Skip to main content

Effective Approaches for Watermarking XML Data

  • Conference paper
Database Systems for Advanced Applications (DASFAA 2005)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 3453))

Included in the following conference series:

Abstract

Watermarking enables provable rights over content, which has been successfully applied in multimedia applications. However, it is not trivial to apply the known effective watermarking schemes to XML data, since noisy data may not be acceptable due to its structures and node extents. In this paper, we present two different watermarking schemes on XML data: the selective approach and the compression approach. The former allows us to embed non-destructive hidden information content over XML data. The latter takes verbosity and the need in updating XML data in real life into account. We conduct experiments on the efficiency and robustness of both approaches against different forms of attack, which shows that our proposed watermarking schemes are reasonably efficient and effective.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gross-Amblard, D.: Query-preserving Watermarking of Relational Databases and XML Documents. In: Proc. of Principle of Database Systems (2003)

    Google Scholar 

  2. Agrawal, R., Kiernan, J.: Watermarking Relational Databases. In: Proc. of VLDB (2002)

    Google Scholar 

  3. Cheng, J., Ng, W.: XQzip: Querying compressed XML using structural indexing. In: Bertino, E., Christodoulakis, S., Plexousakis, D., Christophides, V., Koubarakis, M., Böhm, K., Ferrari, E. (eds.) EDBT 2004. LNCS, vol. 2992, pp. 219–236. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  4. Collberg, C., Thomborson, C.: Software Watermarking: Models and Dynamic Embeddings. In: Proc. of Principles of Programming Languages (1999)

    Google Scholar 

  5. Sion, R., Atallah, M.J., Prabhakar, S.: Resilient information hiding for abstract semi-structures. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 141–153. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Inoue, S., et al.: A Proposal on Information Hiding Methods using XML. In: The First NLP and XML Workshop

    Google Scholar 

  7. Atallah, M., Sion, R., Prabhakar, S.: Watermarking non-media content. In: The CERIAS Security Symposium (2001)

    Google Scholar 

  8. UN/CEFACT and OASIS. ebXML - Electronic Business using eXtensible Markup Language, http://www.ebxml.org/

  9. Li, Y., Swarup, V., Jajodia, S.: Constructing a Virtual Primary Key for Fingerprinting Relational Data. In: Proc. of the 2003 ACM workshop on Digital rights management (2003)

    Google Scholar 

  10. Fellbaum, C.: WordNet An Electronic Lexical Database. MIT Press, Cambridge (1998)

    MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Ng, W., Lau, HL. (2005). Effective Approaches for Watermarking XML Data. In: Zhou, L., Ooi, B.C., Meng, X. (eds) Database Systems for Advanced Applications. DASFAA 2005. Lecture Notes in Computer Science, vol 3453. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11408079_9

Download citation

  • DOI: https://doi.org/10.1007/11408079_9

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-25334-1

  • Online ISBN: 978-3-540-32005-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics