Skip to main content

Effective Approaches for Watermarking XML Data

  • Conference paper

Part of the Lecture Notes in Computer Science book series (LNISA,volume 3453)

Abstract

Watermarking enables provable rights over content, which has been successfully applied in multimedia applications. However, it is not trivial to apply the known effective watermarking schemes to XML data, since noisy data may not be acceptable due to its structures and node extents. In this paper, we present two different watermarking schemes on XML data: the selective approach and the compression approach. The former allows us to embed non-destructive hidden information content over XML data. The latter takes verbosity and the need in updating XML data in real life into account. We conduct experiments on the efficiency and robustness of both approaches against different forms of attack, which shows that our proposed watermarking schemes are reasonably efficient and effective.

Keywords

  • Watermark Scheme
  • Watermark Algorithm
  • Selective Approach
  • Query Response Time
  • Average Attack

These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gross-Amblard, D.: Query-preserving Watermarking of Relational Databases and XML Documents. In: Proc. of Principle of Database Systems (2003)

    Google Scholar 

  2. Agrawal, R., Kiernan, J.: Watermarking Relational Databases. In: Proc. of VLDB (2002)

    Google Scholar 

  3. Cheng, J., Ng, W.: XQzip: Querying compressed XML using structural indexing. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol. 2992, pp. 219–236. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  4. Collberg, C., Thomborson, C.: Software Watermarking: Models and Dynamic Embeddings. In: Proc. of Principles of Programming Languages (1999)

    Google Scholar 

  5. Sion, R., Atallah, M.J., Prabhakar, S.: Resilient information hiding for abstract semi-structures. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 141–153. Springer, Heidelberg (2004)

    CrossRef  Google Scholar 

  6. Inoue, S., et al.: A Proposal on Information Hiding Methods using XML. In: The First NLP and XML Workshop

    Google Scholar 

  7. Atallah, M., Sion, R., Prabhakar, S.: Watermarking non-media content. In: The CERIAS Security Symposium (2001)

    Google Scholar 

  8. UN/CEFACT and OASIS. ebXML - Electronic Business using eXtensible Markup Language, http://www.ebxml.org/

  9. Li, Y., Swarup, V., Jajodia, S.: Constructing a Virtual Primary Key for Fingerprinting Relational Data. In: Proc. of the 2003 ACM workshop on Digital rights management (2003)

    Google Scholar 

  10. Fellbaum, C.: WordNet An Electronic Lexical Database. MIT Press, Cambridge (1998)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and Permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ng, W., Lau, HL. (2005). Effective Approaches for Watermarking XML Data. In: Zhou, L., Ooi, B.C., Meng, X. (eds) Database Systems for Advanced Applications. DASFAA 2005. Lecture Notes in Computer Science, vol 3453. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11408079_9

Download citation

  • DOI: https://doi.org/10.1007/11408079_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25334-1

  • Online ISBN: 978-3-540-32005-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics