouth Korea
  3. 3.Department of Computer ScienceBahria University IslamabadIslamabadPakistan
  4. 4.Department of Embedded System EngineeringIncheon National UniversityIncheonSouth Korea

Personalised recommendations