Abstract
Xml streams are valuable, continuous, high-throughput sources of information whose owners must be protected against illegal redistributions. Watermarking is a known technique for hiding copyrights marks within documents, thus preventing redistributions. Here, we introduce a watermarking algorithm for Xml streams so that (i) the watermark embedding and detection processes are done online and use only a constant memory, (ii) the stream distortion is controlled, (iii) the type of the stream is preserved and finally (iv) the detection procedure does not require the original stream. We also evaluate, analytically and experimentally, the robustness of the algorithm against watermark removal attempts.
Keywords
- Watermark Scheme
- News Item
- Watermark Embedding
- Covered Edge
- Constant Memory
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
Work supported by the ACI Sécurité & Informatique TADORNE grant (2004-2007).
Chapter PDF
References
CNN RSS, http://www.cnn.com/services/rss/
Agrawal, R., Haas, P.J., Kiernan, J.: Watermarking Relational Data: Framework, Algorithms and Analysis. VLDB J 12(2), 157–169 (2003)
Arasu, A., Babcock, B., Babu, S., Datar, M., Ito, K., Motwani, R., Nishizawa, I., Srivastava, U., Thomas, D., Varma, R., Widom, J.: STREAM: The Stanford Stream Data Manager. IEEE Data Eng. Bull. 26(1), 19–26 (2003)
Camelia Constantin, D.G.-A., Guerrouani, M.: Watermill: an optimized fingerprinting tool for highly constrained data. In: ACM Workshop on Multimedia and Security (MMSec), August 1-2, 2005, pp. 143–155 (2005)
Gottlob, G., Koch, C., Pichler, R.: Efficient algorithms for processing xpath queries. ACM Trans. Database Syst. 30(2), 444–491 (2005)
Gross-Amblard, D.: Query-preserving watermarking of relational databases and XML documents. In: Symposium on Principles of Database Systems, pp. 191–201. ACM Press, New York (2003)
Gross-Amblard, D., Lafaye, J.: Xml streams watermarking. Technical report, CEDRIC, CEDRIC TR-976 (2005)
Hoeffding, W.: Probability Inequalities for Sums of Bounded Random Variables. Journal of the American Statistical Association 58(301), 13–30 (1963)
Inoue, S., Makino, K., Murase, I., Takizawa, O., Matsumoto, T., Nakagawa, H.: Proposal on information hiding method using xml. In: The 1st Workshop on NLP and XML (2001)
Levenshtein, V.: Binary Codes Capable of Correcting Deletions, Insertions and Reversals. Soviet Physics Doklady 10(7), 707–710 (1966)
Li, Y., Swarup, V., Jajodia, S.: Fingerprinting relational databases: Schemes and specialties. IEEE Trans. Dependable Sec. Comput. 2(1), 34–45 (2005)
Ludäscher, B., Mukhopadhyay, P., Papakonstantinou, Y.: A Transducer-Based XML Query Processor. In: VLDB, pp. 227–238 (2002)
Ng, W., Lau, H.L.: Effective approaches for watermarking XML data. In: Zhou, L.-z., Ooi, B.-C., Meng, X. (eds.) DASFAA 2005. LNCS, vol. 3453, pp. 68–80. Springer, Heidelberg (2005)
Radu Sion, M.A., Prabhakar, S.: Resilient information hiding for abstract semi-structures. In: Kalker, T., Cox, I., Ro, Y.M. (eds.) IWDW 2003. LNCS, vol. 2939, pp. 141–153. Springer, Heidelberg (2004)
Segoufin, L., Vianu, V.: Validating Streaming XML Documents. In: Symposium on Principles of Database Systems, pp. 53–64 (2002)
Sion, R., Atallah, M., Prabhakar, S.: Resilient Rights Protection for Sensor Streams. In: Proc. of the 30th International Conference on Very Large Data Bases, Toronto (2004)
Zhou, X., Pang, H., Tan, K.-L., Mangla, D.: Wmxml: A system for watermarking xml data. In: VLDB, pp. 1318–1321 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 IFIP International Federation for Information Processing
About this paper
Cite this paper
Lafaye, J., Gross-Amblard, D. (2006). Xml Streams Watermarking. In: Damiani, E., Liu, P. (eds) Data and Applications Security XX. DBSec 2006. Lecture Notes in Computer Science, vol 4127. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11805588_6
Download citation
DOI: https://doi.org/10.1007/11805588_6
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-36796-3
Online ISBN: 978-3-540-36799-4
eBook Packages: Computer ScienceComputer Science (R0)
